WorldWideScience

Sample records for attack registry rationale

  1. Rationale and design of a large registry on renal denervation: the Global SYMPLICITY registry.

    Science.gov (United States)

    Böhm, Michael; Mahfoud, Felix; Ukena, Christian; Bauer, Axel; Fleck, Eckart; Hoppe, Uta C; Kintscher, Ulrich; Narkiewicz, Krzysztof; Negoita, Manuela; Ruilope, Luis; Rump, L Christian; Schlaich, Markus; Schmieder, Roland; Sievert, Horst; Weil, Joachim; Williams, Bryan; Zeymer, Uwe; Mancia, Giuseppe

    2013-08-22

    Hypertension is a global healthcare concern associated with a wide range of comorbidities. The recognition that elevated sympathetic drive plays an important role in the pathogenesis of hypertension led to the use of renal artery denervation to interrupt the efferent and afferent sympathetic nerves between the brain and kidneys to lower blood pressure. Clinical trials of the Symplicity™ renal denervation system have demonstrated that radiofrequency ablation of renal artery nerves is safe and significantly lowers blood pressure in patients with severe resistant (systolic BP >160 mmHg) hypertension. Smaller ancillary studies in hypertensive patients suggest a benefit from renal denervation in a variety of conditions such as chronic kidney disease, glucose intolerance, sleep apnoea and heart failure. The Global SYMPLICITY registry, which incorporates the GREAT SYMPLICITY registry initiated in Germany, is being conducted worldwide to evaluate the safety and efficacy of treatment with the Symplicity renal denervation system in real-world uncontrolled hypertensive patients, looking first at subjects with severe resistant hypertension to confirm the results of prior clinical trials, but then also subjects with a wider range of baseline blood pressure and coexisting comorbidities. The rationale, design and first baseline data from the Global SYMPLICITY registry are presented.

  2. The Canadian Registry for Pulmonary Fibrosis: Design and Rationale of a National Pulmonary Fibrosis Registry

    Directory of Open Access Journals (Sweden)

    Christopher J. Ryerson

    2016-01-01

    Full Text Available Background. The relative rarity and diversity of fibrotic interstitial lung disease (ILD have made it challenging to study these diseases in single-centre cohorts. Here we describe formation of a multicentre Canadian registry that is needed to describe the outcomes of fibrotic ILD and to enable detailed healthcare utilization analyses that will be the cornerstone for future healthcare planning. Methods. The Canadian Registry for Pulmonary Fibrosis (CARE-PF is a prospective cohort anticipated to consist of at least 2,800 patients with fibrotic ILD. CARE-PF will be used to (1 describe the natural history of fibrotic ILD, specifically determining the incidence and outcomes of acute exacerbations of ILD subtypes and (2 determine the impact of ILD and acute exacerbations of ILD on health services use and healthcare costs in the Canadian population. Consecutive patients with fibrotic ILD will be recruited from five Canadian ILD centres over a period of five years. Patients will be followed up as clinically indicated and will complete standardized questionnaires at each clinic visit. Prespecified outcomes and health services use will be measured based on self-report and linkage to provincial health administrative databases. Conclusion. CARE-PF will be among the largest prospective multicentre ILD registries in the world, providing detailed data on the natural history of fibrotic ILD and the healthcare resources used by these patients. As the largest and most comprehensive cohort of Canadian ILD patients, CARE-PF establishes a network for future clinical research and early phase clinical trials and provides a platform for translational and basic science research.

  3. [Short-term prognosis of transient ischemic attacks. Mexican multicenter stroke registry].

    Science.gov (United States)

    Arauz, Antonio; Cantú, Carlos; Ruiz-Sandoval, José Luis; Villarreal-Careaga, Jorge; Barinagarrementeria, Fernando; Murillo-Bonilla, Luis; Fernández, José Antonio; Torres, Bertha; León, Carolina; Rodríguez-Leyva, Idelfonso; Rangel-Guerra, Ricardo

    2006-01-01

    There are no data on Mexican population referring to frequency and prognosis of transient ischemic attacks (TIA). The purpose of the present study was to: (1) estimate the prevalence, vascular risk factors and short-term outcome in patients with TIA included in the first Mexican registry of cerebrovascular disease, and (2) analyze the acute care provided in these patients. This national registry of cerebrovascular diseases is a multicenter, observational, and hospital-based registry that was conducted from November 2002 to October 2004. The registry was developed to improve our knowledge in Mexico regarding risk factors profile, outcome, current diagnostic and treatment strategies, and short-term follow-up in patients with acute cerebral ischemia. Standardized data assessment was used by all centers which included information on demographics, pre-hospital events (including stroke onset and arrival to hospital), emergency department triage and workup. Short-term outcome was evaluated at day 30. Of this registry, TIA cases were selected and associated risk factors, clinical characteristics, diagnosis and treatment were analyzed. During the study time period, 2,000 patients were enrolled; 97 (5%) with diagnosis of TIA; 51 women and 46 men, mean age 69.3 +/- 11.4 years. Among these 97 patients; 51 (52.6%) were admitted to the hospital for evaluation. The main risk factors were; age > or = 65 years in 74%, hypertension in 64%, diabetes in 45%, and dislipidemia in 36% and obesity in 31%. The affected arterial territory was carotid TIA in 74% and vertebrobasilar in 26%. TIA was attributed to atherosclerosis in 63% of the patients, cardioembolism in 17%, and small vessels disease in 5%. At 30 days follow-up; three patients died during the initial evaluation (two secondary to cardiac arrhythmia, and one secondary to pneumonia). Among 14 of the 94 survivors (14.9%) we documented an early stroke recurrence, including cerebral infarction in nine patients (9.6%) and new TIA in

  4. The design, rationale, and baseline characteristics of a nationwide cohort registry in China: blood pressure and clinical outcome in TIA or ischemic stroke.

    Science.gov (United States)

    Xu, Jie; Liu, Yi; Tao, Yongli; Xie, Xuewei; Gu, Hongqiu; Pan, Yuesong; Zhao, Xingquan; Wang, Yongjun; Yan, Aoshuang; Wang, Yilong

    2016-01-01

    The relationship between poststroke blood pressure (BP) and clinical outcomes in ischemic stroke (IS) is still controversial. However, there is no large BP database for IS or transient ischemic attack (TIA) in China. This study aims to describe the rationale, study design, and baseline characteristics of a nationwide BP database in IS or TIA patients in China. The BOSS (blood pressure and clinical outcome in TIA or ischemic stroke) study was a hospital-based, prospective cohort study aiming to assess BP parameters and clinical outcome in IS/TIA patients. BP parameters were based on office BP, ambulatory BP, and home BP. Clinical outcomes included stroke recurrence, combined vascular events, and disability. Electronic case-report forms were used to record baseline and follow-up data. The patients were followed up for clinical outcomes at 3 months through face-to-face interview and at 12 months by telephone. Between October 2012 and February 2014, the BOSS registry recruited 2,608 patients from 61 hospitals, with a mean age of 62.5 years, 32.4% of whom were female, 88.9% with an entry diagnosis of IS, and 86% diagnosed with hypertension. The rates of patients lost-to-follow-up were 3.1% at 3 months and 5.1% at 1 year; 93% of patients completed ambulatory BP monitoring during hospitalization and 94.7% finished a 3-month BP diary. The BOSS registry will provide important evidence about BP management in the acute phase and secondary prevention for IS/TIA patients.

  5. The design and rationale of the primary angioplasty registry of Kerala

    Directory of Open Access Journals (Sweden)

    Jabir A

    2017-11-01

    Conclusions: The primary angioplasty registry of Kerala would help analyze the quality and outcomes of primary PCI services in Kerala, thereby yielding insights that can help limit unacceptable procedural variations in the performance of primary PCI. Identifying deviations from guideline based therapies can form the basis of quality improvement programs, which in turn will enable hospitals to achieve better patient outcomes.

  6. Rationale and design of the PREDICT (Plaque Registration and Evaluation Detected In Computed Tomography) registry.

    Science.gov (United States)

    Yamamoto, Hideya; Awai, Kazuo; Kuribayashi, Sachio; Kihara, Yasuki

    2014-01-01

    At least two-thirds of cases of acute coronary syndrome are caused by disruption of an atherosclerotic plaque. The natural history of individual plaques is unknown and needs to be established. The Plaque Registration and Evaluation Detected In Computed Tomography (PREDICT) registry is a prospective, multicenter, longitudinal, observational registry. This registry was designed to examine the relationships among coronary CT angiography (CTA) findings and clinical findings, mortality, and morbidity. The relationships among progression of coronary atherosclerosis, including changes in plaque characteristics on coronary CTA, and serum lipid levels and modification of coronary risk factors will also be evaluated. From October 2009 to December 2012, 3015 patients who underwent coronary CTA in 29 centers in Japan were enrolled. These patients were followed for 2 years. The primary end points were considered as all-cause mortality and major cardiac events, including cardiac death, nonfatal myocardial infarction, and unstable angina that required hospitalization. The secondary end points were heart failure that required administration of diuretics, target vessel revascularization, cerebral infarction, peripheral arterial disease, and invasive coronary angiography. Blood pressure, serum lipid, and C-reactive protein levels and all cardiovascular events were recorded at 1 and 2 years. If the initial coronary CTA showed any stenosis or plaques, follow-up coronary CTA was scheduled at 2 years to determine changes in coronary lesions, including changes in plaque characteristics. Analysis of the PREDICT registry data will clarify the relationships between coronary CTA findings and cardiovascular mortality and morbidity in a collaborative multicenter fashion. This trial is registered at www.clinicaltrials.gov as NCT 00991835. Copyright © 2014 Society of Cardiovascular Computed Tomography. All rights reserved.

  7. Rationale, design, and baseline characteristics of the CLARIFY registry of outpatients with stable coronary artery disease.

    Science.gov (United States)

    Sorbets, Emmanuel; Greenlaw, Nicola; Ferrari, Roberto; Ford, Ian; Fox, Kim M; Tardif, Jean-Claude; Tendera, Michal; Steg, Philippe Gabriel

    2017-10-01

    Despite major advances in prevention and treatment, coronary artery disease (CAD) remains the leading cause of death worldwide. Whereas many sources of data are available on the epidemiology of acute coronary syndromes, fewer datasets reflect the contemporary management and outcomes of stable CAD patients. A worldwide contemporary registry would improve our knowledge about stable CAD. The main objectives are to describe the demographics, clinical profile, contemporary management and outcomes of outpatients with stable CAD; to identify gaps between evidence and treatment; and to investigate long-term prognostic determinants. CLARIFY (ProspeCtive observational LongitudinAl RegIstry oF patients with stable coronary arterY disease) is an ongoing international observational longitudinal registry. Stable CAD patients from 45 countries in Europe, Asia, America, Middle East, Australia and Africa were enrolled between November 2009 and June 2010. The inclusion criteria were previous myocardial infarction, evidence of coronary stenosis >50%, proven symptomatic myocardial ischemia or prior revascularization procedure. The main exclusion criteria were serious non-cardiovascular disease, conditions interfering with life expectancy or severe other cardiovascular disease (including advanced heart failure). Follow-up visits were planned annually for up to 5 years, interspersed with 6-month telephone calls. Of the 32,703 patients enrolled, most (77.6%) were male, age (mean ± SD) was 64.2 ± 10.5 years, and 71.0% were receiving treatment for hypertension; mean ± SD resting heart rate was 68.2 ± 10.6 bpm. Patients were enrolled based on a history of myocardial infarction >3 months earlier (57.7%), having at least one stenosis >50% on coronary angiography (61.1%), proven symptomatic myocardial ischemia on non-invasive testing (23.1%), or history of percutaneous coronary intervention or coronary artery bypass graft (69.8%). Baseline characteristics were similar across the four

  8. Rationale, design and objectives of ARegPKD, a European ARPKD registry study.

    Science.gov (United States)

    Ebner, Kathrin; Feldkoetter, Markus; Ariceta, Gema; Bergmann, Carsten; Buettner, Reinhard; Doyon, Anke; Duzova, Ali; Goebel, Heike; Haffner, Dieter; Hero, Barbara; Hoppe, Bernd; Illig, Thomas; Jankauskiene, Augustina; Klopp, Norman; König, Jens; Litwin, Mieczyslaw; Mekahli, Djalila; Ranchin, Bruno; Sander, Anja; Testa, Sara; Weber, Lutz Thorsten; Wicher, Dorota; Yuzbasioglu, Ayse; Zerres, Klaus; Dötsch, Jörg; Schaefer, Franz; Liebau, Max Christoph

    2015-02-18

    Autosomal recessive polycystic kidney disease (ARPKD) is a rare but frequently severe disorder that is typically characterized by cystic kidneys and congenital hepatic fibrosis but displays pronounced phenotypic heterogeneity. ARPKD is among the most important causes for pediatric end stage renal disease and a leading reason for liver-, kidney- or combined liver kidney transplantation in childhood. The underlying pathophysiology, the mechanisms resulting in the observed clinical heterogeneity and the long-term clinical evolution of patients remain poorly understood. Current treatment approaches continue to be largely symptomatic and opinion-based even in most-advanced medical centers. While large clinical trials for the frequent and mostly adult onset autosomal dominant polycystic kidney diseases have recently been conducted, therapeutic initiatives for ARPKD are facing the challenge of small and clinically variable cohorts for which reliable end points are hard to establish. ARegPKD is an international, mostly European, observational study to deeply phenotype ARPKD patients in a pro- and retrospective fashion. This registry study is conducted with the support of the German Society for Pediatric Nephrology (GPN) and the European Study Consortium for Chronic Kidney Disorders Affecting Pediatric Patients (ESCAPE Network). ARegPKD clinically characterizes long-term ARPKD courses by a web-based approach that uses detailed basic data questionnaires in combination with yearly follow-up visits. Clinical data collection is accompanied by associated biobanking and reference histology, thus setting roots for future translational research. The novel registry study ARegPKD aims to characterize miscellaneous subcohorts and to compare the applied treatment options in a large cohort of deeply characterized patients. ARegPKD will thus provide evidence base for clinical treatment decisions and contribute to the pathophysiological understanding of this severe inherited disorder.

  9. The Vermont oxford neonatal encephalopathy registry: rationale, methods, and initial results

    Science.gov (United States)

    2012-01-01

    Background In 2006, the Vermont Oxford Network (VON) established the Neonatal Encephalopathy Registry (NER) to characterize infants born with neonatal encephalopathy, describe evaluations and medical treatments, monitor hypothermic therapy (HT) dissemination, define clinical research questions, and identify opportunities for improved care. Methods Eligible infants were ≥ 36 weeks with seizures, altered consciousness (stupor, coma) during the first 72 hours of life, a 5 minute Apgar score of ≤ 3, or receiving HT. Infants with central nervous system birth defects were excluded. Results From 2006–2010, 95 centers registered 4232 infants. Of those, 59% suffered a seizure, 50% had a 5 minute Apgar score of ≤ 3, 38% received HT, and 18% had stupor/coma documented on neurologic exam. Some infants experienced more than one eligibility criterion. Only 53% had a cord gas obtained and only 63% had a blood gas obtained within 24 hours of birth, important components for determining HT eligibility. Sixty-four percent received ventilator support, 65% received anticonvulsants, 66% had a head MRI, 23% had a cranial CT, 67% had a full channel encephalogram (EEG) and 33% amplitude integrated EEG. Of all infants, 87% survived. Conclusions The VON NER describes the heterogeneous population of infants with NE, the subset that received HT, their patterns of care, and outcomes. The optimal routine care of infants with neonatal encephalopathy is unknown. The registry method is well suited to identify opportunities for improvement in the care of infants affected by NE and study interventions such as HT as they are implemented in clinical practice. PMID:22726296

  10. Rationale and Design for the Peripartum Cardiomyopathy in Nigeria (PEACE Registry

    Directory of Open Access Journals (Sweden)

    Kamilu M Karaye

    2017-01-01

    Full Text Available Background Nigeria probably has the highest burden of Peripartum Cardiomyopathy (PPCM in the world. The primary objective of this study is to describe the burden, ventricular remodelling and survival of PPCM in Nigeria. In the sub-studies, we aim to describe the relationship between selenium deficiency, oxidative stress and PPCM, the impact of sodium selenite supplementation on left ventricular reverse remodelling, change in New York Heart Association functional class and survival in PPCM, and the prevalence of selenium deficiency and its relationship with cardiac function in apparently healthy pregnant women. Methods The main registry and the first sub-study are prospective longitudinal studies, while the second sub-study is an open-label randomised trial. 36 study centres across Nigeria have been registered and 14 of them are already recruiting subjects. Patients will be recruited from June to December 2017 and followed up till December 2018. Serum selenium and glutathione peroxidase will be assayed at recruitment for consecutive PPCM patients with LV ejection fraction (LVEF <45% at 6 months postpartum. 200 subjects with selenium deficiency will be randomised into treatment (Selenium Selenite 200μg tablets daily for 3 months and no-treatment arms. In the second sub-study, 120 apparently healthy pregnant women (Controls will be recruited at 28-38 weeks of gestation and reviewed at 6-8 weeks postpartum, and their serum selenium and GPO levels will be measured at recruitment. Conclusions This will be the largest systematic evaluation of PPCM in Nigeria, and it is hoped that the information will assist in understanding the disease better and developing locally applicable interventions for the disease. ClinicalTrials.gov Identifier: NCT03081949

  11. The new Childhood Arthritis and Rheumatology Research Alliance (CARRA) registry: design, rationale, and characteristics of patients enrolled in the first 12 months.

    Science.gov (United States)

    Beukelman, Timothy; Kimura, Yukiko; Ilowite, Norman T; Mieszkalski, Kelly; Natter, Marc D; Burrell, Grendel; Best, Brian; Jones, Jason; Schanberg, Laura E

    2017-04-17

    Herein we describe the history, design, and rationale of the new Childhood Arthritis and Rheumatology Research Alliance (CARRA) Registry and present the characteristics of patients with juvenile idiopathic arthritis (JIA) enrolled in the first 12 months of operation. The CARRA Registry began prospectively collecting data in the United States and Canada in July 2015 to evaluate the safety of therapeutic agents in persons with childhood-onset rheumatic disease, initially restricted to JIA. Secondary objectives include the evaluation of disease outcomes and their associations with medication use and other factors. Data are collected every 6 months and include clinical assessments, detailed medication use, patient-reported outcomes, and safety events. Follow-up is planned for at least 10 years for each participant and is facilitated by a telephone call center. As of July 2016, 1192 patients with JIA were enrolled in the CARRA Registry at 49 clinical sites. At enrollment, their median age was 12.4 years old and median disease duration was 2.6 years. Owing to preferential enrollment, patients with systemic JIA (13%) and with a polyarticular course (75%) were over-represented compared to patients in typical clinical practice. Approximately 49% were currently using biologic agents and ever use of oral glucocorticoids was common (47%). The CARRA Registry provides safety surveillance data to pharmaceutical companies to satisfy their regulatory requirements, and several independently-funded sub-studies that use the Registry infrastructure are underway. The new CARRA Registry successfully enrolled nearly 1200 participants with JIA in the first 12 months of its operation. Sustainable funding has been secured from multiple sources. The CARRA Registry may serve as a model for the study of other uncommon diseases.

  12. Genetic, clinical and pharmacological determinants of out-of-hospital cardiac arrest: rationale and outline of the AmsteRdam Resuscitation Studies (ARREST) registry

    Science.gov (United States)

    Blom, M T; van Hoeijen, D A; Bardai, A; Berdowski, J; Souverein, P C; De Bruin, M L; Koster, R W; de Boer, A; Tan, H L

    2014-01-01

    Introduction Out-of-hospital cardiac arrest (OHCA) is a major public health problem. Recognising the complexity of the underlying causes of OHCA in the community, we aimed to establish the clinical, pharmacological, environmental and genetic factors and their interactions that may cause OHCA. Methods and analysis We set up a large-scale prospective community-based registry (AmsteRdam Resuscitation Studies, ARREST) in which we prospectively include all resuscitation attempts from OHCA in a large study region in the Netherlands in collaboration with Emergency Medical Services. Of all OHCA victims since June 2005, we prospectively collect medical history (through hospital and general practitioner), and current and previous medication use (through community pharmacy). In addition, we include DNA samples from OHCA victims with documented ventricular tachycardia/fibrillation during the resuscitation attempt since July 2007. Various study designs are employed to analyse the data of the ARREST registry, including case–control, cohort, case only and case-cross over designs. Ethics and dissemination We describe the rationale, outline and potential results of the ARREST registry. The design allows for a stable and reliable collection of multiple determinants of OHCA, while assuring that the patient, lay-caregiver or medical professional is not hindered in any way. Such comprehensive data collection is required to unravel the complex basis of OHCA. Results will be published in peer-reviewed journals and presented at relevant scientific symposia. PMID:25332818

  13. The Comparing Options for Management: Patient-centered Results for Uterine Fibroids (COMPARE-UF) Registry: Rationale and Design.

    Science.gov (United States)

    Stewart, Elizabeth A; Lytle, Barbara L; Thomas, Laine; Wegienka, Ganesa R; Jacoby, Vanessa; Diamond, Michael P; Nicholson, Wanda K; Anchan, Raymond M; Venable, Sateria; Wallace, Kedra; Marsh, Erica E; Maxwell, George L; Borah, Bijan J; Catherino, William H; Myers, Evan R

    2018-05-08

    To design and establish a uterine fibroid (UF) registry based in the United States (US) to provide comparative effectiveness data regarding UF treatment. We report here the design and initial recruitment for the Comparing Options for Management: Patient-centered Results for Uterine Fibroids (COMPARE-UF) registry (Clinicaltrials.gov, NCT02260752), funded by the Agency for Healthcare Research and Quality (AHRQ) in collaboration with the-Patient-Centered Outcomes Research Institute (PCORI). COMPARE-UF is designed to help answer critical questions about treatment options for women with symptomatic UF. Women undergoing a procedure for UF (hysterectomy, myomectomy [abdominal, hysteroscopic, vaginal and laparoscopic/robotic], endometrial ablation, radiofrequency fibroid ablation, uterine artery embolization, magnetic resonance guided focused ultrasound or progestin-releasing intrauterine device insertion) at one of the COMPARE-UF sites are invited to participate in a prospective registry with three years follow-up for post-procedural outcomes. Enrolled participants provide annual follow-up through an online portal or through traditional phone contact. A central data abstraction center provides information obtained from imaging, operative or procedural notes and pathology reports. Women with uterine fibroids and other stakeholders are a key part of the COMPARE-UF registry and participate at all points from study design to dissemination of results. We built a network of nine clinical sites across the US with expertise in the care of women with UF to capture geographic, racial, ethnic and procedural diversity. Of the initial 2031 women enrolled in COMPARE-UF, 42% are self-identified as Black or African-American and 40% are age 40 years or younger with 16% of participants under age 35. Women undergoing myomectomy comprise the largest treatment group at 46% of all procedures with laparoscopic or robotic myomectomy comprising the largest subset of myomectomies at 19% of all

  14. Evaluation oF FactORs ImpacTing CLinical Outcome and Cost EffectiveneSS of the S-ICD: Design and Rationale of the EFFORTLESS S-ICD Registry

    DEFF Research Database (Denmark)

    Pedersen, Susanne S; Lambiase, Pier; Boersma, Lucas V A

    2012-01-01

    utilization. Methods: The Registry is an observational, nonrandomized, standard of care evaluation to be conducted at approximately 50 investigational centers in Europe and New Zealand where the S-ICD is approved for use and distribution. Clinical Registry endpoints include perioperative (30 days postimplant......Background: Leads in and on the heart of the transvenous implantable cardioverter defibrillator (ICD) form the Achilles' heel of this system due to potential for peri- and postimplant complications. The S-ICD is a newer generation of the ICD that does not require leads on the heart...... or in the vasculature. We present the rationale and study design of the Evaluation oF FactORs ImpacTing CLinical Outcome and Cost EffectiveneSS of the S-ICD (EFFORTLESS S-ICD) Registry which was designed to evaluate the long-term performance of the S-ICD including patient quality of life and long-term resource...

  15. Comparison of Clinical Characteristics among Subtypes of Visual Symptoms in Patients with Transient Ischemic Attack: Analysis of the PROspective Multicenter registry to Identify Subsequent cardiovascular Events after TIA (PROMISE-TIA) Registry.

    Science.gov (United States)

    Tanaka, Koji; Uehara, Toshiyuki; Kimura, Kazumi; Okada, Yasushi; Hasegawa, Yasuhiro; Tanahashi, Norio; Suzuki, Akifumi; Nakagawara, Jyoji; Arii, Kazumasa; Nagahiro, Shinji; Ogasawara, Kuniaki; Uchiyama, Shinichiro; Matsumoto, Masayasu; Iihara, Koji; Toyoda, Kazunori; Minematsu, Kazuo

    2018-06-01

    A transient visual symptom (TVS) is a clinical manifestation of transient ischemic attack (TIA). The aim of this study was to investigate differences in clinical characteristics among subtypes of TVS using multicenter TIA registry data. Patients with TIA visiting within 7 days of onset were prospectively enrolled from 57 hospitals between June 2011 and December 2013. Clinical characteristics were compared between patients with 3 major subtypes of TVS (transient monocular blindness [TMB], homonymous lateral hemianopia [HLH], and diplopia). Of 1365 patients, 106 (7.8%) had TVS, including 40 TMB (38%), 34 HLH (32%), 17 diplopia (16%), and 15 others/unknown (14%). Ninety-one patients with 1 of the 3 major subtypes of TVS were included. Symptoms persisted on arrival in 12 (13%) patients. Isolated TVS was significantly more common in TMB than in HLH and diplopia (88%, 62%, and 0%, respectively; P TIA multicenter cohort. Some differences in clinical characteristics were found among subtypes of TVS. Copyright © 2018 National Stroke Association. Published by Elsevier Inc. All rights reserved.

  16. Increasing Incidence of Hospitalization for Stroke and Transient Ischemic Attack in Young Adults: A Registry-Based Study.

    Science.gov (United States)

    Tibæk, Maiken; Dehlendorff, Christian; Jørgensen, Henrik S; Forchhammer, Hysse B; Johnsen, Søren P; Kammersgaard, Lars P

    2016-05-11

    Studies have reported increasing incidence of ischemic stroke in adults younger than 50 to 55 years. Information on temporal trends of other stroke subtypes and transient ischemic attack (TIA) is sparse. The aim of this study was to investigate temporal trends of the incidence of hospitalizations for TIA and stroke including sex- and subtype-specific trends in young adults aged 15 to 30 years. From the Danish National Patient Register, we identified all cases of first-ever stroke and TIA (age 15-30 years) in Denmark, who were hospitalized during the study period of 1994 to 2012. Incidence rates and estimated annual percentage changes (EAPCs) were estimated by using Poisson regression. During the study period, 4156 cases of first-ever hospitalization for stroke/TIA were identified. The age-standardized incidence rates of hospitalizations for stroke increased significantly (EAPC 1.83% [95% CI 1.11-2.55%]) from 11.97/100 000 person-years (PY) in 1994 to 16.77/100 000 PY in 2012. TIA hospitalizations increased from 1.93/100 000 PY in 1994 to 5.81/100 000 PY in 2012 and after 2006 more markedly in men than in women (EAPC 16.61% [95% CI 10.45-23.12%]). The incidence of hospitalizations for ischemic stroke was markedly lower among men, but increased significantly from 2006 (EAPC 14.60% [95% CI 6.22-23.63%]). The incidences of hospitalizations for intracerebral hemorrhage and subarachnoid hemorrhage remained stable during the study period. The incidence rates of first-time hospitalizations for ischemic stroke and TIA in young Danish adults have increased substantially since the mid 1990s. The increase was particularly prominent in the most recent years. © 2016 The Authors. Published on behalf of the American Heart Association, Inc., by Wiley Blackwell.

  17. Longitudinal determinants of depression among World Trade Center Health Registry enrollees, 14-15 years after the 9/11 attacks.

    Science.gov (United States)

    Jacobson, Melanie H; Norman, Christina; Nguyen, Angela; Brackbill, Robert M

    2018-03-15

    Exposure to the September 11, 2001 (9/11) terrorist attacks has been found to be associated with posttraumatic stress disorder (PTSD) and comorbid PTSD and depression up to 10-11 years post-disaster. However, little is known about the longitudinal predictors of mental health conditions over time. We examined longitudinal determinants of depression within strata of PTSD among 21,258 enrollees of the World Trade Center Health Registry who completed four questionnaires over 14 years of follow-up (Wave 1 in 2003-04; Wave 2 in 2005-06; Wave 3 in 2011-12; and Wave 4 in 2015-16). PTSD status was measured using the PTSD checklist on all four waves and defined as a score of ≥ 44; depression was assessed using the 8-item Patient Health Questionnaire at Waves 3 and 4 and defined as a score of ≥ 10. Across Waves 3 and 4, 18.6% experienced depression, and it was more common among those who ever had PTSD (56.1%) compared with those who had not (5.6%). Across PTSD strata, predictors of depression included low income, unemployment, low social integration and support, post-9/11 traumatic life events, and chronic physical illness. These factors also decreased the likelihood of recovering from depression. Depression symptoms were not measured at Waves 1 and 2; data was self-reported. These findings highlight the substantial burden of depression in a trauma-exposed population 14-15 years post-disaster, especially among those with PTSD. Similar life stressors predicted the course of depression among those with and without PTSD which may inform public health and clinical interventions. Copyright © 2018 The Authors. Published by Elsevier B.V. All rights reserved.

  18. Rationale, design and goals of the HeartFlow assessing diagnostic value of non-invasive FFRCT in Coronary Care (ADVANCE) registry

    DEFF Research Database (Denmark)

    Chinnaiyan, Kavitha M; Akasaka, Takashi; Amano, Tetsuya

    2016-01-01

    ) optimal medical therapy, (b) percutaneous coronary intervention, (c) coronary artery bypass graft surgery, or (d) more information required. The primary endpoint of the registry is the reclassification rate between the management plan based on coronary CTA alone versus CTA plus FFRCT. The secondary...

  19. Instantaneous Wave-Free Ratio versus Fractional Flow Reserve guided intervention (iFR-SWEDEHEART): Rationale and design of a multicenter, prospective, registry-based randomized clinical trial.

    Science.gov (United States)

    Götberg, Matthias; Christiansen, Evald H; Gudmundsdottir, Ingibjörg; Sandhall, Lennart; Omerovic, Elmir; James, Stefan K; Erlinge, David; Fröbert, Ole

    2015-11-01

    Instantaneous wave-free ratio (iFR) is a new hemodynamic resting index for assessment of coronary artery stenosis severity. iFR uses high frequency sampling to calculate a gradient across a coronary lesion during a period of diastole. The index has been tested against fractional flow reserve (FFR) and found to have an overall classification agreement of 80% to 85%. Whether the level of disagreement is clinically relevant is unknown. Clinical outcome data on iFR are scarce. This study is a registry-based randomized clinical trial, which is a novel strategy using health quality registries as on-line platforms for randomization, case record forms, and follow-up. iFR-SWEDEHEART is a multicenter, prospective, randomized, controlled, clinical open-label clinical trial. Two thousand patients with stable angina or acute coronary syndrome and an indication for physiology-guided assessment of one or more coronary stenoses will be randomized 1:1 to either iFR- or FFR-guided intervention. The randomization will be conducted online in the Swedish web-based system for enhancement and development of evidence-based care in heart disease evaluated according to recommended therapies (SWEDEHEART) registry. The trial has a non-inferiority design, with a primary combined end point of all-cause death, non-fatal myocardial infarction, and unplanned revascularization at 12 months. End points will be identified through national registries and undergo central blind adjudication to ensure data quality. The iFR-SWEDEHEART trial is an registry-based randomized clinical trial evaluating the safety and efficacy of the diagnostic method iFR compared to FFR. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. Acute management of stroke patients taking non-vitamin K antagonist oral anticoagulants Addressing Real-world Anticoagulant Management Issues in Stroke (ARAMIS) Registry: Design and rationale.

    Science.gov (United States)

    Xian, Ying; Hernandez, Adrian F; Harding, Tina; Fonarow, Gregg C; Bhatt, Deepak L; Suter, Robert E; Khan, Yosef; Schwamm, Lee H; Peterson, Eric D

    2016-12-01

    Non-vitamin K antagonist oral anticoagulants (NOACs, dabigatran, rivaroxaban, apixaban, and edoxaban) have been increasingly used as alternatives to warfarin for stroke prophylaxis in patients with atrial fibrillation. Yet there is substantial lack of information on how patients on NOACs are currently treated when they have an acute ischemic stroke and the best strategies for treating intracerebral hemorrhage for those on chronic anticoagulation with warfarin or a NOAC. These are critical unmet needs for real world clinical decision making in these emergent patients. The ARAMIS Registry is a multicenter cohort study of acute stroke patients who were taking chronic anticoagulation therapy prior to admission and are admitted with either an acute ischemic stroke or intracerebral hemorrhage. Built upon the existing infrastructure of American Heart Association/American Stroke Association Get With the Guidelines Stroke, the ARAMIS Registry will enroll a total of approximately 10,000 patients (5000 with acute ischemic stroke who are taking a NOAC and 5000 with anticoagulation-related intracerebral hemorrhage who are on warfarin or a NOAC). The primary goals of the ARAMIS Registry are to provide a comprehensive picture of current treatment patterns and outcomes of acute ischemic stroke patients on NOACs, as well as anticoagulation-related intracerebral hemorrhage in patients on either warfarin or NOACs. Beyond characterizing the index hospitalization, up to 2500 patients (1250 ischemic stroke and 1250 intracerebral hemorrhage) who survive to discharge will be enrolled in an optional follow-up sub-study and interviewed at 3 and 6 months after discharge to assess longitudinal medication use, downstream care, functional status, and patient-reported outcomes. The ARAMIS Registry will document the current state of management of NOAC treated patients with acute ischemic stroke as well as contemporary care and outcome of anticoagulation-related intracerebral hemorrhage. These

  1. Rationale and design of the worldwide prospective multicenter registry on radiation dose estimates of cardiac CT angiography in daily practice in 2017 (PROTECTION VI)

    DEFF Research Database (Denmark)

    Stocker, Thomas J; Deseive, Simon; Chen, Marcus

    2018-01-01

    -randomized and randomized studies have been performed to reduce the associated radiation exposure. Currently, it is unclear if the advances in technology and knowledge about radiation reduction translated into reduced levels of cardiac CTA radiation dose in daily clinical practice as well as a wide utilization of dose......-saving strategies. METHODS: The PROTECTION VI study is a multicenter, prospective, worldwide registry designed to evaluate radiation dose exposure, utilization of dose-saving strategies and diagnostic image quality during cardiac CTA in current daily practice. Assessment of image quality will be addressed...... median radiation dose levels, image quality, frequency of use and efficacy of algorithms for dose reduction, and patient and study-related predictors associated with radiation dose. CONCLUSIONS: The PROTECTION VI study is designed to provide a reliable estimate of current radiation dose for cardiac CTA...

  2. Racionalidade e métodos: estudo BREATHE - I registro brasileiro de insuficiência cardíaca Rationale and design: BREATHE registry - I brazilian registry of heart failure

    Directory of Open Access Journals (Sweden)

    2013-05-01

    Full Text Available FUNDAMENTO: Diversos registros locais buscam de forma isolada retratar características clínicas de pacientes internados com Insuficiência Cardíaca (IC em hospitais e comunidades brasileiras. De forma geral, a análise desses dados sugere que existam diferenças importantes na etiologia, nos fatores de descompensação, no tratamento e no prognóstico de pacientes com IC nas diferentes regiões brasileiras. OBJETIVOS: Avaliar as características demográficas, clínicas, prognósticas de 1.200 pacientes admitidos com diagnóstico clínico de insuficiência cardíaca descompensada em um grupo de 60 hospitais representativos das diferentes regiões brasileiras. MÉTODOS: Estudo observacional transversal (registro com seguimento longitudinal de doze meses (visitas de admissão, alta hospitalar, três meses, seis meses e doze meses após inclusão, em que pacientes admitidos em hospitais da rede pública e privada com quadro clínico primariamente de IC definida serão estudados. RESULTADOS: Os resultados serão apresentados logo após o término da coleta, avaliação da qualidade e análise estatística dos dados. CONCLUSÕES: A análise dos resultados deste registro multicêntrico permitirá um planejamento mais adequado do aporte de recursos financeiros, pessoais e tecnológicos para a área da saúde, bem como o planejamento de medidas preventivas mais eficazes na IC descompensada.BACKGROUND: Several local registries have sought to individually depict clinical characteristics of patients hospitalized with heart failure (HF in Brazilian hospitals and communities. Overall, the analysis of these data suggests that there are important differences in etiology, decompensation factors, treatment and prognosis of patients with HF in different Brazilian regions. OBJECTIVES: To evaluate the demographic, clinical and prognostic characteristics of 1,200 patients admitted with a clinical diagnosis of decompensated HF in a group of 60 hospitals

  3. Risk factors for death, stroke, and bleeding in 28,628 patients from the GARFIELD-AF registry: Rationale for comprehensive management of atrial fibrillation.

    Science.gov (United States)

    Bassand, Jean-Pierre; Accetta, Gabriele; Al Mahmeed, Wael; Corbalan, Ramon; Eikelboom, John; Fitzmaurice, David A; Fox, Keith A A; Gao, Haiyan; Goldhaber, Samuel Z; Goto, Shinya; Haas, Sylvia; Kayani, Gloria; Pieper, Karen; Turpie, Alexander G G; van Eickels, Martin; Verheugt, Freek W A; Kakkar, Ajay K

    2018-01-01

    The factors influencing three major outcomes-death, stroke/systemic embolism (SE), and major bleeding-have not been investigated in a large international cohort of unselected patients with newly diagnosed atrial fibrillation (AF). In 28,628 patients prospectively enrolled in the GARFIELD-AF registry with 2-year follow-up, we aimed at analysing: (1) the variables influencing outcomes; (2) the extent of implementation of guideline-recommended therapies in comorbidities that strongly affect outcomes. Median (IQR) age was 71.0 (63.0 to 78.0) years, 44.4% of patients were female, median (IQR) CHA2DS2-VASc score was 3.0 (2.0 to 4.0); 63.3% of patients were on anticoagulants (ACs) with or without antiplatelet (AP) therapy, 24.5% AP monotherapy, and 12.2% no antithrombotic therapy. At 2 years, rates (95% CI) of death, stroke/SE, and major bleeding were 3.84 (3.68; 4.02), 1.27 (1.18; 1.38), and 0.71 (0.64; 0.79) per 100 person-years. Age, history of stroke/SE, vascular disease (VascD), and chronic kidney disease (CKD) were associated with the risks of all three outcomes. Congestive heart failure (CHF) was associated with the risks of death and stroke/SE. Smoking, non-paroxysmal forms of AF, and history of bleeding were associated with the risk of death, female sex and heavy drinking with the risk of stroke/SE. Asian race was associated with lower risks of death and major bleeding versus other races. AC treatment was associated with 30% and 28% lower risks of death and stroke/SE, respectively, compared with no AC treatment. Rates of prescription of guideline-recommended drugs were suboptimal in patients with CHF, VascD, or CKD. Our data show that several variables are associated with the risk of one or more outcomes, in terms of death, stroke/SE, and major bleeding. Comprehensive management of AF should encompass, besides anticoagulation, improved implementation of guideline-recommended therapies for comorbidities strongly associated with outcomes, namely CHF, VascD, and CKD

  4. Real-world heart failure management in 10,910 patients with chronic heart failure in the Netherlands : Design and rationale of the Chronic Heart failure ESC guideline-based Cardiology practice Quality project (CHECK-HF) registry.

    Science.gov (United States)

    Brugts, J J; Linssen, G C M; Hoes, A W; Brunner-La Rocca, H P

    2018-05-01

    Data from patient registries give insight into the management of patients with heart failure (HF), but actual data from unselected real-world HF patients are scarce. Therefore, we performed a cross sectional study of current HF care in the period 2013-2016 among more than 10,000 unselected HF patients at HF outpatient clinics in the Netherlands. In 34 participating centres, all 10,910 patients with chronic HF treated at cardiology centres were included in the CHECK-HF registry. Of these, most (96%) were managed at a specific HF outpatient clinic. Heart failure was typically diagnosed according to the ESC guidelines 2012, based on signs, symptoms and structural and/or functional cardiac abnormalities. Information on diagnostics, treatment and co-morbidities were recorded, with specific focus on drug therapy and devices. In our cohort, the mean age was 73 years (SD 12) and 60% were male. Frequent co-morbidities reported in the patient records were diabetes mellitus 30%, hypertension 43%, COPD 19%, and renal insufficiency 58%. In 47% of the patients, ischaemia was the origin of HF. In our registry, the prevalence of HF with preserved ejection fraction was 21%. The CHECK-HF registry will provide insight into the current, real world management of patient with chronic HF, including HF with reduced ejection fraction, preserved ejection fraction and mid-range ejection fraction, that will help define ways to improve quality of care. Drug and device therapy and guideline adherence as well as interactions with age, gender and co-morbidities will receive specific attention.

  5. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  6. Rationale, Design, and Methodology of the APOLLON trial: A comPrehensive, ObservationaL registry of heart faiLure with midrange and preserved ejectiON fraction.

    Science.gov (United States)

    Özlek, Bülent; Özlek, Eda; Çelik, Oğuzhan; Çil, Cem; Doğan, Volkan; Tekinalp, Mehmet; Zencirkıran Ağuş, Hicaz; Kahraman, Serkan; Ösken, Altuğ; Rencüzoğulları, İbrahim; Tanık, Veysel Ozan; Bekar, Lütfü; Çakır, Mustafa Ozan; Kaya, Bedri Caner; Tibilli, Hakan; Çelik, Yunus; Başaran, Özcan; Mert, Kadir Uğur; Sevinç, Samet; Demirci, Erkan; Dondurmacı, Engin; Biteker, Murat

    2018-05-01

    Although almost half of chronic heart failure (HF) patients have mid-range (HFmrEF) and preserved left-ventricular ejection fraction (HFpEF), no studies have been carried out with these patients in our country. This study aims to determine the demographic characteristics and current status of the clinical background of HFmrEF and HFpEF patients in a multicenter trial. A comPrehensive, ObservationaL registry of heart faiLure with mid range and preserved ejectiON fraction (APOLLON) trial will be an observational, multicenter, and noninterventional study conducted in Turkey. The study population will include 1065 patients from 12 sites in Turkey. All data will be collected at one point in time and the current clinical practice will be evaluated (ClinicalTrials.gov number NCT03026114). We will enroll all consecutive patients admitted to the cardiology clinics who were at least 18 years of age and had New York Heart Association class II, III, or IV HF, elevated brain natriuretic peptide levels within the last 30 days, and an left ventricular ejection fraction (LVEF) of at least 40%. Patients fulfilling the exclusion criteria will not be included in the study. Patients will be stratified into two categories according to LVEF: mid-range EF (HFmrEF, LVEF 40%-49%) and preserved EF (HFpEF, LVEF ≥50%). Regional quota sampling will be performed to ensure that the sample was representative of the Turkish population. Demographic, lifestyle, medical, and therapeutic data will be collected by this specific survey. The APOLLON trial will be the largest and most comprehensive study in Turkey evaluating HF patients with a LVEF ≥40% and will also be the first study to specifically analyze the recently designated HFmrEF category.

  7. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  8. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  9. Clinical Case Registries (CCR)

    Data.gov (United States)

    Department of Veterans Affairs — The Clinical Case Registries (CCR) replaced the former Immunology Case Registry and the Hepatitis C Case Registry with local and national databases. The CCR:HIV and...

  10. Converged Registries Solution (CRS)

    Data.gov (United States)

    Department of Veterans Affairs — The Converged Registries platform is a hardware and software architecture designed to host individual patient registries and eliminate duplicative development effort...

  11. EMI Registry Design

    CERN Document Server

    Memon, S

    2011-01-01

    Grid services are the fundamental building blocks of today's Distributed Computing Infrastructures (DCI). The discovery of services in the DCI is a primary function that is a precursor to other tasks such as workload and data management. In this context, a service registry can be used to fulfil such a requirement. Existing service registries, such as the ARC Information Index or UNICORE Registry, are examples that have proven themselves in production environments. Such implementations provide a centralized service registry, however, todays DCIs, such as EGI, are based on a federation model. It is therefore necessary for the service registry to mirror such a model in order for it to seamlessly fit into the operational and management requirements - a DCI built using federated approach. This document presents an architecture for a federated service registry and a prototype based on this architecture, the EMI Registry. Special attention is given to how the federated service registry is robust to environment failu...

  12. Exercise Aboard Attack Submarines: Rationale and New Options

    National Research Council Canada - National Science Library

    Watenpaugh, Donald

    2004-01-01

    .... However, most submariners do not exercise during deployment for a variety of reasons, including lack of space, time limitations, equipment limitations, lack of entertainment or recreational value...

  13. Second generation registry framework.

    Science.gov (United States)

    Bellgard, Matthew I; Render, Lee; Radochonski, Maciej; Hunter, Adam

    2014-01-01

    Information management systems are essential to capture data be it for public health and human disease, sustainable agriculture, or plant and animal biosecurity. In public health, the term patient registry is often used to describe information management systems that are used to record and track phenotypic data of patients. Appropriate design, implementation and deployment of patient registries enables rapid decision making and ongoing data mining ultimately leading to improved patient outcomes. A major bottleneck encountered is the static nature of these registries. That is, software developers are required to work with stakeholders to determine requirements, design the system, implement the required data fields and functionality for each patient registry. Additionally, software developer time is required for ongoing maintenance and customisation. It is desirable to deploy a sophisticated registry framework that can allow scientists and registry curators possessing standard computing skills to dynamically construct a complete patient registry from scratch and customise it for their specific needs with little or no need to engage a software developer at any stage. This paper introduces our second generation open source registry framework which builds on our previous rare disease registry framework (RDRF). This second generation RDRF is a new approach as it empowers registry administrators to construct one or more patient registries without software developer effort. New data elements for a diverse range of phenotypic and genotypic measurements can be defined at any time. Defined data elements can then be utilised in any of the created registries. Fine grained, multi-level user and workgroup access can be applied to each data element to ensure appropriate access and data privacy. We introduce the concept of derived data elements to assist the data element standards communities on how they might be best categorised. We introduce the second generation RDRF that

  14. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  15. Facility Registry Service (FRS)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Facility Registry Service (FRS) provides an integrated source of comprehensive (air, water, and waste) environmental information about facilities across EPA,...

  16. EMI Registry Development Plan

    CERN Document Server

    Memon, S.; Szigeti, G.; Field, L.

    2012-01-01

    This documents describes the overall development plan of the EMI Registry product, the plan focuses on the realisation of the EMI Registry specification as defined in the document. It is understood that during the course of the development phase the specification will likely evolve and the changes will be fed into the specification document.

  17. The Qingdao Twin Registry

    DEFF Research Database (Denmark)

    Duan, Haiping; Ning, Feng; Zhang, Dongfeng

    2013-01-01

    In 1998, the Qingdao Twin Registry was initiated as the main part of the Chinese National Twin Registry. By 2005, a total of 10,655 twin pairs had been recruited. Since then new twin cohorts have been sampled, with one longitudinal cohort of adolescent twins selected to explore determinants of me...

  18. [Trauma registry and injury].

    Science.gov (United States)

    Shapira, S C

    2001-10-01

    The trauma registry network constitutes an essential database in every injury prevention system. In order to rationally estimate the extent of injury in general, and injuries from traffic accidents in particular, the trauma registry systems should contain the most comprehensive and broad database possible, in line with the operational definitions. Ideally, the base of the injury pyramid should also include mild injuries and even "near-misses". The Israeli National Trauma Registry has come a long way in the last few years. The eventual inclusion of all trauma centers in Israel will enable the establishment of a firm base for the allocation of resources by decision-makers.

  19. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  20. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  1. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  2. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  3. Data Element Registry Services

    Data.gov (United States)

    U.S. Environmental Protection Agency — Data Element Registry Services (DERS) is a resource for information about value lists (aka code sets / pick lists), data dictionaries, data elements, and EPA data...

  4. Danish Hip Arthroscopy Registry

    DEFF Research Database (Denmark)

    Mygind-Klavsen, Bjarne; Grønbech Nielsen, Torsten; Maagaard, Niels

    2016-01-01

    Danish Hip Arthroscopy Registry (DHAR) was initiated in 2012 as a web-based prospective registry. The purpose of this study was to evaluate and report the epidemiologic and perioperative data of the first 2000 procedures in a Danish hip arthroscopy population and to describe the development of DHAR...... was 0.65 and HAGOS sub-scores were 51 (pain), 49 (symptoms), 53 (ADL), 35 (sport), 20 (physical activity) and 29, respectively. We conclude that patients undergoing hip arthroscopy report considerable pain, loss of function, reduced level of activity and reduced quality-of-life prior to surgery....... The problems with development and maintaining a large clinical registry are described and further studies are needed to validate data completeness. We consider the development of a national clinical registry for hip arthroscopy as a successful way of developing and maintaining a valuable clinical...

  5. 911 Master PSAP Registry

    Data.gov (United States)

    Federal Communications Commission — Updated as of 5Oct2017. The Registry lists PSAPs by an FCC assigned identification number, PSAP Name, State, County, City, and provides information on any type of...

  6. DOE LLW classification rationale

    International Nuclear Information System (INIS)

    Flores, A.Y.

    1991-01-01

    This report was about the rationale which the US Department of Energy had with low-level radioactive waste (LLW) classification. It is based on the Nuclear Regulatory Commission's classification system. DOE site operators met to review the qualifications and characteristics of the classification systems. They evaluated performance objectives, developed waste classification tables, and compiled dose limits on the waste. A goal of the LLW classification system was to allow each disposal site the freedom to develop limits to radionuclide inventories and concentrations according to its own site-specific characteristics. This goal was achieved with the adoption of a performance objectives system based on a performance assessment, with site-specific environmental conditions and engineered disposal systems

  7. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  8. Radiosensitizers: rationale and potential

    International Nuclear Information System (INIS)

    Brown, J.M.

    1981-01-01

    This paper briefly reviews agents that are capable of sensitizing hypoxic cells to radiation and chemotherapeutic agents. The first part is a synopsis of the development of hypoxic radiosensitizers, which concludes that misonidazole can be effective against human tumors. Unfortunately, neurotoxicity limits its effectiveness in humans because the dose that can be given in conjunction with daily fractionated radiation is five to ten times lower than is required for full radiosensitization of the hypoxic cells. The second part covers our recent efforts to develop a drug that does not produce such limiting neurotoxicity. The primary rationale of our program was to synthesize a drug with a short plasma half-life that was too hydrophilic to cross the blood-brain barrier but was able to penetrate tumors and radiosensitize hypoxic cells. From this program, a new drug, SR-2508, has been found that is as efficient as misonidazole in its radiosensitizing ability, but is four to ten times less toxic. Finally, the potential of radiosensitizers not only as agents that can sensitize tumor cells to radiation, but also as agents that can specifically sensitize tumors to chemotherapeutic agents, is discussed. In addition, these drugs may be potential cytotoxic agents that produce toxicity only in solid tumors

  9. The Danish Heart Registry

    DEFF Research Database (Denmark)

    Özcan, Cengiz; Juel, Knud; Lassen, Jens Flensted

    2016-01-01

    AIM: The Danish Heart Registry (DHR) seeks to monitor nationwide activity and quality of invasive diagnostic and treatment strategies in patients with ischemic heart disease as well as valvular heart disease and to provide data for research. STUDY POPULATION: All adult (≥15 years) patients...... undergoing coronary angiography (CAG), percutaneous coronary intervention (PCI), coronary artery bypass grafting, and heart valve surgery performed across all Danish hospitals were included. MAIN VARIABLES: The DHR contains a subset of the data stored in the Eastern and Western Denmark Heart Registries (EDHR...

  10. The Western Denmark Heart Registry

    DEFF Research Database (Denmark)

    Schmidt, Morten; Maeng, Michael; Madsen, Morten

    2018-01-01

    The WDHR (Western Denmark Heart Registry) is a seminational, multicenter-based registry with longitudinal registration of detailed patient and procedure data since 1999. The registry includes as of January 1, 2017 approximately 240,000 coronary angiographies, 90,000 percutaneous coronary interven......The WDHR (Western Denmark Heart Registry) is a seminational, multicenter-based registry with longitudinal registration of detailed patient and procedure data since 1999. The registry includes as of January 1, 2017 approximately 240,000 coronary angiographies, 90,000 percutaneous coronary...

  11. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  12. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  13. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  14. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  15. Cancer Registry Data

    Centers for Disease Control (CDC) Podcasts

    2017-05-24

    Dr. Loria Pollack, a Senior Medical Epidemiologist, talks about the importance of cancer registry data to understanding how cancer affects the United States–now and in the future.  Created: 5/24/2017 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 5/24/2017.

  16. Danish Hip Arthroscopy Registry

    DEFF Research Database (Denmark)

    Mygind-Klavsen, Bjarne; Lund, Bent; Nielsen, Torsten Grønbech

    2018-01-01

    PURPOSE: Predictors of outcome after femoroacetabular impingement (FAI) surgery are not well-documented. This study presents data from the Danish Hip Arthroscopy Registry (DHAR) for such analyses. The purpose of this study was to identify predictors of poor outcome after FAI surgery in a Danish FAI...

  17. The Danish Twin Registry

    DEFF Research Database (Denmark)

    Skytthe, Axel; Ohm Kyvik, Kirsten; Vilstrup Holm, Niels

    2011-01-01

    Introduction: The Danish Twin Registry is a unique source for studies of genetic, familial and environmental factors on life events, health conditions and diseases. Content: More than 85,000 twin pairs born 1870-2008 in Denmark. Validity and coverage: Four main ascertainment methods have been emp...

  18. The EuroMyositis registry

    DEFF Research Database (Denmark)

    Lilleker, James B; Vencovsky, Jiri; Wang, Guochun

    2018-01-01

    AIMS: The EuroMyositis Registry facilitates collaboration across the idiopathic inflammatory myopathy (IIM) research community. This inaugural report examines pooled Registry data. METHODS: Cross-sectional analysis of IIM cases from 11 countries was performed. Associations between clinical subtyp...

  19. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  20. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  1. The Lombardia Stroke Unit Registry: a year experience

    Directory of Open Access Journals (Sweden)

    Giuseppe Micieli

    2010-12-01

    Full Text Available Stroke is the third cause of death and the first long-term disability cause in industrialised countries. It is therefore an important problem, not only from a clinical point of view, but also because of the high costs involved in its management. The results of clinical trials, reviews and meta-analysis highlight the importance of the Stroke Unit in the correct and adequate management of the patient with stroke. This article describes the Lombardia Stroke Unit and the related Stroke Registry. In 2010 this Registry includes 27 Centres and recruits patients with acute stroke or transient ischaemic attacks (TIAs. The Registry aims at measuring performance parameters, identifying guidelines, non-compliance causes, and analysing care processes.

  2. The Brazilian Twin Registry.

    Science.gov (United States)

    Ferreira, Paulo H; Oliveira, Vinicius C; Junqueira, Daniela R; Cisneros, Lígia C; Ferreira, Lucas C; Murphy, Kate; Ordoñana, Juan R; Hopper, John L; Teixeira-Salmela, Luci F

    2016-12-01

    The Brazilian Twin Registry (BTR) was established in 2013 and has impelled twin research in South America. The main aim of the initiative was to create a resource that would be accessible to the Brazilian scientific community as well as international researchers interested in the investigation of the contribution of genetic and environmental factors in the development of common diseases, phenotypes, and human behavior traits. The BTR is a joint effort between academic and governmental institutions from Brazil and Australia. The collaboration includes the Federal University of Minas Gerais (UFMG) in Brazil, the University of Sydney and University of Melbourne in Australia, the Australian Twin Registry, as well as the research foundations CNPq and CAPES in Brazil. The BTR is a member of the International Network of Twin Registries. Recruitment strategies used to register twins have been through participation in a longitudinal study investigating genetic and environmental factors for low back pain occurrence, and from a variety of sources including media campaigns and social networking. Currently, 291 twins are registered in the BTR, with data on demographics, zygosity, anthropometrics, and health history having been collected from 151 twins using a standardized self-reported questionnaire. Future BTR plans include the registration of thousands of Brazilian twins identified from different sources and collaborate nationally and internationally with other research groups interested on twin studies.

  3. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  4. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  5. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  6. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  7. Evaluation of the short- and long-term safety and therapy outcomes of the everolimus-eluting bioresorbable vascular scaffold system in patients with coronary artery stenosis: Rationale and design of the German–Austrian ABSORB RegIstRy (GABI-R)

    Energy Technology Data Exchange (ETDEWEB)

    Nef, Holger, E-mail: holger.nef@innere.med.uni-giessen.de [University of Giessen, Medizinische Klinik I, Department of Cardiology, Giessen (Germany); Wiebe, Jens [University of Giessen, Medizinische Klinik I, Department of Cardiology, Giessen (Germany); Achenbach, Stefan [University of Erlangen, Medizinische Klinik II, Department of Cardiology, Erlangen (Germany); Münzel, Thomas [Department of Medicine II, University Medical Center, Johannes Gutenberg University Mainz, Mainz (Germany); Naber, Christoph [Klinik für Kardiologie und Angiologie, Elisabeth-Krankenhaus, Essen (Germany); Richardt, Gert [Herzzentrum, Segeberger Kliniken GmbH, Bad Segeberg (Germany); Mehilli, Julinda [Department of Cardiology, Klinikum Großhadern, Ludwig- Maximilian Universität, Munich (Germany); Wöhrle, Jochen [Department of Internal Medicine II, University of Ulm, Ulm (Germany); Neumann, Till; Biermann, Janine [University of Essen, Department of Cardiology, Essen (Germany); Zahn, Ralf [Abteilung für Kardiologie, Herzzentrum Ludwigshafen, Ludwigshafen (Germany); Kastner, Johannes [Department of Cardiology, University of Vienna Medical School, Vienna (Austria); Schmermund, Axel [CCB, Cardioangiologisches Centrum Bethanien, Frankfurt (Germany); Pfannebecker, Thomas [Abbott Vascular Deutschland GmbH, Wetzlar (Germany); Schneider, Steffen; Limbourg, Tobias [Institut für Herzinfarktforschung, Ludwigshafen (Germany); Hamm, Christian W. [University of Giessen, Medizinische Klinik I, Department of Cardiology, Giessen (Germany); Kerckhoff Heart and Thorax Center, Department of Cardiology, Bad Nauheim (Germany)

    2016-01-15

    Background: Third-generation drug-eluting metal stents are the gold standard for treatment of coronary artery disease. The permanent metallic caging of the vessel, however, can result in limited vasomotion, chronic inflammation, and late expansive remodeling, conditions that can lead to late and very late stent thrombosis. The development of bioresorbable scaffolds (BRSs) promises advantages over metal stents due to complete biodegradation within 2–4 years. Theoretically, since vessel scaffolding is temporary and no permanent implant remains in the vessel, BRSs, as opposed to metal stents, once degraded would no longer be potential triggers for stent-related adverse events or side effects. Methods/design: The short- and long-term outcome after implantation of an everolimus-eluting, poly-L-lactic acid-based bioresorbable scaffold system (ABSORB, Abbott Vascular, Santa Clara, CA, USA) in the world-wide greatest all-comers cohort will be evaluated in the prospective, non-interventional, multicenter German–Austrian ABSORB RegIstRy (GABI-R). GABI-R will include over 5000 patients from about 100 study sites in Austria and Germany. Safety endpoints such as cardiac death, myocardial infarction, and clinically driven percutaneous or surgical target lesion and vessel revascularization will be evaluated during hospitalization and in the follow-up period (minimum of 5 years). Conclusion: Although two randomized controlled trials and several registries have documented safety and efficacy as well as non-inferiority of this everolimus-eluting ABSORB device compared with drug-eluting metal stents, the current knowledge regarding clinical application, treatment success, and long-term safety of using this BRS in daily routine is limited. Thus, the goal of GABI-R is to address this lack of information. - Highlights: • The GABI-R addresses a lack of data about bioresorbable scaffolds in daily practice. • 5000 patients with minimal in- and exclusion criteria at 100 sites will

  8. Evaluation of the short- and long-term safety and therapy outcomes of the everolimus-eluting bioresorbable vascular scaffold system in patients with coronary artery stenosis: Rationale and design of the German–Austrian ABSORB RegIstRy (GABI-R)

    International Nuclear Information System (INIS)

    Nef, Holger; Wiebe, Jens; Achenbach, Stefan; Münzel, Thomas; Naber, Christoph; Richardt, Gert; Mehilli, Julinda; Wöhrle, Jochen; Neumann, Till; Biermann, Janine; Zahn, Ralf; Kastner, Johannes; Schmermund, Axel; Pfannebecker, Thomas; Schneider, Steffen; Limbourg, Tobias; Hamm, Christian W.

    2016-01-01

    Background: Third-generation drug-eluting metal stents are the gold standard for treatment of coronary artery disease. The permanent metallic caging of the vessel, however, can result in limited vasomotion, chronic inflammation, and late expansive remodeling, conditions that can lead to late and very late stent thrombosis. The development of bioresorbable scaffolds (BRSs) promises advantages over metal stents due to complete biodegradation within 2–4 years. Theoretically, since vessel scaffolding is temporary and no permanent implant remains in the vessel, BRSs, as opposed to metal stents, once degraded would no longer be potential triggers for stent-related adverse events or side effects. Methods/design: The short- and long-term outcome after implantation of an everolimus-eluting, poly-L-lactic acid-based bioresorbable scaffold system (ABSORB, Abbott Vascular, Santa Clara, CA, USA) in the world-wide greatest all-comers cohort will be evaluated in the prospective, non-interventional, multicenter German–Austrian ABSORB RegIstRy (GABI-R). GABI-R will include over 5000 patients from about 100 study sites in Austria and Germany. Safety endpoints such as cardiac death, myocardial infarction, and clinically driven percutaneous or surgical target lesion and vessel revascularization will be evaluated during hospitalization and in the follow-up period (minimum of 5 years). Conclusion: Although two randomized controlled trials and several registries have documented safety and efficacy as well as non-inferiority of this everolimus-eluting ABSORB device compared with drug-eluting metal stents, the current knowledge regarding clinical application, treatment success, and long-term safety of using this BRS in daily routine is limited. Thus, the goal of GABI-R is to address this lack of information. - Highlights: • The GABI-R addresses a lack of data about bioresorbable scaffolds in daily practice. • 5000 patients with minimal in- and exclusion criteria at 100 sites will

  9. Appendix C: safety design rationale

    International Nuclear Information System (INIS)

    Ghose, S.

    1985-01-01

    A brief discussion of the rationale for safety design of fusion plants is presented in the main text. Further detail safety considerations are presented in this appendix in the form of charts and tables. The author present some of the major safety criteria and other criteria used in blanket selection here

  10. The Danish Schizophrenia Registry

    DEFF Research Database (Denmark)

    Baandrup, Lone; Cerqueira, Charlotte; Haller, Lea

    2016-01-01

    Aim of database: To systematically monitor and improve the quality of treatment and care of patients with schizophrenia in Denmark. In addition, the database is accessible as a resource for research. Study population: Patients diagnosed with schizophrenia and receiving mental health care...... to the data for use in specific research projects by applying to the steering committee. Conclusion: The Danish Schizophrenia Registry represents a valuable source of informative data to monitor and improve the quality of care of patients with schizophrenia in Denmark. However, continuous resources and time...

  11. Contextualized B2B Registries

    OpenAIRE

    Radetzki, U; Boniface, M.J.; Surridge, M.

    2007-01-01

    Abstract. Service discovery is a fundamental concept underpinning the move towards dynamic service-oriented business partnerships. The business process for integrating service discovery and underlying registry technologies into busi-ness relationships, procurement and project management functions has not been examined and hence existing Web Service registries lack capabilities required by business today. In this paper we present a novel contextualized B2B registry that supports dynamic regist...

  12. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  13. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  14. Rationales for Commonly "Challenged" Taught Books.

    Science.gov (United States)

    Shugert, Diane P., Ed.; And Others

    1983-01-01

    Intended for teachers, this focused journal issue contains separate rationales for teaching books that have been challenged as appropriate instructional materials. Following a discussion of the purpose for rationales and suggestions for using them, the journal presents rationales for teaching the following books: "To Kill a Mockingbird,""The Diary…

  15. eRegistries: Electronic registries for maternal and child health.

    Science.gov (United States)

    Frøen, J Frederik; Myhre, Sonja L; Frost, Michael J; Chou, Doris; Mehl, Garrett; Say, Lale; Cheng, Socheat; Fjeldheim, Ingvild; Friberg, Ingrid K; French, Steve; Jani, Jagrati V; Kaye, Jane; Lewis, John; Lunde, Ane; Mørkrid, Kjersti; Nankabirwa, Victoria; Nyanchoka, Linda; Stone, Hollie; Venkateswaran, Mahima; Wojcieszek, Aleena M; Temmerman, Marleen; Flenady, Vicki J

    2016-01-19

    The Global Roadmap for Health Measurement and Accountability sees integrated systems for health information as key to obtaining seamless, sustainable, and secure information exchanges at all levels of health systems. The Global Strategy for Women's, Children's and Adolescent's Health aims to achieve a continuum of quality of care with effective coverage of interventions. The WHO and World Bank recommend that countries focus on intervention coverage to monitor programs and progress for universal health coverage. Electronic health registries - eRegistries - represent integrated systems that secure a triple return on investments: First, effective single data collection for health workers to seamlessly follow individuals along the continuum of care and across disconnected cadres of care providers. Second, real-time public health surveillance and monitoring of intervention coverage, and third, feedback of information to individuals, care providers and the public for transparent accountability. This series on eRegistries presents frameworks and tools to facilitate the development and secure operation of eRegistries for maternal and child health. In this first paper of the eRegistries Series we have used WHO frameworks and taxonomy to map how eRegistries can support commonly used electronic and mobile applications to alleviate health systems constraints in maternal and child health. A web-based survey of public health officials in 64 low- and middle-income countries, and a systematic search of literature from 2005-2015, aimed to assess country capacities by the current status, quality and use of data in reproductive health registries. eRegistries can offer support for the 12 most commonly used electronic and mobile applications for health. Countries are implementing health registries in various forms, the majority in transition from paper-based data collection to electronic systems, but very few have eRegistries that can act as an integrating backbone for health

  16. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  17. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  18. Danish National Lymphoma Registry

    DEFF Research Database (Denmark)

    Arboe, Bente; Josefsson, Pär; Jørgensen, Judit

    2016-01-01

    AIM OF DATABASE: The Danish National Lymphoma Registry (LYFO) was established in order to monitor and improve the diagnostic evaluation and the quality of treatment of all lymphoma patients in Denmark. STUDY POPULATION: The LYFO database was established in 1982 as a seminational database including...... all lymphoma patients referred to the departments of hematology. The database became nationwide on January 1, 2000. MAIN VARIABLES: The main variables include both clinical and paraclinical variables as well as details of treatment and treatment evaluation. Up to four forms are completed for each......-100 years) and a male/female ratio of 1.23:1. Patients can be registered with any of 42 different subtypes according to the World Health Organization classifications. CONCLUSION: LYFO is a nationwide database for all lymphoma patients in Denmark and includes detailed information. This information is used...

  19. Danish Prostate Cancer Registry

    DEFF Research Database (Denmark)

    Helgstrand, J Thomas; Klemann, Nina; Røder, Martin Andreas

    2016-01-01

    of SNOMED codes were identified. A computer algorithm was developed to transcode SNOMED codes into an analyzable format including procedure (eg, biopsy, transurethral resection, etc), diagnosis, and date of diagnosis. For validation, ~55,000 pathological reports were manually reviewed. Prostate-specific...... antigen, vital status, causes of death, and tumor-node-metastasis classification were integrated from national registries. RESULTS: Of the 161,525 specimens from 113,801 males identified, 83,379 (51.6%) were sets of prostate biopsies, 56,118 (34.7%) were transurethral/transvesical resections......BACKGROUND: Systematized Nomenclature of Medicine (SNOMED) codes are computer-processable medical terms used to describe histopathological evaluations. SNOMED codes are not readily usable for analysis. We invented an algorithm that converts prostate SNOMED codes into an analyzable format. We...

  20. Blood irradiation: Rationale and technique

    International Nuclear Information System (INIS)

    Lewis, M.C.

    1990-01-01

    Upon request by the local American Red Cross, the Savannah Regional Center for Cancer Care irradiates whole blood or blood components to prevent post-transfusion graft-versus-host reaction in patients who have severely depressed immune systems. The rationale for blood irradiation, the total absorbed dose, the type of patients who require irradiated blood, and the regulations that apply to irradiated blood are presented. A method of irradiating blood using a linear accelerator is described

  1. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  2. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  3. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  4. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  5. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  6. Danish Hip Arthroscopy Registry (DHAR)

    DEFF Research Database (Denmark)

    Lund, Bent; Mygind-Klavsen, Bjarne; Grønbech Nielsen, Torsten

    2017-01-01

    The Danish Hip Arthroscopy Registry (DHAR) was initiated in January 2012 as a web-based prospective registry. The purpose of this study was to evaluate and report the first registry based outcome data of a national population with radiological and clinical femoroacetabular impingement (FAI......) data from DHAR between January 2012 and November 2015 were extracted. Radiological pincer-type FAI was defined as LCE > 35° and cam FAI as alpha-angle > 55°. These data were combined with FAI surgical data such as osteochondroplasty and labral repair or resection. PROMs consisting of HAGOS, EQ-5 D...

  7. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  8. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  9. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  10. Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study

    DEFF Research Database (Denmark)

    Jiang, Lijun; Meng, Weizhi; Wang, Michael Yu

    2017-01-01

    ) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen information and the user inputs during the charging process. The rationale is that users’ information can be leaked through a standard micro USB connector...... that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of charging attack, we focus on JFC attack in this paper, and investigate for the first time the energy consumption, especially CPU usage caused by JFC attack. In particular, we conduct a user study with over 500...... participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate more research on charging...

  11. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  12. Review of patient registries in dermatology.

    Science.gov (United States)

    DiMarco, Gabriella; Hill, Dane; Feldman, Steven R

    2016-10-01

    Patient registries are datasets containing information on patients with a particular disease or patients who are undergoing a specific treatment. Our objective was to search for and catalog the types of registries being used in dermatology and investigate their characteristics and uses. We searched Google, the Registry of Patient Registries, Orphanet, and ClinicalTrials.gov to compile a list of dermatology disease registries. We also conducted a literature review on the uses of dermatology registries using PubMed. We identified 48 dermatology patient registries, with 23 distinct diseases represented. We also identified 11 registries used for postmarketing surveillance of skin disease. Our search was limited to registries in English. Registries are commonly used for the study of rare dermatologic diseases and for postsurveillance monitoring of systemic therapies in more common dermatologic diseases, such as psoriasis. Copyright © 2016 American Academy of Dermatology, Inc. Published by Elsevier Inc. All rights reserved.

  13. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  14. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  15. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  16. Rationale and methods of the EFCOSUM project

    NARCIS (Netherlands)

    Brussaard, J.H.; Johansson, L.; Kearney, J.

    2002-01-01

    Objective: To describe the rationale and methods for a European project (EFCOSUM) to develop a method for a European food consumption survey that delivers internationally comparable data on a set of policy-relevant nutritional indicators. Rationale and methods: Currently Member States are collecting

  17. The value of trauma registries.

    Science.gov (United States)

    Moore, Lynne; Clark, David E

    2008-06-01

    Trauma registries are databases that document acute care delivered to patients hospitalised with injuries. They are designed to provide information that can be used to improve the efficiency and quality of trauma care. Indeed, the combination of trauma registry data at regional or national levels can produce very large databases that allow unprecedented opportunities for the evaluation of patient outcomes and inter-hospital comparisons. However, the creation and upkeep of trauma registries requires a substantial investment of money, time and effort, data quality is an important challenge and aggregated trauma data sets rarely represent a population-based sample of trauma. In addition, trauma hospitalisations are already routinely documented in administrative hospital discharge databases. The present review aims to provide evidence that trauma registry data can be used to improve the care dispensed to victims of injury in ways that could not be achieved with information from administrative databases alone. In addition, we will define the structure and purpose of contemporary trauma registries, acknowledge their limitations, and discuss possible ways to make them more useful.

  18. Danish Hip Arthroscopy Registry (DHAR)

    DEFF Research Database (Denmark)

    Lund, Bent; Mygind-Klavsen, Bjarne; Grønbech Nielsen, Torsten

    2017-01-01

    The Danish Hip Arthroscopy Registry (DHAR) was initiated in January 2012 as a web-based prospective registry. The purpose of this study was to evaluate and report the first registry based outcome data of a national population with radiological and clinical femoroacetabular impingement (FAI......) undergoing hip arthroscopic treatment. Our primary hypothesis was that patients undergoing hip arthroscopy would improve significantly in pain, quality of life and sports related outcome measurements in Patient Related Outcome Measures (PROM). Peri-operative data and Patient Reported Outcome Measures (PROM......-5 D demonstrated improvement after 1 and 2 years from 0.66 pre-op to 0.78 at 2 years. HSAS improved significantly from 2.5 to 3.3. Pain score data demonstrated improvement in NRS-rest 39 to 17 and NRS Walk 49 to 22 at follow-up. We conclude that patients with FAI undergoing hip arthroscopy...

  19. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  20. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  1. Safety and long-term effects of renal denervation: Rationale and design of the Dutch registry

    NARCIS (Netherlands)

    Sanders, M.F.; Blankestijn, P.J.; Voskuil, M.; Spiering, W.; Vonken, E.J.; Rotmans, J.I.; Hoeven, B.L. van der; Daemen, J.; Meiracker, A.H. van den; Kroon, A.A.; Haan, M.W. de; Das, M.; Bax, M.; Meer, I.M. van der; Overhagen, H. van; Born, B.J. van den; Brussel, P.M. van; Valk, P.H. van der; Gregoor, P.J. Smak; Meuwissen, M.; Gomes, M.E.; Ophuis, T. Oude; Troe, E.; Tonino, W.A.; Konings, C.J.; Vries, P.A. de; Balen, A. van; Heeg, J.E.; Smit, J.J.; Elvan, A.; Steggerda, R.; Niamut, S.M.; Peels, J.O.; Swart, J.B. de; Wardeh, A.J.; Groeneveld, J.H.; Linden, E. van der; Hemmelder, M.H.; Folkeringa, R.; Stoel, M.G.; Kant, G.D.; Herrman, J.P.; Wissen, S. van; Deinum, J.; Westra, S.W.; Aengevaeren, W.R.; Parlevliet, K.J.; Schramm, A.; Jessurun, G.A.; Rensing, B.J.; Winkens, M.H.; Wierema, T.K.; Santegoets, E.; Lipsic, E.; Houwerzijl, E.; Kater, M.; Allaart, C.P.; Nap, A.; Bots, M.L.

    2016-01-01

    BACKGROUND: Percutaneous renal denervation (RDN) has recently been introduced as a treatment for therapyresistant hypertension. Also, it has been suggested that RDN may be beneficial for other conditions characterised by increased sympathetic nerve activity. There are still many uncertainties with

  2. Safety and long-term effects of renal denervation : Rationale and design of the Dutch registry

    NARCIS (Netherlands)

    Sanders, M. F.; Blankestijn, P. J.; Voskuil, M.; Spiering, W.; Vonken, E. J.; Rotmans, J. I.; van der Hoeven, B. L.; Daemen, J.; van den Meiracker, A. H.; Kroon, A. A.; de Haan, M.W.; Das, M.; Bax, M.; van der Meer, I. M.; van Overhagen, H.; van den Born, B. J H; van Brussel, P. M.; van der Valk, P.H.M.; Smak Gregoor, P. J H; Meuwissen, M.; Gomes, M. E R; Oude Ophuis, T.; Troe, E.; Tonino, W. A L; Konings, C. J A M; de Vries, P. A M; van Balen, A.; Heeg, J. E.; Smit, J. J J; Elvan, A.; Steggerda, R.; Niamut, S. M L; Peels, J. O J; de Swart, J. B R M; Wardeh, A. J.; Groeneveld, J. H M; van der Linden, E.; Hemmelder, M. H.; Folkeringa, R.; Stoel, M. G.; Kant, G. D.; Herrman, J. P R; van Wissen, S.; Deinum, J.; Westra, S. W.; Aengevaeren, W. R M; Parlevliet, K. J.; Schramm, A.; Jessurun, G. A J; Rensing, B. J W M; Winkens, M. H M; Wierema, T. K A; Santegoets, E.; Lipsic, E.; Houwerzijl, E.; Kater, M.; Allaart, C. P.; Nap, A.; Bots, M. L.

    BACKGROUND: Percutaneous renal denervation (RDN) has recently been introduced as a treatment for therapy-resistant hypertension. Also, it has been suggested that RDN may be beneficial for other conditions characterised by increased sympathetic nerve activity. There are still many uncertainties with

  3. Safety and long-term effects of renal denervation : Rationale and design of the Dutch registry

    NARCIS (Netherlands)

    Sanders, M. F.; Blankestijn, P. J.; Voskuil, M.; Spiering, W.; Vonken, E. J.; Rotmans, J. I.; van der Hoeven, B. L.; Daemen, J.; van den Meiracker, A. H.; Kroon, A. A.; de Haan, M. W.; Das, M.; Bax, M.; van der Meer, I. M.; van Overhagen, H.; van den Born, B. J. H.; van Brussel, P. M.; van der Valk, P. H. M.; Gregoor, P. J. H. Smak; Meuwissen, M.; Gomes, M. E. R.; Ophuis, T. Oude; Troe, E.; Tonino, W. A. L.; Konings, C. J. A. M.; de Vries, P. A. M.; van Balen, A.; Heeg, J. E.; Smit, J. J. J.; Elvan, A.; Steggerda, R.; Niamut, S. M. L.; Peels, J. O. J.; de Swart, J. B. R. M.; Wardeh, A. J.; Groeneveld, J. H. M.; van der Linden, E.; Hemmelder, M. H.; Folkeringa, R.; Stoel, M. G.; Kant, G. D.; Herrman, J. P. R.; van Wissen, S.; Deinum, J.; Westra, S. W.; Aengevaeren, W. R. M.; Parlevliet, K. J.; Schramm, A.; Jessurun, G. A. J.; Rensing, B. J. W. M.; Winkens, M. H. M.; Wierema, T. K. A.; Santegoets, E.; Lipsic, E.; Houwerzijl, E.; Kater, M.; Allaart, C. P.; Nap, A.; Bots, M. L.

    Background: Percutaneous renal denervation (RDN) has recently been introduced as a treatment for therapy-resistant hypertension. Also, it has been suggested that RDN may be beneficial for other conditions characterised by increased sympathetic nerve activity. There are still many uncertainties with

  4. Safety and long-term effects of renal denervation: Rationale and design of the Dutch registry

    NARCIS (Netherlands)

    Sanders, M. F.; Blankestijn, P. J.; Voskuil, M.; Spiering, W.; Vonken, E. J.; Rotmans, J. I.; van der Hoeven, B. L.; Daemen, J.; van den Meiracker, A. H.; Kroon, A. A.; de Haan, M. W.; Das, M.; Bax, M.; van der Meer, I. M.; van Overhagen, H.; van den Born, B. J. H.; van Brussel, P. M.; van der Valk, P. H. M.; Smak Gregoor, P. J. H.; Meuwissen, M.; Gomes, M. E. R.; Oude Ophuis, T.; Troe, E.; Tonino, W. A. L.; Konings, C. J. A. M.; de Vries, P. A. M.; van Balen, A.; Heeg, J. E.; Smit, J. J. J.; Elvan, A.; Steggerda, R.; Niamut, S. M. L.; Peels, J. O. J.; de Swart, J. B. R. M.; Wardeh, A. J.; Groeneveld, J. H. M.; van der Linden, E.; Hemmelder, M. H.; Folkeringa, R.; Stoel, M. G.; Kant, G. D.; Herrman, J. P. R.; van Wissen, S.; Deinum, J.; Westra, S. W.; Aengevaeren, W. R. M.; Parlevliet, K. J.; Schramm, A.; Jessurun, G. A. J.; Rensing, B. J. W. M.; Winkens, M. H. M.; Wierema, T. K. A.; Santegoets, E.; Lipsic, E.; Houwerzijl, E.; Kater, M.; Allaart, C. P.; Nap, A.; Bots, M. L.

    2016-01-01

    Percutaneous renal denervation (RDN) has recently been introduced as a treatment for therapy-resistant hypertension. Also, it has been suggested that RDN may be beneficial for other conditions characterised by increased sympathetic nerve activity. There are still many uncertainties with regard to

  5. Plasma Exchange in Severe Attacks of Neuromyelitis Optica

    Directory of Open Access Journals (Sweden)

    Mickael Bonnan

    2012-01-01

    Full Text Available Background. Neuromyelitis optica (NMO attacks are poorly controlled by steroids and evolve in stepwise neurological impairments. Assuming the strong humoral response underlying NMO attacks, plasma exchange (PLEX is an appropriate technique in severe NMO attacks. Objective. Presenting an up-to-date review of the literature of PLEX in NMO. Methods. We summarize the rationale of PLEX in relation with the physiology of NMO, the main technical aspects, and the available studies. Results. PLEX in severe attacks from myelitis or optic neuritis are associated with a better outcome, depending on PLEX delay (“time is cord and eyes”. NMO-IgG status has no influence. Finally, we build up an original concept linking the inner dynamic of the lesion, the timing of PLEX onset and the expected clinical results. Conclusion. PLEX is a safe and efficient add-on therapy in NMO, in synergy with steroids. Large therapeutic trials are required to definitely assess the procedure and define the time opportunity window.

  6. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  7. Environmental Agents Service (EAS) Registry System of Records

    Data.gov (United States)

    Department of Veterans Affairs — The Environmental Agent Service (EAS) Registries is the information system encompassing the Ionizing Radiation Registry (IRR), the Agent Orange Registry (AOR), and...

  8. CIRSE Vascular Closure Device Registry

    NARCIS (Netherlands)

    Reekers, Jim A.; Müller-Hülsbeck, Stefan; Libicher, Martin; Atar, Eli; Trentmann, Jens; Goffette, Pierre; Borggrefe, Jan; Zeleňák, Kamil; Hooijboer, Pieter; Belli, Anna-Maria

    2011-01-01

    Vascular closure devices are routinely used after many vascular interventional radiology procedures. However, there have been no major multicenter studies to assess the safety and effectiveness of the routine use of closure devices in interventional radiology. The CIRSE registry of closure devices

  9. The danish multiple sclerosis registry

    DEFF Research Database (Denmark)

    Brønnum-Hansen, Henrik; Koch-Henriksen, Nils; Stenager, Egon

    2011-01-01

    Introduction: The Danish Multiple Sclerosis (MS) Registry was established in 1956. Content: The register comprises data on all Danes who had MS in 1949 or who have been diagnosed since. Data on new cases and updated information on persons with an MS diagnosis already notified are continuously...

  10. JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones

    DEFF Research Database (Denmark)

    Meng, Weizhi; Jiang, Lijun; Wang, Yu

    2017-01-01

    Smartphones have become necessities in people' lives, so that many more public charging stations are under deployment worldwide to meet the increasing demand of phone charging (i.e., in airports, subways, shops, etc). However, this situation may expose a hole for cyber-criminals to launch various...... attacks especially charging attacks and threaten user's privacy. As an example, juice filming charging (JFC) attack is able to steal users' sensitive and private information from both Android OS and iOS devices, through automatically recording phone-screen and monitoring users' inputs during the whole...... charging period. More importantly, this attack does not need any permission or installing any pieces of apps on user's side. The rationale is that users' information can be leaked through a standard micro USB connector that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential...

  11. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  12. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  13. Agency for Toxic Substances and Disease Registry

    Science.gov (United States)

    ... Z # Search Form Controls Search The CDC submit Agency for Toxic Substances and Disease Registry Note: Javascript ... gov . Recommend on Facebook Tweet Share Compartir The Agency for Toxic Substances and Disease Registry (ATSDR) , based ...

  14. Registries Help Moms Measure Medication Risks

    Science.gov (United States)

    ... in the case of the North American Antiepileptic Drug Pregnancy Registry, which studies the effects of drugs for ... is taking. For example, the North American Antiepileptic Drug Pregnancy Registry website lists more than 30 medications being ...

  15. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  16. Using design rationale to improve SPL traceability

    NARCIS (Netherlands)

    Galvao, I.; Aksit, Mehmet; van den Broek, P.M.; Hendriks, M.F.H.; Rashid, Awais; Royer, Jean-Claude; Rummler, Andreas

    In order to improve SPL traceability by using design rationale, this chapter introduces the traceability analysis framework (TAF), which, when combined with the AMPLE Traceability Framework, provides extra traceability capabilities for variability management. The TAF is a programmable and extensible

  17. Bioethics: A Rationale and a Model

    Science.gov (United States)

    Barman, Charles R.; Rusch, John J.

    1978-01-01

    Discusses the rationale for and development of an undergraduate bioethics course. Based on experiences with the course, general suggestions are offered to instructors planning to add bioethics to existing curricula. (MA)

  18. New Rationales for Women on Boards

    OpenAIRE

    Choudhury, B.

    2014-01-01

    Should measures promoting women to corporate boards be solely justified in terms of economic arguments? Traditionally, such measures have tended to rely on utilitarian arguments, despite the fact that the most prominent of these arguments—the relationship between women’s presence on boards and firm financial performance—is equivocal. Conversely, this article argues that rationales for increasing women on boards should be based on both equality and economics grounds. An equality rationale is n...

  19. Registries in European post-marketing surveillance

    DEFF Research Database (Denmark)

    Bouvy, Jacoline C; Blake, Kevin; Slattery, Jim

    2017-01-01

    at gaining further insight into the European Medicines Agency's (EMA) requests for new registries and registry studies using existing registries and to review the experience gained in their conduct. METHODS: European Public Assessment Reports were consulted to identify products for which a request...

  20. Army Fixed-Wing Ground Attack Aircraft: A Historical Precedent and Contemporary Rationale

    Science.gov (United States)

    2015-06-12

    retreated.83 Generaloberst Alfred Jodl, chief of Wehrmacht operations, later stated, “We still had lots of material and sent it to the front in...Michael J. Chandler , LTC, USAF, “Gen Otto P. Weyland, USAF-Close Air Support in the Korean War” (Master’s thesis, School of Advanced Air and Space

  1. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  2. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  3. Registry of patients with stroke stated in a public hospital of Peru, 2000-2009

    OpenAIRE

    Castañeda-Guarderas, Ana; Conocimiento y Evidencia (CONEVID), Universidad Peruana Cayetano Heredia. Lima, Perú. Médico Cirujano.; Beltrán-Ale, Guillermo; Conocimiento y Evidencia (CONEVID), Universidad Peruana Cayetano Heredia. Lima, Perú. Médico Cirujano.; Casma-Bustamante, Renzo; Conocimiento y Evidencia (CONEVID), Universidad Peruana Cayetano Heredia. Lima, Perú. Médico Cirujano.; Ruíz-Grosso, Paulo; Conocimiento y Evidencia (CONEVID), Universidad Peruana Cayetano Heredia. Lima, Perú. Grupo de Trabajo en Salud Mental, Universidad Peruana Cayetano Heredia. Lima, Perú. Médico Cirujano.; Málaga, Germán; Conocimiento y Evidencia (CONEVID), Universidad Peruana Cayetano Heredia. Lima, Perú. Centro de Excelencia en Enfermedades Crónicas (CRONICAS), Universidad Peruana Cayetano Heredia. Lima, Perú. Departamento de Medicina, Universidad Peruana Cayetano Heredia. Lima, Perú. Médico Internista, Magíster en Medicina.

    2014-01-01

    We performed a descriptive study taking on account the characteristics of the registries of the patients hospitalized at the Hospital Nacional Cayetano Heredia between the years 2000 and 2009 with stroke as hospitalization diagnosis. 2225 records were obtained from patients older than 18, with stroke. According to ICD-10, 1071 had diagnosis of ischemic stroke, 554 were hemorrhagic, 183 were subarachnoid hemorrhage, 49 were ischemic plus hemorrhagic, 10 were transient ischemic attack (TIA)...

  4. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  5. The Danish Lung Cancer Registry

    DEFF Research Database (Denmark)

    Jakobsen, Erik; Rasmussen, Torben Riis

    2016-01-01

    AIM OF DATABASE: The Danish Lung Cancer Registry (DLCR) was established by the Danish Lung Cancer Group. The primary and first goal of the DLCR was to improve survival and the overall clinical management of Danish lung cancer patients. STUDY POPULATION: All Danish primary lung cancer patients since...... 2000 are included into the registry and the database today contains information on more than 50,000 cases of lung cancer. MAIN VARIABLES: The database contains information on patient characteristics such as age, sex, diagnostic procedures, histology, tumor stage, lung function, performance...... the results are commented for local, regional, and national audits. Indicator results are supported by descriptive reports with details on diagnostics and treatment. CONCLUSION: DLCR has since its creation been used to improve the quality of treatment of lung cancer in Denmark and it is increasingly used...

  6. CIRSE Vascular Closure Device Registry

    International Nuclear Information System (INIS)

    Reekers, Jim A.; Müller-Hülsbeck, Stefan; Libicher, Martin; Atar, Eli; Trentmann, Jens; Goffette, Pierre; Borggrefe, Jan; Zeleňák, Kamil; Hooijboer, Pieter; Belli, Anna-Maria

    2011-01-01

    Purpose: Vascular closure devices are routinely used after many vascular interventional radiology procedures. However, there have been no major multicenter studies to assess the safety and effectiveness of the routine use of closure devices in interventional radiology. Methods: The CIRSE registry of closure devices with an anchor and a plug started in January 2009 and ended in August 2009. A total of 1,107 patients were included in the registry. Results: Deployment success was 97.2%. Deployment failure specified to access type was 8.8% [95% confidence interval (95% CI) 5.0–14.5] for antegrade access and 1.8% (95% CI 1.1–2.9) for retrograde access (P = 0.001). There was no difference in deployment failure related to local PVD at the access site. Calcification was a reason for deployment failure in only 5.9 cm, and two vessel occlusions. Conclusion: The conclusion of this registry of closure devices with an anchor and a plug is that the use of this device in interventional radiology procedures is safe, with a low incidence of serious access site complications. There seems to be no difference in complications between antegrade and retrograde access and other parameters.

  7. CIRSE Vascular Closure Device Registry

    Science.gov (United States)

    Müller-Hülsbeck, Stefan; Libicher, Martin; Atar, Eli; Trentmann, Jens; Goffette, Pierre; Borggrefe, Jan; Zeleňák, Kamil; Hooijboer, Pieter; Belli, Anna-Maria

    2010-01-01

    Purpose Vascular closure devices are routinely used after many vascular interventional radiology procedures. However, there have been no major multicenter studies to assess the safety and effectiveness of the routine use of closure devices in interventional radiology. Methods The CIRSE registry of closure devices with an anchor and a plug started in January 2009 and ended in August 2009. A total of 1,107 patients were included in the registry. Results Deployment success was 97.2%. Deployment failure specified to access type was 8.8% [95% confidence interval (95% CI) 5.0–14.5] for antegrade access and 1.8% (95% CI 1.1–2.9) for retrograde access (P = 0.001). There was no difference in deployment failure related to local PVD at the access site. Calcification was a reason for deployment failure in only 5.9 cm, and two vessel occlusions. Conclusion The conclusion of this registry of closure devices with an anchor and a plug is that the use of this device in interventional radiology procedures is safe, with a low incidence of serious access site complications. There seems to be no difference in complications between antegrade and retrograde access and other parameters. PMID:20981425

  8. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  9. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  10. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  11. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  12. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  13. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  14. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  15. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  16. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  17. Design and rationale of dabigatran's stroke prevention in real life in Turkey (D-SPIRIT).

    Science.gov (United States)

    Türk, Uğur Önsel; Alioğlu, Emin; Tunçer, Eşref; Özpelit, Mehmet Emre; Pekel, Nihat; Tengiz, İstemihan; Çetin, Nurullah; Dalgıç, Onur; Topaloğlu, Caner; Bilgin, Nazile; Altın, Cihan; Özdemirkıran, Tolga; Tülüce, Kamil; Türkoğlu, Ebru İpek; Özpelit, Ebru

    2016-04-01

    The D-SPIRIT registry is designed to investigate the safety and efficacy of dabigatran etexilate in patients with nonvalvular atrial fibrillation (NVAF) and to collect data on outcomes in clinical practice. The D-SPIRIT is a national, prospective, observational, post-marketing registry involving patients with NVAF who have been taking dabigatran etexilate therapy for stroke prevention for a minimum of 6 months prior to enrollment. The registry will collect and analyze data from routine care, enrolling up to 600 patients in 9 centers. Patients will be followed up for 2 years to evaluate effectiveness and safety. A sample size of 600 subjects is proposed based on the following assumptions; Two-sided significance level of 0.05 (1-sided significance level of 0.025), ischemic stroke incidence rate of 0.768%-1.111%, hemorrhagic stroke incidence rate of 0.109%-0.130%, transient ischemic attack incidence rate of 0.722%-0.623%, therapy discontinuation incidence rate of 40% at day 730, and duration of enrollment period of 12 months with non-uniformed enrollment rate. Ethics approval was given by Dokuz Eylül University Ethics Committee of Clinical Research (2014/54) and approved by the Turkish Ministry of Health. Potential results of D-SPIRIT registry will add data from clinical practice to those from the RE-LY trial to expand knowledge of dabigatran etexilate treatment in patients with NVAF.

  18. The Danish Heart Failure Registry

    DEFF Research Database (Denmark)

    Schjødt, Inge; Nakano, Anne; Egstrup, Kenneth

    2016-01-01

    AIM OF DATABASE: The aim of the Danish Heart Failure Registry (DHFR) is to monitor and improve the care of patients with incident heart failure (HF) in Denmark. STUDY POPULATION: The DHFR includes inpatients and outpatients (≥18 years) with incident HF. Reporting to the DHFR is mandatory......: The main variables recorded in the DHFR are related to the indicators for quality of care in patients with incident HF: performance of echocardiography, functional capacity (New York Heart Association functional classification), pharmacological therapy (angiotensin converting enzyme/angiotensin II...

  19. The Danish National Prescription Registry

    DEFF Research Database (Denmark)

    Kildemoes, Helle Wallach; Toft Sørensen, Henrik; Hallas, Jesper

    2011-01-01

    Introduction: Individual-level data on all prescription drugs sold in Danish community pharmacies has since 1994 been recorded in the Register of Medicinal Products Statistics of the Danish Medicines Agency. Content: The register subset, termed the Danish National Prescription Registry (DNPR......), contains information on dispensed prescriptions, including variables at the level of the drug user, the prescriber, and the pharmacy. Validity and coverage: Reimbursement-driven record keeping, with automated bar-code-based data entry provides data of high quality, including detailed information...

  20. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  1. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  2. Immunization registries in the EMR Era

    Science.gov (United States)

    Stevens, Lindsay A.; Palma, Jonathan P.; Pandher, Kiran K.; Longhurst, Christopher A.

    2013-01-01

    Background: The CDC established a national objective to create population-based tracking of immunizations through regional and statewide registries nearly 2 decades ago, and these registries have increased coverage rates and reduced duplicate immunizations. With increased adoption of commercial electronic medical records (EMR), some institutions have used unidirectional links to send immunization data to designated registries. However, access to these registries within a vendor EMR has not been previously reported. Purpose: To develop a visually integrated interface between an EMR and a statewide immunization registry at a previously non-reporting hospital, and to assess subsequent changes in provider use and satisfaction. Methods: A group of healthcare providers were surveyed before and after implementation of the new interface. The surveys addressed access of the California Immunization Registry (CAIR), and satisfaction with the availability of immunization information. Information Technology (IT) teams developed a “smart-link” within the electronic patient chart that provides a single-click interface for visual integration of data within the CAIR database. Results: Use of the tool has increased in the months since its initiation, and over 20,000 new immunizations have been exported successfully to CAIR since the hospital began sharing data with the registry. Survey data suggest that providers find this tool improves workflow and overall satisfaction with availability of immunization data. (p=0.009). Conclusions: Visual integration of external registries into a vendor EMR system is feasible and improves provider satisfaction and registry reporting. PMID:23923096

  3. On Domain Registries and Website Content

    DEFF Research Database (Denmark)

    Schwemer, Sebastian Felix

    2018-01-01

    such as Internet access service providers, hosting platforms, and websites that link to content. This article shows that in recent years, however, that the (secondary) liability of domain registries and registrars, and more specifically country code top-level domain registries (ccTLDs) for website content, has...... been tested in several EU Member States. The article investigates tendencies in the national lower-court jurisprudence and explores to what extent the liability exemption regime of the E-Commerce Directive applies to domain registries. The analysis concludes that whereas domain registries fall under...

  4. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  5. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  6. Teacher Grading Decisions: Influences, Rationale, and Practices

    Science.gov (United States)

    Kunnath, Joshua P.

    2017-01-01

    This mixed-methods study applied a decision-making theoretical framework to an investigation of teacher grading in a large urban school district in California. A sample of 251 high school teachers of core subjects were surveyed, and 15 teachers participated in four focus group interviews in order provide data on the influences, rationale, and…

  7. Rationales for the Lightning Launch Commit Criteria

    Science.gov (United States)

    Willett, John C. (Editor); Merceret, Francis J. (Editor); Krider, E. Philip; O'Brien, T. Paul; Dye, James E.; Walterscheid, Richard L.; Stolzenburg, Maribeth; Cummins, Kenneth; Christian, Hugh J.; Madura, John T.

    2016-01-01

    Since natural and triggered lightning are demonstrated hazards to launch vehicles, payloads, and spacecraft, NASA and the Department of Defense (DoD) follow the Lightning Launch Commit Criteria (LLCC) for launches from Federal Ranges. The LLCC were developed to prevent future instances of a rocket intercepting natural lightning or triggering a lightning flash during launch from a Federal Range. NASA and DoD utilize the Lightning Advisory Panel (LAP) to establish and develop robust rationale from which the criteria originate. The rationale document also contains appendices that provide additional scientific background, including detailed descriptions of the theory and observations behind the rationales. The LLCC in whole or part are used across the globe due to the rigor of the documented criteria and associated rationale. The Federal Aviation Administration (FAA) adopted the LLCC in 2006 for commercial space transportation and the criteria were codified in the FAA's Code of Federal Regulations (CFR) for Safety of an Expendable Launch Vehicle (Appendix G to 14 CFR Part 417, (G417)) and renamed Lightning Flight Commit Criteria in G417.

  8. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  9. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  10. The Danish adult diabetes registry

    DEFF Research Database (Denmark)

    Jørgensen, Marit Eika; Kristensen, Jette K.; Husted, Gitte Reventlov

    2016-01-01

    Aim of the database: The aim of the Danish Adult Diabetes Registry (DADR) is to provide data from both the primary health care sector (general practice [GP]) and the secondary sector (specialized outpatient clinics) to assess the quality of treatment given to patients with diabetes. The indicators...... represent process and outcome indicators selected from the literature. Study population: The total diabetes population in Denmark is estimated to be ∼300,000 adult diabetes patients. Approximately 10% have type 1 diabetes, which is managed mainly in the secondary sector, and 90% have type 2 diabetes......, glucose-, blood pressure-, and lipid-lowering treatment (yes/no), insulin pump treatment (yes/ no), and date of last eye and foot examination. Descriptive data: In 2014, the annual report included data regarding over 38,000 patients from outpatient clinics, which is assumed to have included almost all...

  11. The Danish National Chronic Lymphocytic Leukemia Registry

    DEFF Research Database (Denmark)

    da Cunha-Bang, Caspar; Geisler, Christian Hartmann; Enggaard, Lisbeth

    2016-01-01

    AIM: In 2008, the Danish National Chronic Lymphocytic Leukemia Registry was founded within the Danish National Hematology Database. The primary aim of the registry is to assure quality of diagnosis and care of patients with chronic lymphocytic leukemia (CLL) in Denmark. Secondarily, to evaluate...

  12. Service registry design: an information service approach

    NARCIS (Netherlands)

    Ferreira Pires, Luis; Wang, J.; van Oostrum, Arjen; Wijnhoven, Alphonsus B.J.M.

    2010-01-01

    A service registry is a Service-Oriented Architecture (SOA) component that keeps a ‘catalogue’ of available services. It stores service specifications so that these specifications can be found by potential users. Discussions on the design of service registries currently focus on technical issues,

  13. Windows registry forensics advanced digital forensic analysis of the Windows registry

    CERN Document Server

    Carvey, Harlan

    2011-01-01

    Harlan Carvey brings readers an advanced book on Windows Registry - the most difficult part of Windows to analyze in forensics! Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. This book also has a DVD containing tools, instructions and videos.

  14. Clinical disease registries in acute myocardial infarction.

    Science.gov (United States)

    Ashrafi, Reza; Hussain, Hussain; Brisk, Robert; Boardman, Leanne; Weston, Clive

    2014-06-26

    Disease registries, containing systematic records of cases, have for nearly 100 years been valuable in exploring and understanding various aspects of cardiology. This is particularly true for myocardial infarction, where such registries have provided both epidemiological and clinical information that was not readily available from randomised controlled trials in highly-selected populations. Registries, whether mandated or voluntary, prospective or retrospective in their analysis, have at their core a common study population and common data definitions. In this review we highlight how registries have diversified to offer information on epidemiology, risk modelling, quality assurance/improvement and original research-through data mining, transnational comparisons and the facilitation of enrolment in, and follow-up during registry-based randomised clinical trials.

  15. Specialization in i* strategic rationale diagrams

    OpenAIRE

    López Cuesta, Lidia; Franch Gutiérrez, Javier; Marco Gómez, Jordi

    2012-01-01

    ER 2012 Best Student Paper Award The specialization relationship is offered by the i* modeling language through the is-a construct defined over actors (a subactor is-a superactor). Although the overall meaning of this construct is highly intuitive, its semantics when it comes to the fine-grained level of strategic rationale (SR) diagrams is not defined, hampering seriously its appropriate use. In this paper we provide a formal definition of the specialization relationship at the lev...

  16. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  17. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  18. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  19. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  20. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  1. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  2. The Western Denmark Cardiac Computed Tomography Registry

    DEFF Research Database (Denmark)

    Nielsen, Lene Hüche; Nørgaard, Bjarne Linde; Tilsted, Hans-Henrik

    2014-01-01

    BACKGROUND: As a subregistry to the Western Denmark Heart Registry (WDHR), the Western Denmark Cardiac Computed Tomography Registry (WDHR-CCTR) is a clinical database established in 2008 to monitor and improve the quality of cardiac computed tomography (CT) in Western Denmark. OBJECTIVE: We...... examined the content, data quality, and research potential of the WDHR-CCTR. METHODS: We retrieved 2008-2012 data to examine the 1) content; 2) completeness of procedure registration using the Danish National Patient Registry as reference; 3) completeness of variable registration comparing observed vs...

  3. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  4. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  5. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  6. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  7. EPA Facility Registry Service (FRS): RADINFO

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  8. EPA Facility Registry Service (FRS): NEI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  9. EPA Facility Registry Service (FRS): BIA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  10. EPA Facility Registry Service (FRS): BRAC

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  11. EPA Facility Registry Service (FRS): NCDB

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  12. Substance Identification Information from EPA's Substance Registry

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Substance Registry Services (SRS) is the authoritative resource for basic information about substances of interest to the U.S. EPA and its state and tribal...

  13. Assessing Ontario's Personal Support Worker Registry

    Directory of Open Access Journals (Sweden)

    Audrey Laporte

    2013-08-01

    Full Text Available In response to the growing role of personal support workers (PSWs in the delivery of health care services to Ontarians, the Ontario government has moved forward with the creation of a PSW registry. This registry will be mandatory for all PSWs employed by publicly funded health care employers, and has the stated objectives of better highlighting the work that PSWs do in Ontario, providing a platform for PSWs and employers to more easily access the labour market, and to provide government with information for human resources planning. In this paper we consider the factors that brought the creation of a PSW registry onto the Ontario government’s policy agenda, discuss how the registry is being implemented, and provide an analysis of the strengths and weaknesses of this policy change.

  14. Veterans Affairs Central Cancer Registry (VACCR)

    Data.gov (United States)

    Department of Veterans Affairs — The Veterans Affairs Central Cancer Registry (VACCR) receives and stores information on cancer diagnosis and treatment constraints compiled and sent in by the local...

  15. EPA Linked Open Data: Facility Registry Service

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Facility Registry Service (FRS) identifies facilities, sites, or places subject to environmental regulation or of environmental interest to EPA programs or...

  16. Linking Medicare, Medicaid, and Cancer Registry Data...

    Data.gov (United States)

    U.S. Department of Health & Human Services — Linking Medicare, Medicaid, and Cancer Registry Data to Study the Burden of Cancers in West Virginia In the United States, the elderly carry an unequal burden of...

  17. EPA Facility Registry Service (FRS): TRI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  18. EPA Facility Registry Service (FRS): ICIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  19. EPA Facility Registry Service (FRS): OIL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link to the Oil...

  20. EPA Facility Registry Service (FRS): RBLC

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  1. EPA Facility Registry Service (FRS): ACRES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of sites that link to...

  2. EPA Facility Registry System (FRS): NCES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  3. EPA Facility Registry Service (FRS): LANDFILL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of non-hazardous waste...

  4. EPA Linked Open Data: Substance Registry Service

    Data.gov (United States)

    U.S. Environmental Protection Agency — Substance Registry Services (SRS) is the Environmental Protection Agency's (EPA) central system for information about substances that are tracked or regulated by EPA...

  5. EPA Facility Registry Service (FRS): CAMDBS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  6. EPA Facility Registry System (FRS): NEPT

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  7. EPA Facility Registry Service (FRS): SDWIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  8. EPA Facility Registry Service (FRS): RCRA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of hazardous waste...

  9. EPA Facility Registry Service (FRS): RMP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  10. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  11. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  12. Applying Registry Services to Spaceflight Technologies to Aid in the Assignment of Assigned Numbers to Disparate Systems and their Technologies to Further Enable Interoperability

    Science.gov (United States)

    Bradford, Robert N.; Nichols, Kelvin F.; Witherspoon, Keith R.

    2006-01-01

    technologies will be those that are currently in need of expansion namely the assignment of satellite designations and the process which controls assignments. Second, we will analyze the technologies currently standardized under the Consultative Committee for Space Data Systems (CCSDS) banner. Third, we will analyze the current CCSDS working group and Birds of a Feather (BoF) activities to ascertain registry requirements. Lastly, we will identify technologies that are either currently under the auspices of another standards body or technologies that are currently not standardized. For activities one through three, we will provide the analysis by either discipline or technology with rationale, identification and brief description of requirements and precedence. For activity four, we will provide a list of current standards bodies e.g. IETF and a list of potential candidates.

  13. Definition, epidemiology and registries of pulmonary hypertension.

    Science.gov (United States)

    Awdish, R; Cajigas, H

    2016-05-01

    Pulmonary arterial hypertension (PAH) is a subcategory of pulmonary hypertension (PH) that comprises a group of disorders with similar pulmonary vascular pathology. Though PH is common, the estimated incidence of IPAH is 1-3 cases per million, making it a rare disease. The hemodynamic definition of PAH is a mean pulmonary artery pressure at rest >OR = 25 mm Hg in the presence of a pulmonary capillary wedge pressure registries. These registries have been indispensable in the characterization and mapping of the natural history of the disease. Equations and risk calculators derived from registries have given clinicians a basis for risk stratification and prognostication. The sequential accumulation of data since the registries began in the 1980s allows for comparisons to be made. Patients who are differentiated by treatment eras and environments can be contrasted. Variability among inclusion criteria similarly allows for comparisons of these subpopulations. This article provides an overview of available registries, highlights insights provided by each and discusses key issues around the interpretation and extrapolation of data from PAH registries. Registries have allowed us to appreciate the improvement in survival afforded by modern therapy and enhanced detection of this disease. Moving forward, a more global approach to registries is needed, as is enhanced collaboration and centralization.

  14. Occupational Disease Registries-Characteristics and Experiences.

    Science.gov (United States)

    Davoodi, Somayeh; Haghighi, Khosro Sadeghniat; Kalhori, Sharareh Rostam Niakan; Hosseini, Narges Shams; Mohammadzadeh, Zeinab; Safdari, Reza

    2017-06-01

    Due to growth of occupational diseases and also increase of public awareness about their consequences, attention to various aspects of diseases and improve occupational health and safety has found great importance. Therefore, there is the need for appropriate information management tools such as registries in order to recognitions of diseases patterns and then making decision about prevention, early detection and treatment of them. These registries have different characteristics in various countries according to their occupational health priorities. Aim of this study is evaluate dimensions of occupational diseases registries including objectives, data sources, responsible institutions, minimum data set, classification systems and process of registration in different countries. In this study, the papers were searched using the MEDLINE (PubMed) Google scholar, Scopus, ProQuest and Google. The search was done based on keyword in English for all motor engines including "occupational disease", "work related disease", "surveillance", "reporting", "registration system" and "registry" combined with name of the countries including all subheadings. After categorizing search findings in tables, results were compared with each other. Important aspects of the registries studied in ten countries including Finland, France, United Kingdom, Australia, Czech Republic, Malaysia, United States, Singapore, Russia and Turkey. The results show that surveyed countries have statistical, treatment and prevention objectives. Data sources in almost the rest of registries were physicians and employers. The minimum data sets in most of them consist of information about patient, disease, occupation and employer. Some of countries have special occupational related classification systems for themselves and some of them apply international classification systems such as ICD-10. Finally, the process of registration system was different in countries. Because occupational diseases are often

  15. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  16. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  17. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  18. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  19. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  20. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  1. Workload and time management in central cancer registries: baseline data and implication for registry staffing.

    Science.gov (United States)

    Chapman, Susan A; Mulvihill, Linda; Herrera, Carolina

    2012-01-01

    The Workload and Time Management Survey of Central Cancer Registries was conducted in 2011 to assess the amount of time spent on work activities usually performed by cancer registrars. A survey including 39 multi-item questions,together with a work activities data collection log, was sent by email to the central cancer registry (CCR) manager in each of the 50 states and the District of Columbia. Twenty-four central cancer registries (47%) responded to the survey.Results indicate that registries faced reductions in budgeted staffing from 2008-2009. The number of source records and total cases were important indicators of workload. Four core activities, including abstracting at the registry, visual editing,case consolidation, and resolving edit reports, accounted for about half of registry workload. We estimate an average of 12.4 full-time equivalents (FTEs) are required to perform all cancer registration activities tracked by the survey; however,estimates vary widely by registry size. These findings may be useful for registries as a benchmark for their own registry workload and time-management data and to develop staffing guidelines.

  2. Rationale for reduced tornado design bases

    International Nuclear Information System (INIS)

    Rutherford, P.D.; Ho, H.W.; Hartung, J.A.; Kastenberg, W.E.

    1985-01-01

    This paper provides a rationale for relaxing the present NRC tornado design requirements, which are based on a design basis tornado (DBT) whose frequency of exceedance is 10 -7 per year. It is proposed that a reduced DBT frequency of 10 -5 to 10 -6 per year is acceptable. This change in the tornado design bases for LMFBRs (and possibly all types of nuclear plants) is justified based on (1) existing NRC regulations and guidelines, (2) probabilistic arguments, (3) consistency with NRC trial safety goals, and (4) cost-benefit analysis

  3. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  4. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  5. Review of U.S. registries for psoriasis.

    Science.gov (United States)

    Amin, Mina; No, Daniel J; Wu, Jashin J

    2017-12-01

    Patient registries are databases comprised of standardized clinical data for a specific population of patients with a particular disease or medical condition. Information from patient registries allows clinicians to assess long-lasting outcomes in patients with a specific disease, such as psoriasis. Our primary objective was to identify available psoriasis registries in the United States (U.S.) and evaluate the application of patient registries compared to clinical trials. We searched Google, the Registry of Patient Registries, Orphanet and ClinicalTrials.gov to create a list of U.S. psoriasis registries. We also performed a literature review on the application of psoriasis registries using PubMed. We identified 6 psoriasis patient registries in the United States. Patient registries are frequently used for psoriasis in the U.S. and provide important information about the safety, efficacy and long-term effects of systemic therapies.

  6. Description and Rationale for the Planning, Monitoring, and Implementation (PMI) Model: Rationale.

    Science.gov (United States)

    Cort, H. Russell

    The rationale for the Planning, Monitoring, and Implementation Model (PMI) is the subject of this paper. The Superintendent of the District of Columbia Public Schools requested a model for systematic evaluation of educational programs to determine their effectiveness. The school system's emphasis on objective-referenced instruction and testing,…

  7. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  8. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  9. ISHKS joint registry: A preliminary report.

    Science.gov (United States)

    Pachore, Jawahir A; Vaidya, Shrinand V; Thakkar, Chandrasekhar J; Bhalodia, Haresh Kumar P; Wakankar, Hemant M

    2013-09-01

    Total knee arthroplasty (TKA) and total hip arthroplasty (THA) are the most widely practiced surgical options for arthritis all over the world and its application is rising in India. Indian Society of Hip and Knee Surgeons (ISHKS) has established a joints registry and has been collecting data for last 6 years. All members of ISHKS are encouraged to actively participate in the registry. A simple two page knee and hip form can be downloaded from the website www.ishks.com. The information collected includes patient demographics, indication for surgery, implant details and in case of revision arthroplasty: the details of implants removed and the cause of failure of primary arthroplasty. These forms are mailed to the central registry office and the data is fed in computerized registry. Data collection started in October 2006. Joint registry is a very important initiative of ISHKS and till date, have data of 34,478 TKAs and 3604 THAs, contributed by 42 surgeons across India. Some important observations have emerged. Data of 34,478 TKAs was assessed: These included 8612 males (25%) and 25,866 females (75%). Average age was 64.4 years (Osteoarthritis range: 45 to 88 years; Rheumatoid arthritis range: 22 to 74 years). Average body mass index was 29.1 (Range: 18.1 to 42.9). The indication for TKA was osteoarthritis in 33,444 (97%) and rheumatoid arthritis in 759 (2.2%). Total of 3604 THA procedures were recorded. These included 2162 (60%) male patients and 1442 (40%) female patients. Average age was 52 years (Range 17 to 85 years) and average BMI was 25.8 (Range: 17.3 to 38.5). The indications for THA was AVN in 49%. The registry will become more meaningful in years to come. Active participation of all arthroplasty surgeons across India is vital for the success of the joints registry.

  10. Linked Registries: Connecting Rare Diseases Patient Registries through a Semantic Web Layer.

    Science.gov (United States)

    Sernadela, Pedro; González-Castro, Lorena; Carta, Claudio; van der Horst, Eelke; Lopes, Pedro; Kaliyaperumal, Rajaram; Thompson, Mark; Thompson, Rachel; Queralt-Rosinach, Núria; Lopez, Estrella; Wood, Libby; Robertson, Agata; Lamanna, Claudia; Gilling, Mette; Orth, Michael; Merino-Martinez, Roxana; Posada, Manuel; Taruscio, Domenica; Lochmüller, Hanns; Robinson, Peter; Roos, Marco; Oliveira, José Luís

    2017-01-01

    Patient registries are an essential tool to increase current knowledge regarding rare diseases. Understanding these data is a vital step to improve patient treatments and to create the most adequate tools for personalized medicine. However, the growing number of disease-specific patient registries brings also new technical challenges. Usually, these systems are developed as closed data silos, with independent formats and models, lacking comprehensive mechanisms to enable data sharing. To tackle these challenges, we developed a Semantic Web based solution that allows connecting distributed and heterogeneous registries, enabling the federation of knowledge between multiple independent environments. This semantic layer creates a holistic view over a set of anonymised registries, supporting semantic data representation, integrated access, and querying. The implemented system gave us the opportunity to answer challenging questions across disperse rare disease patient registries. The interconnection between those registries using Semantic Web technologies benefits our final solution in a way that we can query single or multiple instances according to our needs. The outcome is a unique semantic layer, connecting miscellaneous registries and delivering a lightweight holistic perspective over the wealth of knowledge stemming from linked rare disease patient registries.

  11. [Types of medical registries - definitions, methodological aspects and quality of the scientific work with registries].

    Science.gov (United States)

    Mathis-Edenhofer, Stefan; Piso, Brigitte

    2011-12-01

    This work presents a comprehensive list of registry definitions including broader and narrower definitions. Compared to each other different methodological issues can be identified. Some of these issues are common for all registry types; some can be assigned more easily to a specific registry type. Instruments for evaluating the quality of registers reflect many of the mentioned aspects. Generally, and especially at registers with a descriptive or exploratory research dimension it is important to consider their intended purpose and in about it was achieved. This includes, for instance, whether the purpose and the methodology are coordinated. From the start of registration an initiator should be - based on the purpose - aware of the methodological dimension of the registry. This helps to apply the correct type of the registry, the appropriate guidance and, ultimately, the arguments for the effort (cost-benefit ratio).

  12. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  13. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  14. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  15. Artificial Nutritional Support Registries: systematic review.

    Science.gov (United States)

    Castelló-Botía, I; Wanden-Berghe, C; Sanz-Valero, J

    2009-01-01

    The nutritional registries are data bases through which we obtain the information to understand the nutrition of populations. Several main nutrition societies of the world have these types of registries, outstanding the NADYA (Home artificial and Ambulatory nutrition) group in Spain. The object of this study is to determine by means of a systematic review, the existent scientific production in the international data bases referred to nutritional support registries. Descriptive transversal study of the results of a critical bibliographic research done in the bioscience data bases: MEDLINE, EMBASE, The Cochrane Library, ISI (Web of Sciences), LILACS, CINHAL. A total of 20 original articles related to nutritional registries were found and recovered. Eleven registries of eight countries were identified: Australia, Germany, Italy, Japan, Spain, Sweden, United Status and United Kingdom. The Price Index was of 65% and all the articles were published in the last 20 years. The Price Index highlights the innovativeness of this practice. The articles related to nutritional support are heterogeneous with respect to data and population, which exposes this as a limitation for a combined analysis.

  16. The National Mental Health Registry (NMHR).

    Science.gov (United States)

    Aziz, A A; Salina, A A; Abdul Kadir, A B; Badiah, Y; Cheah, Y C; Nor Hayati, A; Ruzanna, Z Z; Sharifah Suziah, S M; Chee, K Y

    2008-09-01

    The National Mental Health Registry (NMHR) collects information about patients with mental disorder in Malaysia. This information allows us to estimate the incidence of selected mental disorders, and to evaluate risk factors and treatment in the country. The National Mental Health Registry (NMHR) presented its first report in 2004, a year after its establishment. The report focused on schizophrenia as a pioneer project for the National Mental Health Registry. The development of the registry has progressed with data collected from government-based facilities, the academia and the private sector. The 2003-2005 report was recently published and distributed. Since then the registry has progressed to include suicides and other mental illnesses such as depression. The NMHR Report 2003-2005 provides detailed information about the profile of persons with Schizophrenia who presented for the first time to various psychiatry and mental health providers throughout Malaysia. More detailed description regarding pharmacotherapy is reported and few cross tabulations done in an effort to provide better understanding and more clinically meaningful reports.

  17. ISHKS joint registry: A preliminary report

    Directory of Open Access Journals (Sweden)

    Jawahir A Pachore

    2013-01-01

    form can be downloaded from the website www.ishks.com. The information collected includes patient demographics, indication for surgery, implant details and in case of revision arthroplasty: the details of implants removed and the cause of failure of primary arthroplasty. These forms are mailed to the central registry office and the data is fed in computerized registry. Data collection started in October 2006. Results: Joint registry is a very important initiative of ISHKS and till date, have data of 34,478 TKAs and 3604 THAs, contributed by 42 surgeons across India. Some important observations have emerged. Data of 34,478 TKAs was assessed: These included 8612 males (25% and 25,866 females (75%. Average age was 64.4 years (Osteoarthritis range: 45 to 88 years; Rheumatoid arthritis range: 22 to 74 years. Average body mass index was 29.1 (Range: 18.1 to 42.9. The indication for TKA was osteoarthritis in 33,444 (97% and rheumatoid arthritis in 759 (2.2%. Total of 3604 THA procedures were recorded. These included 2162 (60% male patients and 1442 (40% female patients. Average age was 52 years (Range 17 to 85 years and average BMI was 25.8 (Range: 17.3 to 38.5. The indications for THA was AVN in 49%. Conclusion: The registry will become more meaningful in years to come. Active participation of all arthroplasty surgeons across India is vital for the success of the joints registry.

  18. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  19. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  20. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  1. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  2. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  3. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  4. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  5. The Danish National Acute Leukemia Registry

    DEFF Research Database (Denmark)

    Østgård, Lene Sofie Granfeldt; Nørgaard, Jan Maxwell; Raaschou-Jensen, Klas Kræsten

    2016-01-01

    AIM OF DATABASE: The main aim of the Danish National Acute Leukemia Registry (DNLR) was to obtain information about the epidemiology of the hematologic cancers acute myeloid leukemia (AML), acute lymphoblastic leukemia (ALL), and myelodysplastic syndrome (MDS). STUDY POPULATION: The registry...... was established in January 2000 by the Danish Acute Leukemia Group and has been expanded over the years. It includes adult AML patients diagnosed in Denmark since 2000, ALL patients diagnosed since 2005, and MDS patients diagnosed since 2010. The coverage of leukemia patients exceeds 99%, and the coverage of MDS...... years. To ensure this high coverage, completeness, and quality of data, linkage to the Danish Civil Registration System and the Danish National Registry of Patients, and several programmed data entry checks are used. CONCLUSION: The completeness and positive predictive values of the leukemia data have...

  6. United States Transuranium and Uranium Registries

    International Nuclear Information System (INIS)

    Kathren, R.L.; Filipy, R.E.; Dietert, S.E.

    1991-06-01

    This report summarizes the primary scientific activities of the United States Transuranium and Uranium Registries for the period October 1, 1989 through September 30, 1990. The Registries are parallel human tissue research programs devoted to the study of the actinide elements in humans. To date there have been 261 autopsy or surgical specimen donations, which include 11 whole bodies. The emphasis of the Registry was directed towards quality improvement and the development of a fully computerized data base that would incorporate not only the results of postmortem radiochemical analysis, but also medical and monitoring information obtained during life. Human subjects reviews were also completed. A three compartment biokinetic model for plutonium distribution is proposed. 2 tabs

  7. An international registry for primary ciliary dyskinesia

    DEFF Research Database (Denmark)

    Werner, Claudius; Lablans, Martin; Ataian, Maximilian

    2016-01-01

    Primary ciliary dyskinesia (PCD) is a rare autosomal recessive disorder leading to chronic upper and lower airway disease. Fundamental data on epidemiology, clinical presentation, course and treatment strategies are lacking in PCD. We have established an international PCD registry to realise...... an unmet need for an international platform to systematically collect data on incidence, clinical presentation, treatment and disease course.The registry was launched in January 2014. We used internet technology to ensure easy online access using a web browser under www.pcdregistry.eu. Data from 201...... methods in addition to classical clinical symptoms. Preliminary analysis of lung function data demonstrated a mean annual decline of percentage predicted forced expiratory volume in 1 s of 0.59% (95% CI 0.98-0.22).Here, we present the development of an international PCD registry as a new promising tool...

  8. Rationale for energy research and development programme

    Energy Technology Data Exchange (ETDEWEB)

    1976-04-01

    This paper describes the rationale for the expenditure of government money on energy research and development. The Committee, organized in 1974, established the following order of project priorities: projects to determine current and future energy demand; projects concerned with the conservation and more efficient use of energy; projects concerned with the assessment of indigenous energy resources; projects concerned with the assessment of the human, financial, and organizational resources for energy production and use; and projects concerned with economic, technological, social, and environmental aspects of energy use and production over the next 15 years and beyond the next 15 years. Significant factors affecting the national energy economy, the strategy for energy research and development, and the results of committee activities are summarized. An energy scenario research is laid out. (MCW)

  9. "Socialized Music": Historical Formations of Community Music through Social Rationales

    Science.gov (United States)

    Yerichuk, Deanna

    2014-01-01

    This article traces the formation of community music through professional and scholarly articles over the last century in North America, and argues that community music has been discursively formed through social rationales, although the specific rationales have shifted. The author employs an archaeological framework inspired by Michel Foucault to…

  10. Common variables in European pancreatic cancer registries

    DEFF Research Database (Denmark)

    De Leede, E. M.; Sibinga Mulder, B. G.; Bastiaannet, E.

    2016-01-01

    Background Quality assurance of cancer care is of utmost importance to detect and avoid under and over treatment. Most cancer data are collected by different procedures in different countries, and are poorly comparable at an international level. EURECCA, acronym for European Registration of Cancer...... registries, as well as specific pancreatic cancer audits/registries, were invited to participate in EURECCA Pancreas. Participating countries were requested to share an overview of their collected data items. Of the received datasets, a shared items list was made which creates insight in similarities between...

  11. The Danish Neuro-Oncology Registry

    DEFF Research Database (Denmark)

    Hansen, Steinbjørn; Nielsen, Jan; Laursen, René J

    2016-01-01

    BACKGROUND: The Danish Neuro-Oncology Registry (DNOR) is a nationwide clinical cancer database that has prospectively registered data on patients with gliomas since January 2009. The purpose of this study was to describe the establishment of the DNOR and further to evaluate the database completen......BACKGROUND: The Danish Neuro-Oncology Registry (DNOR) is a nationwide clinical cancer database that has prospectively registered data on patients with gliomas since January 2009. The purpose of this study was to describe the establishment of the DNOR and further to evaluate the database...

  12. A web-based, patient driven registry for Angelman syndrome: the global Angelman syndrome registry.

    Science.gov (United States)

    Napier, Kathryn R; Tones, Megan; Simons, Chloe; Heussler, Helen; Hunter, Adam A; Cross, Meagan; Bellgard, Matthew I

    2017-08-01

    Angelman syndrome (AS) is a rare neurodevelopmental disorder that is characterised by severe global developmental delays, ataxia, loss of speech, epilepsy, sleep disorders, and a happy disposition. There is currently no cure for AS, though several pharmaceutical companies are anticipating drug trials for new therapies to treat AS. The Foundation for Angelman Therapeutics (FAST) Australia therefore identified a need for a global AS patient registry to identify patients for recruitment for clinical trials.The Global AS Registry was deployed in September 2016 utilising the Rare Disease Registry Framework, an open-source tool that enables the efficient creation and management of patient registries. The Global AS Registry is web-based and allows parents and guardians worldwide to register, provide informed consent, and enter data on individuals with AS. 286 patients have registered in the first 8 months since deployment.We demonstrate the successful deployment of the first patient-driven global registry for AS. The data generated from the Global AS Registry will be crucial in identifying patients suitable for clinical trials and in informing research that will identify treatments for AS, and ultimately improve the lives of individuals and their families living with AS.

  13. Using Rationale To Assist Student Cognitive And Intellectual Development

    Directory of Open Access Journals (Sweden)

    Janet E. Burge

    2010-01-01

    Full Text Available One of the questions posed at the National Science Foundation (NSF-sponsored workshop on Creativity and Rationale in Software Design was on the role of rationale in supporting idea generation in the classroom. College students often struggle with problems where more than one possible solution exists. Part of the difficulty lies in the need for students to progress through different levels of development cognitively and intellectually before they can tackle creative problem solving. Argumentation-based rationale provides a natural mechanism for representing problems, candidate solutions, criteria, and arguments relating those criteria to the candidate solutions. Explicitly expressing rationale for their work encourages students to reflect on why they made their choices, and to actively consider multiple alternatives. We report on an experiment performed during a Data Structures course where students captured rationale.

  14. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  15. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  16. Terror attacks increases the risk of vascular injuries

    Directory of Open Access Journals (Sweden)

    Eitan eHeldenberg

    2014-05-01

    Full Text Available Objectives: Extensive literature exists about military trauma as opposed to the very limited literature regarding terror-related civilian trauma. However, terror-related vascular trauma (VT, as a unique type of injury, is yet to be addressed.Methods: A retrospective analysis of the Israeli National Trauma Registry was performed. All patients in the registry from 09/2000 to 12/2005 were included. The subgroup of patients with documented vascular trauma (VT (N=1,545 was analyzedand further subdivided into those suffering from Terror-related Vascular Trauma (TVT and Non-Terror related Vascular Trauma (NTVT. Both groups were analyzed according to mechanism of trauma, type and severity of injury and treatment.Results: Out of 2,446 terror related trauma admissions 243 sustained TVT (9.9% compared to 1302 VT patients from Non Terror trauma (1.1%. TVT injuries tend to be more complex and most patients were operated on. ICU admissions and hospitallength of stay was higher in the TVT group. Penetrating trauma was the prominent cause of injury among the TVT group. TVT group had a higher proportion of patients with severe injuries (ISS>16 and mortality. Thorax injuries were more frequent in the TVT group. Extremity injuries were the most prevalent vascular injuries in both groups; however NTVT group had more upper extremity injuries, while the TVT group had significantly more lower extremity injuries.Conclusion: Vascular injuries are remarkably more common among terror attack victims than among non-terror trauma victims and the injuries of terror casualties tend to be more complex. The presence of a vascular surgeon will ensure a comprehensive clinical care.

  17. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  18. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  19. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  20. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  1. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  2. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  3. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  4. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  5. The Danish National Acute Leukemia Registry

    DEFF Research Database (Denmark)

    Østgård, Lene Sofie Granfeldt; Nørgaard, Jan Maxwell; Raaschou-Jensen, Klas Kræsten

    2016-01-01

    years. To ensure this high coverage, completeness, and quality of data, linkage to the Danish Civil Registration System and the Danish National Registry of Patients, and several programmed data entry checks are used. CONCLUSION: The completeness and positive predictive values of the leukemia data have...

  6. Validation of the Netherlands pacemaker patient registry

    NARCIS (Netherlands)

    Dijk, WA; Kingma, T; Hooijschuur, CAM; Dassen, WRM; Hoorntje, JCA; van Gelder, LM

    1997-01-01

    This paper deals with the validation of the information stored in the Netherlands central pacemaker patient database. At this moment the registry database contains information on more than 70500 patients, 85000 pacemakers and 90000 leads. The validation procedures consisted of an internal

  7. Costing Tool for International Cancer Registries

    Centers for Disease Control (CDC) Podcasts

    2016-11-21

    A health economist at CDC talks about a new tool for estimating how much it costs to run cancer registries in developing countries.  Created: 11/21/2016 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 11/21/2016.

  8. Airborne Hazards and Open Burn Pit Registry

    Science.gov (United States)

    ... this problem if you are in a high security environment where this is disabled by a network policy. The Registry will work in JavaScript-enabled browsers such as: Google Chrome 17+ Mozilla Firefox 12+ Internet Explorer 10+ Safari 5+ Safari iOS 5+ Android 2.3+ If you are using a compatible ...

  9. [History of the cancer registry in Mexico].

    Science.gov (United States)

    Allende-López, Aldo; Fajardo-Gutiérrez, Arturo

    2011-01-01

    A cancer registry is to record the data which let us to know the epidemiology of neoplasm, but led us take a decision in medical policy about this health problem that benefit patients. In this paper we did a brief historical review about models and attempts for having a cancer registry in Mexico. However, since 1940 "the fight against cancer" was declared, we have not had a confident cancer registry today validated and built with data from whole the country. In 1982, the Registro Nacional del Cancer was created. The design and validation of a registration card in four hospitals were the main results. In 1988, the Registro Nacional del Cancer was reinforced with a computerized system for facilitation the data capture. In 1994, it was signed the first interinstitutional agreement that led to Registro Histopatol6gico de Neoplasias Malignas. In 1996, the Instituto Mexicano del Seguro Social established a cancer registry in children in Mexico with the intention to have data from this population.

  10. An active registry for bioinformatics web services.

    NARCIS (Netherlands)

    Pettifer, S.; Thorne, D.; McDermott, P.; Attwood, T.; Baran, J.; Bryne, J.C.; Hupponen, T.; Mowbray, D.; Vriend, G.

    2009-01-01

    SUMMARY: The EMBRACE Registry is a web portal that collects and monitors web services according to test scripts provided by the their administrators. Users are able to search for, rank and annotate services, enabling them to select the most appropriate working service for inclusion in their

  11. 50 CFR 600.1410 - Registry process.

    Science.gov (United States)

    2010-10-01

    ... United States § 600.1410 Registry process. (a) A person may register through the NMFS web site at www... state registration or U.S. Coast Guard documentation number; home port or principal area of operation... website. (b) Individuals must submit their name; address; telephone number; date of birth; region(s) of...

  12. Correlating Orphaned Windows Registry Data Structures

    Directory of Open Access Journals (Sweden)

    Damir Kahved

    2009-06-01

    Full Text Available Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys may still reside in the system files once the entries have been deleted from the active database. Investigating the complete keys in context may be extremely important from both a Forensic Investigation point of view and a legal point of view where a lack of context can bring doubt to an argument. In this paper we formalise the registry behaviour and show how a retrieved value may not maintain a relation to the part of the registry it belonged to and hence lose that context. We define registry orphans and elaborate on how they can be created inadvertently during software uninstallation and other system processes. We analyse the orphans and attempt to reconstruct them automatically. We adopt a data mining approach and introduce a set of attributes that can be applied by the forensic investigator to match values to their parents. The heuristics are encoded in a Decision Tree that can discriminate between keys and select those which most likely owned a particular orphan value.

  13. The Savant Syndrome Registry: A Preliminary Report.

    Science.gov (United States)

    Treffert, Darold A; Rebedew, David L

    2015-08-01

    A registry has been established to document certain characteristics on a sizeable worldwide sample of individuals with savant syndrome, a rare but remarkable condition in which persons with developmental disabilities, brain injury, or brain disease have some spectacular "islands" of skill or ability that stand in jarring, marked contrast to overall handicap. Of the 319 savants included in the registry, 90% are congenital savants, while 10% are acquired savants. The registry includes individuals from 33 countries, with 70% from the United States or Canada. Sex distribution was 79% male vs. 21% female (4:1). This report summarizes the findings in the congenital savant syndrome category of the registry. Among the individuals with congenital savant syndrome, the most common underlying disability was Autistic Spectrum Disorder (75%); various other central nervous system (CNS) disorders were present in the other 25%. Fifty-five percent possessed a single special skill, while 45% had multiple skills. Music was the most frequent principal skill followed by art, memory, mathematics, calendar calculating, language, visual-spatial/mechanical, athletic, computer, extrasensory perception, and other skills.

  14. Mexican registry of pulmonary hypertension: REMEHIP.

    Science.gov (United States)

    Sandoval Zarate, Julio; Jerjes-Sanchez, Carlos; Ramirez-Rivera, Alicia; Zamudio, Tomas Pulido; Gutierrez-Fajardo, Pedro; Elizalde Gonzalez, Jose; Leon, Mario Seoane Garcia De; Gamez, Miguel Beltran; Abril, Francisco Moreno Hoyos; Michel, Rodolfo Parra; Aguilar, Humberto Garcia

    REMEHIP is a prospective, multicentre registry on pulmonary hypertension. The main objective will be to identify the clinical profile, medical care, therapeutic trends and outcomes in adult and pediatric Mexican patients with well-characterized pulmonary hypertension. REMEHIP a multicenter registry began in 2015 with a planned recruitment time of 12 months and a 4-year follow-up. The study population will comprise a longitudinal cohort study, collecting data on patients with prevalent and incident pulmonary hypertension. Will be included patients of age >2 years and diagnosis of pulmonary hypertension by right heart catheterization within Group 1 and Group 4 of the World Health Organization classification. The structure, data collection and data analysis will be based on quality current recommendations for registries. The protocol has been approved by institutional ethics committees in all participant centers. All patients will sign an informed consent form. Currently in Mexico, there is a need of observational registries that include patients with treatment in the everyday clinical practice so the data could be validated and additional information could be obtained versus the one from the clinical trials. In this way, REMEHIP emerges as a link among randomized clinical trials developed by experts and previous Mexican experience. Copyright © 2016 Instituto Nacional de Cardiología Ignacio Chávez. Publicado por Masson Doyma México S.A. All rights reserved.

  15. Clinical Case Registries: Simultaneous Local and National Disease Registries for Population Quality Management

    Science.gov (United States)

    Backus, Lisa I.; Gavrilov, Sergey; Loomis, Timothy P.; Halloran, James P.; Phillips, Barbara R.; Belperio, Pamela S.; Mole, Larry A.

    2009-01-01

    The Department of Veterans Affairs (VA) has a system-wide, patient-centric electronic medical record system (EMR) within which the authors developed the Clinical Case Registries (CCR) to support population-centric delivery and evaluation of VA medical care. To date, the authors have applied the CCR to populations with human immunodeficiency virus (HIV) and hepatitis C virus (HCV). Local components use diagnosis codes and laboratory test results to identify patients who may have HIV or HCV and support queries on local care delivery with customizable reports. For each patient in a local registry, key EMR data are transferred via HL7 messaging to a single national registry. From 128 local registry systems, over 60,000 and 320,000 veterans in VA care have been identified as having HIV and HCV, respectively, and entered in the national database. Local and national reports covering demographics, resource usage, quality of care metrics and medication safety issues have been generated. PMID:19717794

  16. The Italian Registry of Antiphospholipid Antibodies.

    Science.gov (United States)

    Finazzi, G

    1997-01-01

    The clinical importance of antiphospholipid antibodies (APA) derives from their association with a syndrome of venous and arterial thrombosis, recurrent fetal loss and thrombocytopenia known as the antiphospholipid syndrome (APS). The Italian Registry of Antiphospholipid Antibodies was set up in 1989 for the purpose of collecting a large number of patients with lupus anticoagulant (LA) or anticardiolipin antibodies (ACA) for clinical studies in order to obtain more information on the clinical features of APS. The Italian Registry has completed two clinical studies and proposed an international trial on the treatment of APS patients. These activities of the Registry are reviewed herein. Additional information has been obtained from pertinent articles and abstracts published in journals covered by the Science Citation Index and Medline. The first study of the Registry was a retrospective analysis of enrolled patients which showed that: a) the prevalence of thrombosis and thrombocytopenia was similar in cases with idiopathic APA or APA secondary to systemic lupus erythematosus, and b) the rate of thrombosis was significantly reduced in patients with severe thrombocytopenia but not in those with only a mild reduction of the platelet count. The second study was a prospective survey of the natural history of the disease, showing that a) previous thrombosis and ACA titer > 40 units were independent predictors of subsequent vascular complications; b) a history of miscarriage or thrombosis is significantly associated with adverse pregnancy outcome; c) hematological malignancies can develop during follow-up and patients with APA should be considered at increased risk of developing NHL. Thus the possibility of a hematologic neoplastic disease should be borne in mind in the initial evaluation and during the follow-up of these patients. The latest initiative of the Registry was the proposal of an international, randomized clinical trial (WAPS study) aimed at assessing the

  17. Iranian Joint Registry(Iranian National Hip and Knee Arthroplasty Registry

    Directory of Open Access Journals (Sweden)

    Hamidreza Aslani

    2016-04-01

    Full Text Available Periodic evaluation and monitoring the health and economic outcome of joint replacement surgery is a common and popular process under the territory of joint registries in many countries. In this article we introduce the methodology used for the foundation of the National Iranian Joint Registry (IJR with a joint collaboration of the Social Security Organization (SSO and academic research departments considering the requirements of the Iran’s Ministry of Health and Education.

  18. Nordic registry-based cohort studies: Possibilities and pitfalls when combining Nordic registry data.

    Science.gov (United States)

    Maret-Ouda, John; Tao, Wenjing; Wahlin, Karl; Lagergren, Jesper

    2017-07-01

    All five Nordic countries (Denmark, Finland, Iceland, Norway and Sweden) have nationwide registries with similar data structure and validity, as well as personal identity numbers enabling linkage between registries. These resources provide opportunities for medical research that is based on large registry-based cohort studies with long and complete follow-up. This review describes practical aspects, opportunities and challenges encountered when setting up all-Nordic registry-based cohort studies. Relevant articles describing registries often used for medical research in the Nordic countries were retrieved. Further, our experiences of conducting this type of study, including planning, acquiring permissions, data retrieval and data cleaning and handling, and the possibilities and challenges we have encountered are described. Combining data from the Nordic countries makes it possible to create large and powerful cohorts. The main challenges include obtaining all permissions within each country, usually in the local language, and retrieving the data. These challenges emphasise the importance of having experienced collaborators within each country. Following the acquisition of data, data management requires the understanding of the differences between the variables to be used in the various countries. A concern is the long time required between initiation and completion. Nationwide Nordic registries can be combined into cohorts with high validity and statistical power, but the considerable expertise, workload and time required to complete such cohorts should not be underestimated.

  19. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  20. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  1. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  2. 14 CFR 47.19 - FAA Aircraft Registry.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false FAA Aircraft Registry. 47.19 Section 47.19... REGISTRATION General § 47.19 FAA Aircraft Registry. Each application, request, notification, or other communication sent to the FAA under this Part must be mailed to the FAA Aircraft Registry, Department of...

  3. 14 CFR 49.11 - FAA Aircraft Registry.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false FAA Aircraft Registry. 49.11 Section 49.11... AIRCRAFT TITLES AND SECURITY DOCUMENTS General § 49.11 FAA Aircraft Registry. To be eligible for recording, a conveyance must be mailed to the FAA Aircraft Registry, Department of Transportation, Post Office...

  4. A review of national shoulder and elbow joint replacement registries

    DEFF Research Database (Denmark)

    Rasmussen, Jeppe V; Olsen, Bo S; Fevang, Bjørg-Tilde S

    2012-01-01

    The aim was to review the funding, organization, data handling, outcome measurements, and findings from existing national shoulder and elbow joint replacement registries; to consider the possibility of pooling data between registries; and to consider wether a pan european registry might be feasible....

  5. Educational Rationale Metadata for Learning Objects

    Directory of Open Access Journals (Sweden)

    Tom Carey

    2002-10-01

    Full Text Available Instructors searching for learning objects in online repositories will be guided in their choices by the content of the object, the characteristics of the learners addressed, and the learning process embodied in the object. We report here on a feasibility study for metadata to record process-oriented information about instructional approaches for learning objects, though a set of Educational Rationale [ER] tags which would allow authors to describe the critical elements in their design intent. The prototype ER tags describe activities which have been demonstrated to be of value in learning, and authors select the activities whose support was critical in their design decisions. The prototype ER tag set consists descriptors of the instructional approach used in the design, plus optional sub-elements for Comments, Importance and Features which implement the design intent. The tag set was tested by creators of four learning object modules, three intended for post-secondary learners and one for K-12 students and their families. In each case the creators reported that the ER tag set allowed them to express succinctly the key instructional approaches embedded in their designs. These results confirmed the overall feasibility of the ER tag approach as a means of capturing design intent from creators of learning objects. Much work remains to be done before a usable ER tag set could be specified, including evaluating the impact of ER tags during design to improve instructional quality of learning objects.

  6. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  7. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  8. Clinical trial registries: a practical guide for sponsors and researchers of medicinal products

    National Research Council Canada - National Science Library

    Foote, MaryAnn

    2006-01-01

    ... Industry perspective on public clinical trial registries and results databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

  9. Towards a national trauma registry for the United Arab Emirates

    Directory of Open Access Journals (Sweden)

    Barka Ezedin

    2010-07-01

    Full Text Available Abstract Background Trauma is a major health problem in the United Arab Emirates (UAE as well as worldwide. Trauma registries provide large longitudinal databases for analysis and policy improvement. We aim in this paper to report on the development and evolution of a national trauma registry using a staged approach by developing a single-center registry, a two-center registry, and then a multi-center registry. The three registries were established by developing suitable data collection forms, databases, and interfaces to these databases. The first two registries collected data for a finite period of time and the third is underway. The steps taken to establish these registries depend on whether the registry is intended as a single-center or multi-center registry. Findings Several issues arose and were resolved during the development of these registries such as the relational design of the database, whether to use a standalone database management system or a web-based system, and the usability and security of the system. The inclusion of preventive medicine data elements is important in a trauma registry and the focus on road traffic collision data elements is essential in a country such as the UAE. The first two registries provided valuable data which has been analyzed and published. Conclusions The main factors leading to the successful establishment of a multi-center trauma registry are the development of a concise data entry form, development of a user-friendly secure web-based database system, the availability of a computer and Internet connection in each data collection center, funded data entry personnel well trained in extracting medical data from the medical record and entering it into the computer, and experienced personnel in trauma injuries and data analysis to continuously maintain and analyze the registry.

  10. Cohort Profile : The National Academy of Sciences-National Research Council Twin Registry (NAS-NRC Twin Registry)

    NARCIS (Netherlands)

    Gatz, Margaret; Harris, Jennifer R.; Kaprio, Jaakko; McGue, Matt; Smith, Nicholas L.; Snieder, Harold; Spiro, Avron; Butler, David A.

    The National Academy of Sciences-National Research Council Twin Registry (NAS-NRC Twin Registry) is a comprehensive registry of White male twin pairs born in the USA between 1917 and 1927, both of the twins having served in the military. The purpose was medical research and ultimately improved

  11. Variation in performance measure criteria significantly affects cardiology practice rankings: Insights from the National Cardiovascular Data Registry's Practice Innovation and Clinical Excellence Registry.

    Science.gov (United States)

    Eapen, Zubin J; Tang, Fengming; Jones, Phil G; Maddox, Thomas M; Oetgen, William J; Spertus, John A; Rumsfeld, John S; Heidenreich, Paul A; Peterson, Eric D; Drozda, Joseph P

    2015-06-01

    Million Hearts is a national initiative to prevent 1 million heart attacks and strokes over 5 years by improving cardiovascular prevention. An important tool in the success of programs like Million Hearts is public ranking on the quality of practices, yet different measures may provide different rankings, so the true quality of practices is difficult to discern. We evaluated the quality of ambulatory cardiology care using performance measure metrics. We compared rankings of practices participating in the National Cardiovascular Data Registry's Practice Innovation and Clinical Excellence Registry using measures from (1) the physician quality reporting system and (2) the American College of Cardiology/American Heart Association/Physician Consortium for Performance Improvement. We compared achievement rates for measures between the 2 frameworks and determined correlations in rankings using Spearman correlation coefficients. From January 1, 2008 to December 31, 2012, there were 1,711,326 patients enrolled from 111 US practices. Among eligible patients, the physician quality reporting system and American College of Cardiology/American Heart Association/Physician Consortium for Performance Improvement measures were achieved in 76.1% versus 77.4% for antiplatelet prescription (P performance and failing to achieve public health goals. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. Hermeneutics framework: integration of design rationale and optimizing software modules

    NARCIS (Netherlands)

    Aksit, Mehmet; Malakuti Khah Olun Abadi, Somayeh

    To tackle the evolution challenges of adaptive systems, this paper argues on the necessity of hermeneutic approaches that help to avoid too early elimination of design alternatives. This visionary paper proposes the Hermeneutics Framework, which computationally integrates a design rationale

  13. The national dose registry of Canada

    International Nuclear Information System (INIS)

    1982-04-01

    In 1951, when the National Dosimetry Service was established by the Department of National Health and Welfare, a system of centralized records was created as an integral part of the new service. Over the last few years the dose record system has expanded in size and content, and improvements have been made in the physical methods of record storage. In addition to the 250 000 individual dose records from the National Dosimetry Service, the National Dose Registry now includes internal tritium and external doses from nuclear generating stations, and radon daughter exposures submitted by uranium mining companies. With the increase in the use of radiation in the medical, industrial and research fields, it is becoming more important to have a comprehensive and readily accessible centralized record system. The Canadian National Dose Registry is particularly suited for continuing health risk studies of radiation workers and provides a base for future epidemiological studies

  14. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  15. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  16. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  17. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  18. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  19. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  20. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  1. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  2. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  3. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  4. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  5. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  6. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  7. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  8. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  9. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  10. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  11. Registry of Mineral and Petroleum Titles

    Energy Technology Data Exchange (ETDEWEB)

    Maclellan, I. M.; Kaizer, J. L.; McCulloch, P. D.; Ratcliffe, R.; Wenning, A. S. [Nova Scotia Dept. of Natural Resources, Halifax, NS (Canada)

    2000-07-01

    Activities of the Nova Scotia Registry of Mineral and Petroleum Titles are described, including statistical information about staking and mining activity in the province during 1999. In terms of activities, the Registry receives applications and issues licenses and leases for mineral and petroleum rights, receives statements of exploration expenditures and assessment reports that pertain to renewal of licenses and leases, maintains maps showing the disposition of lands under license or lease, and maintains a system of prospector registration. In addition, the Registry processes applications for underground gas storage rights and treasure trove rights and maintains a database of information concerning production and employment in Nova Scotia mines and quarries. At the end 1999 there were 230,660 hectares under exploration licence. Exploration expenditures, including engineering, economic and feasibility studies during 1999 totalled $4.2 million, mostly by junior mining companies searching for industrial mineral commodities. Mining activity during 1999 generated revenues of $340 million. Coal production dropped by 25 per cent, due mainly to the closure of the Phalen Mine. Gypsum production was up to 7.9 million tonnes; shipments of cement, barite and clay products also increased during 1999; salt production remained unchanged from 1998 with 842,000 tonnes. Production of construction aggregates totalled 10.6 million tonnes, down slightly from the year before. Mineral industry employment was roughly 2,500 persons, down by 24 per cent from 1998 levels, due primarily to the closure of the Phalen Mine.

  12. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  13. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  14. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  15. Registry Assessment of Peripheral Interventional Devices (RAPID): Registry assessment of peripheral interventional devices core data elements.

    Science.gov (United States)

    Jones, W Schuyler; Krucoff, Mitchell W; Morales, Pablo; Wilgus, Rebecca W; Heath, Anne H; Williams, Mary F; Tcheng, James E; Marinac-Dabic, J Danica; Malone, Misti L; Reed, Terrie L; Fukaya, Rie; Lookstein, Robert A; Handa, Nobuhiro; Aronow, Herbert D; Bertges, Daniel J; Jaff, Michael R; Tsai, Thomas T; Smale, Joshua A; Zaugg, Margo J; Thatcher, Robert J; Cronenwett, Jack L

    2018-02-01

    The current state of evaluating patients with peripheral artery disease and more specifically of evaluating medical devices used for peripheral vascular intervention (PVI) remains challenging because of the heterogeneity of the disease process, the multiple physician specialties that perform PVI, the multitude of devices available to treat peripheral artery disease, and the lack of consensus about the best treatment approaches. Because PVI core data elements are not standardized across clinical care, clinical trials, and registries, aggregation of data across different data sources and physician specialties is currently not feasible. Under the auspices of the U.S. Food and Drug Administration's Medical Device Epidemiology Network initiative-and its PASSION (Predictable and Sustainable Implementation of the National Registries) program, in conjunction with other efforts to align clinical data standards-the Registry Assessment of Peripheral Interventional Devices (RAPID) workgroup was convened. RAPID is a collaborative, multidisciplinary effort to develop a consensus lexicon and to promote interoperability across clinical care, clinical trials, and national and international registries of PVI. The current manuscript presents the initial work from RAPID to standardize clinical data elements and definitions, to establish a framework within electronic health records and health information technology procedural reporting systems, and to implement an informatics-based approach to promote the conduct of pragmatic clinical trials and registry efforts in PVI. Ultimately, we hope this work will facilitate and improve device evaluation and surveillance for patients, clinicians, health outcomes researchers, industry, policymakers, and regulators. Copyright © 2017 Society for Vascular Surgery. All rights reserved.

  16. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  17. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  18. Reasons for (not) signing the state registry: surveying Department of Motor Vehicles customers in New York state.

    Science.gov (United States)

    Feeley, Thomas Hugh; Reynolds-Tylus, Tobias; Anker, Ashley E; Evans, Melanie

    2014-03-01

    Prior research examining rationales for enrolling as an organ donor is biased because of its reliance on college student samples and retrospective recall. To characterize New York state residents' registry enrollment decisions in close proximity to a registration opportunity. -Surveys were conducted with customers exiting Department of Motor Vehicle offices. A total of 1325 customers were surveyed upon exiting 1 of 18 Department of Motor Vehicle offices spanning 9 counties. Customers making donation-relevant transactions (ie, license renewal/registration) reported whether they had registered as a donor that day, and all other customers reported whether they had registered as a donor in the past. Customers reported reasons to justify their enrollment decision through short interview questions. Among current donation-relevant transactions (n = 299), 27% reported enrolling in the registry. Of remaining customers, 39% reported enrolling in the state registry in the past. For those who elected not to enroll, many failed to communicate a reason for their decision, or reported a lack of opportunity to sign or decisional uncertainty. Among enrollees, reasons for registration included the altruistic benefits of donation, prior registration, personal experience with donation, and rational arguments for donation. The value of point-of-decision survey data are discussed in relation to strategic efforts to promote organ donor registration.

  19. Effects of Role and Assignment Rationale on Attitudes Formed During Peer Tutoring

    Science.gov (United States)

    Bierman, Karen Linn; Furman, Wyndol

    2012-01-01

    This study examined the role of contextual factors, such as assignment rationale, on the attitudinal effects of peer tutoring. Fourth-grade children engaged in brief tutoring experiences as either a tutor or tutee. Subjects received four rationales for being selected as tutor or tutee: (a) a competence rationale, (b) a physical characteristic rationale, (c) a chance rationale, or (d) no rationale. As predicted, tutors had more positive attitudes than tutees when they had been given a competence or physical characteristic rationale but not when the tutors were provided a chance rationale or no rationale. Additionally, the tutors’ and tutees’ attitudes were enhanced when no rationale was provided. Results are discussed in terms of their implications for a role-theory analysis of tutoring and their implications for applied programs. PMID:23946549

  20. International Consortium of Vascular Registries Consensus Recommendations for Peripheral Revascularisation Registry Data Collection

    DEFF Research Database (Denmark)

    Behrendt, Christian-Alexander; Bertges, Daniel; Eldrup, Nikolaj

    2018-01-01

    intervention; (ix) complications; and (x) follow up. CONCLUSION: A modified Delphi study allowed 25 international vascular registry experts to achieve a consensus recommendation for a minimum core data set and an optimum data set for peripheral arterial revascularisation registries. Continued global...... via internet exchange and face to face discussions. In total, 187 different items from the various registry data forms were identified for potential inclusion in the recommended data set. Ultimately, 79 items were recommended for inclusion in minimum core data sets, including 65 items in the level 1...... data set, and an additional 14 items in the more specific level 2 and 3 recommended data sets. Data elements were broadly divided into (i) patient characteristics; (ii) comorbidities; (iii) current medications; (iv) lesion treated; (v) procedure; (vi) bypass; (vii) endarterectomy (viii) catheter based...

  1. Meta-analysis of individual registry results enhances international registry collaboration.

    Science.gov (United States)

    Paxton, Elizabeth W; Mohaddes, Maziar; Laaksonen, Inari; Lorimer, Michelle; Graves, Stephen E; Malchau, Henrik; Namba, Robert S; Kärrholm, John; Rolfson, Ola; Cafri, Guy

    2018-03-28

    Background and purpose - Although common in medical research, meta-analysis has not been widely adopted in registry collaborations. A meta-analytic approach in which each registry conducts a standardized analysis on its own data followed by a meta-analysis to calculate a weighted average of the estimates allows collaboration without sharing patient-level data. The value of meta-analysis as an alternative to individual patient data analysis is illustrated in this study by comparing the risk of revision of porous tantalum cups versus other uncemented cups in primary total hip arthroplasties from Sweden, Australia, and a US registry (2003-2015). Patients and methods - For both individual patient data analysis and meta-analysis approaches a Cox proportional hazard model was fit for time to revision, comparing porous tantalum (n = 23,201) with other uncemented cups (n = 128,321). Covariates included age, sex, diagnosis, head size, and stem fixation. In the meta-analysis approach, treatment effect size (i.e., Cox model hazard ratio) was calculated within each registry and a weighted average for the individual registries' estimates was calculated. Results - Patient-level data analysis and meta-analytic approaches yielded the same results with the porous tantalum cups having a higher risk of revision than other uncemented cups (HR (95% CI) 1.6 (1.4-1.7) and HR (95% CI) 1.5 (1.4-1.7), respectively). Adding the US cohort to the meta-analysis led to greater generalizability, increased precision of the treatment effect, and similar findings (HR (95% CI) 1.6 (1.4-1.7)) with increased risk of porous tantalum cups. Interpretation - The meta-analytic technique is a viable option to address privacy, security, and data ownership concerns allowing more expansive registry collaboration, greater generalizability, and increased precision of treatment effects.

  2. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  3. A Registry Framework Enabling Patient-Centred Care.

    Science.gov (United States)

    Bellgard, Matthew I; Napier, Kathryn; Render, Lee; Radochonski, Maciej; Lamont, Leanne; Graham, Caroline; Wilton, Steve D; Fletcher, Sue; Goldblatt, Jack; Hunter, Adam A; Weeramanthri, Tarun

    2015-01-01

    Clinical decisions rely on expert knowledge that draws on quality patient phenotypic and physiological data. In this regard, systems that can support patient-centric care are essential. Patient registries are a key component of patient-centre care and can come in many forms such as disease-specific, recruitment, clinical, contact, post market and surveillance. There are, however, a number of significant challenges to overcome in order to maximise the utility of these information management systems to facilitate improved patient-centred care. Registries need to be harmonised regionally, nationally and internationally. However, the majority are implemented as standalone systems without consideration for data standards or system interoperability. Hence the task of harmonisation can become daunting. Fortunately, there are strategies to address this. In this paper, a disease registry framework is outlined that enables efficient deployment of national and international registries that can be modified dynamically as registry requirements evolve. This framework provides a basis for the development and implementation of data standards and enables patients to seamlessly belong to multiple registries. Other significant advances include the ability for registry curators to create and manage registries themselves without the need to contract software developers, and the concept of a registry description language for ease of registry template sharing.

  4. Current situation and challenge of registry in China.

    Science.gov (United States)

    Zhang, Yang; Feng, Yuji; Qu, Zhi; Qi, Yali; Zhan, Siyan

    2014-09-01

    Increasing emphasis has been placed on registries for an organized system used in developing clinical research to improve health care. China has sufficient data that can be applied broadly, but the heterogeneity and irregularity of registries limit their applicability. This article aims to describe the status of registries in China and the related challenges. Patient registries for observational studies were retrieved from the International Clinical Trials Registry to quantitatively evaluate the number of comparatively high-quality registries in China. A literature search was also performed to provide support and updates. A total of 64 patient registries were retrieved from ClinicalTrials.gov using disease, product, and health service as criteria. The sample sizes ranged from 15 to 30,400, with only 12 registries marked as completed. This article describes and compares the detailed information in many aspects. The efficient use of registries has already made considerable progress in China; however, registries still require standardization, high-quality transition, and coordinated development.

  5. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  6. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  7. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  8. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  9. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  10. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  11. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  12. The PROgnostic Value of unrequested Information in Diagnostic Imaging (PROVIDI) Study: rationale and design

    International Nuclear Information System (INIS)

    Gondrie, M. J. A.; Mali, W. P. Th. M.; Buckens, C. F. M.; Jacobs, P. C. A.; Grobbee, D. E.; Graaf, Y van der

    2010-01-01

    We describe the rationale for a new study examining the prognostic value of unrequested findings in diagnostic imaging. The deployment of more advanced imaging modalities in routine care means that such findings are being detected with increasing frequency. However, as the prognostic significance of many types of unrequested findings is unknown, the optimal response to such findings remains uncertain and in many cases an overly defensive approach is adopted, to the detriment of patient-care. Additionally, novel and promising image findings that are newly available on many routine scans cannot be used to improve patient care until their prognostic value is properly determined. The PROVIDI study seeks to address these issues using an innovative multi-center case-cohort study design. PROVIDI is to consist of a series of studies investigating specific, selected disease entities and clusters. Computed Tomography images from the participating hospitals are reviewed for unrequested findings. Subsequently, this data is pooled with outcome data from a central population registry. Study populations consist of patients with endpoints relevant to the (group of) disease(s) under study along with a random control sample from the cohort. This innovative design allows PROVIDI to evaluate selected unrequested image findings for their true prognostic value in a series of manageable studies. By incorporating unrequested image findings and outcomes data relevant to patients, truly meaningful conclusions about the prognostic value of unrequested and emerging image findings can be reached and used to improve patient-care.

  13. A Dutch Nationwide Bariatric Quality Registry: DATO.

    Science.gov (United States)

    Poelemeijer, Youri Q M; Liem, Ronald S L; Nienhuijs, Simon W

    2017-12-22

    In the Netherlands, the number of bariatric procedures increased exponentially in the 90s. To ensure and improve the quality of bariatric surgery, the nationwide Dutch Audit for Treatment of Obesity (DATO) was established in 2014. The audit was coordinated by the Dutch Institute for Clinical Auditing (DICA). This article provides a review of the aforementioned process in establishing a nationwide registry in the Netherlands. In collaboration with the DATO's scientific committee and other stakeholders, an annual list of several external quality indicators was formulated. This list consists of volume, process, and outcome indicators. In addition to the annual external indicators, the database permits individual hospitals to analyze their own data. The dashboard provides several standardized reports and detailed quality indicators, which are updated on a weekly base. Since the start, all 18 Dutch bariatric centers participated in the nationwide audit. A total of 21,941 cases were registered between 2015 and 2016. By 2016, the required variables were registered in 94.3% of all cases. A severe complicated course was seen in 2.87%, and mortality in 0.05% in 2016. The first-year follow-up shows a > 20% TWL in 86.1% of the registered cases. The DATO has become rapidly a mature registry. The well-organized structure of the national audit institution DICA and governmental funding were essential. However, most important were the bariatric teams themselves. The authors believe reporting the results from the registry has already contributed to more knowledge and acceptance by other health care providers.

  14. National registry of hemoglobinopathies in Spain (REPHem).

    Science.gov (United States)

    Cela, Elena; Bellón, José M; de la Cruz, María; Beléndez, Cristina; Berrueco, Rubén; Ruiz, Anna; Elorza, Izaskun; Díaz de Heredia, Cristina; Cervera, Aurea; Vallés, Griselda; Salinas, J Antonio; Coll, M Teresa; Bermúdez, Mar; Prudencio, Marta; Argilés, Bienvenida; Vecilla, Cruz

    2017-07-01

    Although highly prevalent throughout the world, the accurate prevalence of hemoglobinopathies in Spain is unknown. This study presents data on the national registry of hemoglobinopathies of patients with thalassemia major (TM), thalassemia intermedia (TI), and sickle cell disease (SCD) in Spain created in 2014. Fifty centers reported cases retrospectively. Data were registered from neonatal screening or from the first contact at diagnosis until last follow-up or death. Data of the 715 eligible patients were collected: 615 SCD (497 SS, 64 SC, 54 SBeta phenotypes), 73 thalassemia, 9 CC phenotype, and 18 other variants. Most of the SCD patients were born in Spain (65%), and 51% of these were diagnosed at newborn screening. Median age at the first diagnosis was 0.4 years for thalassemia and 1.0 years for SCD. The estimated incidence was 0.002 thalassemia cases and 0.03 SCD cases/1,000 live births. Median age was 8.9 years (0.2-33.7) for thalassemia and 8.1 years (0.2-32.8) for SCD patients. Stroke was registered in 16 SCD cases. Transplantation was performed in 43 TM and 23 SCD patients at a median age of 5.2 and 7.8 years, respectively. Twenty-one patients died (3 TM, 17 SCD, 1 CC) and 200 were lost to follow-up. Causes of death were related to transplantation in three patients with TM and three patients with SCD. Death did not seem to be associated with SCD in six patients, but nine patients died secondary to disease complications. Overall survival was 95% at 15 years of age. The registry provides data about the prevalence of hemoglobinopathies in Spain and will permit future cohort studies and the possibility of comparison with other registries. © 2016 Wiley Periodicals, Inc.

  15. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  16. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  17. Danish Registry of Childhood and Adolescent Diabetes

    Directory of Open Access Journals (Sweden)

    Svensson J

    2016-10-01

    Full Text Available Jannet Svensson,1 Charlotte Cerqueira,2 Per Kjærsgaard,3 Lene Lyngsøe,4 Niels Thomas Hertel,5 Mette Madsen,6 Henrik B Mortensen,1 Jesper Johannesen1 1Pediatric and Adolescent Department, Copenhagen University Hospital, Herlev and Gentofte, Herlev, 2Registry Support Centre (East – Epidemiology and Biostatistics, Research Centre for Prevention and Health, Capital Region of Denmark, Glostrup, 3Pediatric Department, County Hospital Herning, Herning, 4Pediatric and Adolescent Department, Nordsjællands Hospital, Hillerød, 5HC Andersen Childrens Hospital, Odense University Hospital, Odense, 6Pediatric Department, Aalborg University Hospital, Aalborg, Denmark Aim: The aims of the Danish Registry of Childhood and Adolescent Diabetes (DanDiabKids are to monitor and improve the quality of care for children and adolescents with diabetes in Denmark and to follow the incidence and prevalence of diabetes. Study population: The study population consists of all children diagnosed with diabetes before the age of 15 years since 1996. Since 2015, every child followed up at a pediatric center (<18 years of age will be included. Main variables: The variables in the registry are the quality indicators, demographic variables, associated conditions, diabetes classification, family history of diabetes, growth parameters, self-care, and treatment variables. The quality indicators are selected based on international consensus of measures of good clinical practice. The indicators are metabolic control as assessed by HbA1c, blood pressure, albuminuria, retinopathy, neuropathy, number of severe hypoglycemic events, and hospitalization with ketoacidosis. Descriptive data: The number of children diagnosed with diabetes is increasing with ~3% per year mainly for type 1 diabetes (ie, 296 new patients <15 years of age were diagnosed in 2014. The disease management has changed dramatically with more children treated intensively with multiple daily injections, insulin pumps

  18. The Danish Neuro-Oncology Registry

    DEFF Research Database (Denmark)

    Hansen, Steinbjørn

    2016-01-01

    AIM OF DATABASE: The Danish Neuro-Oncology Registry (DNOR) was established by the Danish Neuro-Oncology Group as a national clinical database. It was established for the purpose of supporting research and development in adult patients with primary brain tumors in Denmark. STUDY POPULATION: DNOR has...... advantage of reporting indicators is the related multidisciplinary discussions giving a better understanding of what actually is going on, thereby facilitating the work on adjusting the national guidelines in the Danish Neuro-Oncology Group. CONCLUSION: The establishment of DNOR has optimized the quality...

  19. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  20. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  1. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  2. Evidence and practice in spine registries A systematic review, and recommendations for future design of registries

    NARCIS (Netherlands)

    van Hooff, M.L.; Jacobs, W.C.H.; Willems, P.C.; Wouters, M.W.J.M.; de Kleuver, M.; Peul, W.C.; Ostelo, R.W.J.G.; Fritzell, P.

    2015-01-01

    Background and purpose-We performed a systematic review and a survey in order to (1) evaluate the evidence for the impact of spine registries on the quality of spine care, and with that, on patient-related outcomes, and (2) evaluate the methodology used to organize, analyze, and report the "quality

  3. The Danish Multiple Sclerosis Registry. History, data collection and validity

    DEFF Research Database (Denmark)

    Koch-Henriksen, N; Rasmussen, S; Stenager, E

    2001-01-01

    The Danish Multiple Sclerosis Registry was formally established in 1956 but started operating in 1949 with a nationwide prevalence survey. Since then, the Registry has continued collecting data on new and old cases of multiple sclerosis (MS) or suspected MS from multiple sources. The Registry...... instrument for monitoring incidence and prevalence, analysing survival, performing genetic analysis, providing unselected patient samples for clinical analyses, performing case-control studies and prospective studies and estimating the need for treatment and care....

  4. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  5. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  6. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  7. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  8. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  9. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  10. Evaluating the completeness of the national ALS registry, United States.

    Science.gov (United States)

    Kaye, Wendy E; Wagner, Laurie; Wu, Ruoming; Mehta, Paul

    2018-02-01

    Our objective was to evaluate the completeness of the United States National ALS Registry (Registry). We compared persons with ALS who were passively identified by the Registry with those actively identified in the State and Metropolitan Area ALS Surveillance project. Cases in the two projects were matched using a combination of identifiers, including, partial social security number, name, date of birth, and sex. The distributions of cases from the two projects that matched/did not match were compared and Chi-square tests conducted to determine statistical significance. There were 5883 ALS cases identified by the surveillance project. Of these, 1116 died before the Registry started, leaving 4767 cases. We matched 2720 cases from the surveillance project to those in the Registry. The cases identified by the surveillance project that did not match cases in the Registry were more likely to be non-white, Hispanic, less than 65 years of age, and from western states. The methods used by the Registry to identify ALS cases, i.e. national administrative data and self-registration, worked well but missed cases. These findings suggest that developing strategies to identify and promote the Registry to those who were more likely to be missing, e.g. non-white and Hispanic, could be beneficial to improving the completeness of the Registry.

  11. When Regional Innovation Policies Meet Policy Rationales and Evidence:

    DEFF Research Database (Denmark)

    Borrás, Susana; Jordana, Jacint

    regions, and to understand how rationales and evidence can be translated into policy-making. To this purpose, this paper develops a framework to study the extent to which regional innovation policies have changed during the past few years. Since the mid-2000s there has been an important development......In spite of recent advancements regarding regional innovation policy rationales and evidence, there are few analyses about the actual features of existing regional innovation policies. Nevertheless, a policy analysis perspective is important in order to recognise their distinctive patterns across...... of innovation policy rationales, advocating for more specialisation; likewise, greater data availability at the regional level has allowed more sophisticated assessment of innovation performance. Finally, the crisis since 2008 has had ravaging effects in some regions, with job losses and severe economic...

  12. When Regional Innovation Policies Meet Policy Rationales and Evidence

    DEFF Research Database (Denmark)

    Borrás, Susana; Jordana, Jacint

    2016-01-01

    regions, and to understand how rationales and evidence can be translated into policy-making. To this purpose, this paper develops a framework to study the extent to which regional innovation policies have changed during the past few years. Since the mid-2000s, there has been an important development......In spite of recent advancements regarding regional innovation policy rationales and evidence, there are few analyses about the actual features of existing regional innovation policies. Nevertheless, a policy analysis perspective is important in order to recognize their distinctive patterns across...... of innovation policy rationales, advocating for more specialization; likewise, greater data availability at the regional level has allowed more sophisticated assessment of innovation performance. Finally, the crisis since 2008 has had ravaging effects in some regions, with job losses and severe economic...

  13. The Three Mile Island Population Registry.

    Science.gov (United States)

    Goldhaber, M K; Tokuhata, G K; Digon, E; Caldwell, G G; Stein, G F; Lutz, G; Gur, D

    1983-01-01

    Shortly after the March 28, 1979, accident at the Three Mile Island (TMI) nuclear plant outside Harrisburg, Pa., the Pennsylvania Department of Health, in conjunction with the Centers for Disease Control and the U.S. Bureau of the Census, conducted a census of the 35,930 persons residing within 5 miles of the plant. With the help of 150 enumerators, demographic and health-related information was collected on each person to provide baseline data for future short- and long-term epidemiologic studies of the effects of the accident. Individual radiation doses were estimated on the basis of residential location and the amount of time each person spent in the 5-mile area during the 10 days after the accident. Health and behavioral resurveys of the population will be conducted approximately every 5 years. Population-mobility, morbidity, and mortality will be studied yearly by matching the TMI Population Registry with postal records, cancer registry records, and death certificate data. Because the radiation dose from TMI was extremely small, any increase in morbidity or mortality attributable to the accident would be so small as not to be measurable by present methods; however, adverse health effects as a result of psychological stress may occur. Also, a temporary increase in reporting of disease could occur because of increased surveillance and attention to health.

  14. Thyroid Cancer and Tumor Collaborative Registry (TCCR).

    Science.gov (United States)

    Shats, Oleg; Goldner, Whitney; Feng, Jianmin; Sherman, Alexander; Smith, Russell B; Sherman, Simon

    2016-01-01

    A multicenter, web-based Thyroid Cancer and Tumor Collaborative Registry (TCCR, http://tccr.unmc.edu) allows for the collection and management of various data on thyroid cancer (TC) and thyroid nodule (TN) patients. The TCCR is coupled with OpenSpecimen, an open-source biobank management system, to annotate biospecimens obtained from the TCCR subjects. The demographic, lifestyle, physical activity, dietary habits, family history, medical history, and quality of life data are provided and may be entered into the registry by subjects. Information on diagnosis, treatment, and outcome is entered by the clinical personnel. The TCCR uses advanced technical and organizational practices, such as (i) metadata-driven software architecture (design); (ii) modern standards and best practices for data sharing and interoperability (standardization); (iii) Agile methodology (project management); (iv) Software as a Service (SaaS) as a software distribution model (operation); and (v) the confederation principle as a business model (governance). This allowed us to create a secure, reliable, user-friendly, and self-sustainable system for TC and TN data collection and management that is compatible with various end-user devices and easily adaptable to a rapidly changing environment. Currently, the TCCR contains data on 2,261 subjects and data on more than 28,000 biospecimens. Data and biological samples collected by the TCCR are used in developing diagnostic, prevention, treatment, and survivorship strategies against TC.

  15. Pediatric Contact Dermatitis Registry Inaugural Case Data.

    Science.gov (United States)

    Goldenberg, Alina; Mousdicas, Nico; Silverberg, Nanette; Powell, Douglas; Pelletier, Janice L; Silverberg, Jonathan I; Zippin, Jonathan; Fonacier, Luz; Tosti, Antonella; Lawley, Leslie; Wu Chang, Mary; Scheman, Andrew; Kleiner, Gary; Williams, Judith; Watsky, Kalman; Dunnick, Cory A; Frederickson, Rachel; Matiz, Catalina; Chaney, Keri; Estes, Tracy S; Botto, Nina; Draper, Michelle; Kircik, Leon; Lugo-Somolinos, Aida; Machler, Brian; Jacob, Sharon E

    2016-01-01

    Little is known about the epidemiology of allergic contact dermatitis (ACD) in US children. More widespread diagnostic confirmation through epicutaneous patch testing is needed. The aim was to quantify patch test results from providers evaluating US children. The study is a retrospective analysis of deidentified patch test results of children aged 18 years or younger, entered by participating providers in the Pediatric Contact Dermatitis Registry, during the first year of data collection (2015-2016). One thousand one hundred forty-two cases from 34 US states, entered by 84 providers, were analyzed. Sixty-five percent of cases had one or more positive patch test (PPT), with 48% of cases having 1 or more relevant positive patch test (RPPT). The most common PPT allergens were nickel (22%), fragrance mix I (11%), cobalt (9.1%), balsam of Peru (8.4%), neomycin (7.2%), propylene glycol (6.8%), cocamidopropyl betaine (6.4%), bacitracin (6.2%), formaldehyde (5.7%), and gold (5.7%). This US database provides multidisciplinary information on pediatric ACD, rates of PPT, and relevant RPPT reactions, validating the high rates of pediatric ACD previously reported in the literature. The registry database is the largest comprehensive collection of US-only pediatric patch test cases on which future research can be built. Continued collaboration between patients, health care providers, manufacturers, and policy makers is needed to decrease the most common allergens in pediatric consumer products.

  16. The Mid-Atlantic Twin Registry, revisited.

    Science.gov (United States)

    Lilley, Emily C H; Silberg, Judy L

    2013-02-01

    The Mid-Atlantic Twin Registry (MATR) is a population-based registry of more than 56,000 twins primarily born or living in Virginia, North Carolina, and South Carolina. The MATR employs several methods of ascertaining twins, and devotes considerable resources to tracking and maintaining communication with MATR participants. Researchers may utilize the MATR for administration of research services including study recruitment, collection of DNA, archival data set creation, as well as data collection through mailed, phone, or online surveys. In addition, the MATR houses the MATR Repository, with over 1,200 blood samples available for researchers interested in DNA genotyping. For over 35 years MATR twins have participated in research studies with investigators from diverse scientific disciplines and various institutions. These studies, which have resulted in numerous publications, have covered a range of topics, including the human microbiome, developmental psychopathology, depression, anxiety, substance use, epigenetics of aging, children of twins, pre-term birth, social attitudes, seizures, eating disorders, as well as sleep homeostasis. Researchers interested in utilizing twins are encouraged to contact the MATR to discuss potential research opportunities.

  17. The national registry for radiation workers

    International Nuclear Information System (INIS)

    Kendall, G.M.; Dennis, J.A.

    1985-01-01

    The National Registry for Radiation Workers (NRRW) was set up by the National Radiological Protection Board in 1976. The analysis of registry data has four aims: a) To determine whether there is any evidence of differences in the causes of and ages at death of workers exposed to different levels of radiation and, if any differences are found, whether it seems likely that they can be attributed to radiation. b) To estimate the magnitude of the risk, if any differences are found, that seem likely to be attributable to radiation. c) To estimate bounds to the possible risk for particular types of malignancy, such as leukemia. d) To compare the mortality experience of radiation workers with national mortality data and also with that of other industrial groups for whom data exist. If current estimates of the risks of ionizing radiation are correct, very few deaths will be induced in the study population and it will be impossible to detect them statistically. The NRRW currently includes records for over 60,000 individuals. 6 refs

  18. Patient reported outcomes in hip arthroplasty registries.

    Science.gov (United States)

    Paulsen, Aksel

    2014-05-01

    PROs are used increasingly in orthopedics and in joint registries, but still many aspects of use in this area have not been examined in depth. To be able to introduce PROs in the DHR in a scientific fashion, my studies were warranted; the feasibility of four often used PROs (OHS, HOOS, EQ-5D and SF-12) was examined in a registry context. Having the PROs in the target language is an absolute necessity, so I translated, cross-culturally adapted and validated a Danish language version of an often used PRO (OHS), since this PRO had no properly developed Danish language version. To minimize data loss and to maximize the data quality I validated our data capture procedure, an up to date AFP system, by comparing scannable, paper-based PROs, with manual single-key- and double-key entered data. To help further registry-PRO studies, I calculated the number of patients needed to discriminate between subgroups of age, sex, diagnosis, and prosthesis type for each of four often used PROs (OHS, HOOS, EQ-5D and SF-12), and to simplify the clinical interpretation of PRO scores and PRO change scores in PRO studies, I estimated MCII and PASS for two often used PROs (EQ-5D and HOOS). The feasibility study included 5,747 THA patients registered in the DHR, and I found only minor differences between the disease-specific and the generic PROs regarding ceiling and floor effects as well as discarded items. The HOOS, the OHS, the SF-12, and the EQ-5D are all appropriate PROs for administration in a hip registry. I found that group sizes from 51 to 1,566 were needed for subgroup analysis, depending on descriptive factors and choice of PRO. The AFP study included 200 THA patients (398 PROs, 4,875 items and 21,887 data fields), and gave excellent results provided use of highly structured questionnaires. OMR performed equally as well as manual double-key entering, and better than single-key entering. The PRO translation and validation study included 2,278 patients (and 212 patients for the test

  19. Novel features of 3q29 deletion syndrome: Results from the 3q29 registry

    Science.gov (United States)

    Glassford, Megan R.; Rosenfeld, Jill A.; Freedman, Alexa A.; Zwick, Michael E.

    2016-01-01

    3q29 deletion syndrome is caused by a recurrent, typically de novo heterozygous 1.6 Mb deletion, but because incidence of the deletion is rare (1 in 30,000 births) the phenotype is not well described. To characterize the range of phenotypic manifestations associated with 3q29 deletion syndrome, we have developed an online registry (3q29deletion.org) for ascertainment of study subjects and phenotypic data collection via Internet‐based survey instruments. We report here on data collected during the first 18 months of registry operation, from 44 patients. This is the largest cohort of 3q29 deletion carriers ever assembled and surveyed in a systematic way. Our data reveal that 28% of registry participants report neuropsychiatric phenotypes, including anxiety disorder, panic attacks, depression, bipolar disorder, and schizophrenia. Other novel findings include a high prevalence (64%) of feeding problems in infancy and reduced weight at birth for 3q29 deletion carriers (average reduction 13.9 oz (394 g), adjusted for gestational age and sex, P = 6.5e‐07). We further report on the frequency of heart defects, autism, recurrent ear infections, gastrointestinal phenotypes, and dental phenotypes, among others. We also report on the expected timing of delayed developmental milestones. This is the most comprehensive description of the 3q29 deletion phenotype to date. These results are clinically actionable toward improving patient care for 3q29 deletion carriers, and can guide the expectations of physicians and parents. These data also demonstrate the value of patient‐reported outcomes to reveal the full phenotypic spectrum of rare genomic disorders. © 2016 The Authors. American Journal of Medical Genetics Part A Published by Wiley Periodicals, Inc. PMID:26738761

  20. Readmissions after stroke: linked data from the Australian Stroke Clinical Registry and hospital databases.

    Science.gov (United States)

    Kilkenny, Monique F; Dewey, Helen M; Sundararajan, Vijaya; Andrew, Nadine E; Lannin, Natasha; Anderson, Craig S; Donnan, Geoffrey A; Cadilhac, Dominique A

    2015-07-20

    To assess the feasibility of linking a national clinical stroke registry with hospital admissions and emergency department data; and to determine factors associated with hospital readmission after stroke or transient ischaemic attack (TIA) in Australia. Data from the Australian Stroke Clinical Registry (AuSCR) at a single Victorian hospital were linked to coded, routinely collected hospital datasets for admissions (Victorian Admitted Episodes Dataset) and emergency presentations (Victorian Emergency Minimum Dataset) in Victoria from 15 June 2009 to 31 December 2010, using stepwise deterministic data linkage techniques. Association of patient characteristics, social circumstances, processes of care and discharge outcomes with all-cause readmissions within 1 year from time of hospital discharge after an index admission for stroke or TIA. Of 788 patients registered in the AuSCR, 46% (359/781) were female, 83% (658/788) had a stroke, and the median age was 76 years. Data were successfully linked for 782 of these patients (99%). Within 1 year of their index stroke or TIA event, 42% of patients (291/685) were readmitted, with 12% (35/286) readmitted due to a stroke or TIA. Factors significantly associated with 1-year hospital readmission were two or more presentations to an emergency department before the index event (adjusted odds ratio [aOR], 1.57; 95% CI, 1.02-2.43), higher Charlson comorbidity index score (aOR, 1.19; 95% CI, 1.07-1.32) and diagnosis of TIA on the index admission (aOR, 2.15; 95% CI, 1.30-3.56). Linking clinical registry data with routinely collected hospital data for stroke and TIA is feasible in Victoria. Using these linked data, we found that readmission to hospital is common in this patient group and is related to their comorbid conditions.

  1. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  2. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  3. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  4. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  5. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  6. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  7. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  8. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  9. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  10. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  11. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  12. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  13. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  14. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  15. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  16. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  17. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  18. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  19. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  20. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  1. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  2. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  3. The GEOSS Component and Service Registry

    Science.gov (United States)

    Di, L.; Bai, Y.; Shen, D.; Shao, Y.; Shrestha, R.; Wang, H.; Nebert, D. D.

    2011-12-01

    Petabytes of Earth science data have been accumulated through space- and air-borne Earth observation programs during the last several decades. The data are valuable both scientifically and socioeconomically. The value of these data could be further increased significantly if the data from these programs can be easily discovered, accessed, integrated, and analyzed. The Global Earth Observation System of Systems (GEOSS) is addressing this need. Coordinated by the Group on Earth Observations (or GEO), a voluntary partnership of 86 governments, the European Commission, and 61 intergovernmental, international, and regional organizations has been working on implementing GEOSS for a number of years. After four years of international collaboration, the GEOSS Common Infrastructure (GCI) has been established. GCI consists of the Standards and Interoperability Registry (SIR), the Component and Service Registry (CSR), the GEO clearinghouse, and the GEO Portal. The SIR maintains the list of the public standards recognized by the GEO. CSR provides a centralized registry for available Earth Observation resources. The GEO clearinghouse works as a single search facility for GEOSS-wide resources and the GEO Portal provides an integrated Web-based interfaces for users. Since January 2007, researchers at CSISS, GMU have collaborated with officials from the Federal Geographic Data Committee (FGDC) on designing, implementing, maintaining, and upgrading CSR. Currently CSR provides the following capabilities for data providers: user registration, resource registration, and service interface registration. The CSR clients can discover the resources registered in CSR through OGC Catalog for Web (CSW), UUDI, and other standard interfaces. During the resource registration process, providers may define detailed descriptive information for their resources, in particular, the targeted societal benefit area and sub-areas of focus, and the targeted critical Earth Observations. The service

  4. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  5. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  6. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  7. Quality of trauma care and trauma registries.

    Science.gov (United States)

    Pino Sánchez, F I; Ballesteros Sanz, M A; Cordero Lorenzana, L; Guerrero López, F

    2015-03-01

    Traumatic disease is a major public health concern. Monitoring the quality of services provided is essential for the maintenance and improvement thereof. Assessing and monitoring the quality of care in trauma patient through quality indicators would allow identifying opportunities for improvement whose implementation would improve outcomes in hospital mortality, functional outcomes and quality of life of survivors. Many quality indicators have been used in this condition, although very few ones have a solid level of scientific evidence to recommend their routine use. The information contained in the trauma registries, spread around the world in recent decades, is essential to know the current health care reality, identify opportunities for improvement and contribute to the clinical and epidemiological research. Copyright © 2014 Elsevier España, S.L.U. and SEMICYUC. All rights reserved.

  8. The Danish National Multiple Myeloma Registry

    DEFF Research Database (Denmark)

    Gimsing, Peter; Holmström, Morten Orebo; Klausen, Tobias Wirenfelt

    2016-01-01

    AIM: The Danish National Multiple Myeloma Registry (DMMR) is a population-based clinical quality database established in January 2005. The primary aim of the database is to ensure that diagnosis and treatment of plasma cell dyscrasia are of uniform quality throughout the country. Another aim...... diagnosed patients with multiple myeloma (MM), smoldering MM, solitary plasmacytomas, and plasma cell leukemia in Denmark are registered annually; ~350 patients. Amyloid light-chain amyloidosis, POEMS syndrome (polyneuropathy, organomegaly, endocrinopathy, monoclonal gammopathy, and skin changes syndrome......), monoclonal gammopathy of undetermined significance and monoclonal gammopathy of undetermined significance with polyneuropathy have been registered since 2014. MAIN VARIABLES: The main registered variables at diagnosis are patient demographics, baseline disease characteristics, myeloma-defining events...

  9. The Danish Registry of Diabetic Retinopathy

    DEFF Research Database (Denmark)

    Andersen, Nis; Hjortdal, Jesper Østergaard; Schielke, Katja Christina

    2016-01-01

    . Denmark (5.5 million inhabitants) has ~320,000 diabetes patients with an annual increase of 27,000 newly diagnosed patients. The Danish Registry of Diabetic Retinopathy (DiaBase) collects data on all diabetes patients aged ≥18 years who attend screening for diabetic eye disease in hospital eye departments...... and in private ophthalmological practice. In 2014-2015, DiaBase included data collected from 77,968 diabetes patients. Main variables: The main variables provide data for calculation of performance indicators to monitor the quality of diabetic eye screening and development of diabetic retinopathy. Data...... with respect to age, sex, best corrected visual acuity, screening frequency, grading of diabetic retinopathy and maculopathy at each visit, progression/regression of diabetic eye disease, and prevalence of blindness were obtained. Data analysis from DiaBase’s latest annual report (2014-2015) indicates...

  10. Danish Registry of Childhood and Adolescent Diabetes

    DEFF Research Database (Denmark)

    Svensson, Jannet; Cerqueira, Charlotte; Kjærsgaard, Per

    2016-01-01

    children diagnosed with diabetes before the age of 15 years since 1996. Since 2015, every child followed up at a pediatric center (years of age) will be included. MAIN VARIABLES: The variables in the registry are the quality indicators, demographic variables, associated conditions, diabetes......, neuropathy, number of severe hypoglycemic events, and hospitalization with ketoacidosis. DESCRIPTIVE DATA: The number of children diagnosed with diabetes is increasing with ∼3% per year mainly for type 1 diabetes (ie, 296 new patients years of age were diagnosed in 2014). The disease management has...... classification, family history of diabetes, growth parameters, self-care, and treatment variables. The quality indicators are selected based on international consensus of measures of good clinical practice. The indicators are metabolic control as assessed by HbA1c, blood pressure, albuminuria, retinopathy...

  11. The Danish Registry of Diabetic Retinopathy

    DEFF Research Database (Denmark)

    Andersen, Nis; Hjortdal, Jesper Østergaard; Schielke, Katja Christina

    2016-01-01

    . Denmark (5.5 million inhabitants) has ~320,000 diabetes patients with an annual increase of 27,000 newly diagnosed patients. The Danish Registry of Diabetic Retinopathy (DiaBase) collects data on all diabetes patients aged ≥18 years who attend screening for diabetic eye disease in hospital eye departments...... and in private ophthalmological practice. In 2014-2015, DiaBase included data collected from 77,968 diabetes patients. MAIN VARIABLES: The main variables provide data for calculation of performance indicators to monitor the quality of diabetic eye screening and development of diabetic retinopathy. Data...... with respect to age, sex, best corrected visual acuity, screening frequency, grading of diabetic retinopathy and maculopathy at each visit, progression/regression of diabetic eye disease, and prevalence of blindness were obtained. Data analysis from DiaBase's latest annual report (2014-2015) indicates...

  12. The Corrona US registry of rheumatic and autoimmune diseases.

    Science.gov (United States)

    Kremer, Joel M

    2016-01-01

    The Corrona US national registry collects data concerning patient status from both the rheumatologist and patient at routine clinical encounters. Corrona has functioning disease registries in rheumatoid arthritis, psoriatic arthritis, spondyloarthropathies, psoriasis and inflammatory bowel disease. Corrona merges data concerning long-term effectiveness and safety, as well as comparative and cost effectiveness of agents to treat these autoimmune diseases.

  13. Data quality in the Danish National Acute Leukemia Registry

    DEFF Research Database (Denmark)

    Ostgård, Lene Sofie Granfeldt; Nørgaard, Jan Maxwell; Severinsen, Marianne Tang

    2013-01-01

    The Danish National Acute Leukemia Registry (DNLR) has documented coverage of above 98.5%. Less is known about the quality of the recorded data.......The Danish National Acute Leukemia Registry (DNLR) has documented coverage of above 98.5%. Less is known about the quality of the recorded data....

  14. Paper 6: EUROCAT member registries: organization and activities

    DEFF Research Database (Denmark)

    Greenlees, Ruth; Neville, Amanda; Addor, Marie-Claude

    2011-01-01

    EUROCAT is a network of population-based congenital anomaly registries providing standardized epidemiologic information on congenital anomalies in Europe. There are three types of EUROCAT membership: full, associate, or affiliate. Full member registries send individual records of all congenital a...

  15. Cancer incidence in Morocco: report from Casablanca registry 2005 ...

    African Journals Online (AJOL)

    Introduction: Few population-based cancer registries are in place in developing countries. In order to know the burden of cancer in Moroccan population, cancer registry initiative was put in place in the Casablanca district, the biggest city of Morocco. Methods: The data collected covers 3.6 millions inhabitant and included ...

  16. 42 CFR 483.156 - Registry of nurse aides.

    Science.gov (United States)

    2010-10-01

    ... the registry because they have performed no nursing or nursing-related services for a period of 24... individual was found not guilty in a court of law, or the State is notified of the individual's death. (2) The registry must remove entries for individuals who have performed no nursing or nursing-related...

  17. 37 CFR 201.25 - Visual Arts Registry.

    Science.gov (United States)

    2010-07-01

    ... the copyright law. Visual Arts Registry Statements which are illegible or fall outside of the scope of... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Visual Arts Registry. 201.25 Section 201.25 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT OFFICE...

  18. Development of the SIOPE DIPG network, registry and imaging repository

    DEFF Research Database (Denmark)

    Veldhuijzen van Zanten, Sophie E M; Baugh, Joshua; Chaney, Brooklyn

    2017-01-01

    was developed, The SIOPE DIPG Registry and Imaging Repository, to centrally collect data of DIPG patients. As for April 2016, clinical data as well as MR-scans of 694 patients have been entered into the SIOPE DIPG Registry/Imaging Repository. The median progression free survival is 6.0 months (95% Confidence...

  19. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  20. HAMMLAB 1999 experimental control room: design - design rationale - experiences

    International Nuclear Information System (INIS)

    Foerdestroemmen, N. T.; Meyer, B. D.; Saarni, R.

    1999-01-01

    A presentation of HAMMLAB 1999 experimental control room, and the accumulated experiences gathered in the areas of design and design rationale as well as user experiences. It is concluded that HAMMLAB 1999 experimental control room is a realistic, compact and efficient control room well suited as an Advanced NPP Control Room (ml)

  1. Building "Applied Linguistic Historiography": Rationale, Scope, and Methods

    Science.gov (United States)

    Smith, Richard

    2016-01-01

    In this article I argue for the establishment of "Applied Linguistic Historiography" (ALH), that is, a new domain of enquiry within applied linguistics involving a rigorous, scholarly, and self-reflexive approach to historical research. Considering issues of rationale, scope, and methods in turn, I provide reasons why ALH is needed and…

  2. Learning Rationales and Virtual Reality Technology in Education.

    Science.gov (United States)

    Chiou, Guey-Fa

    1995-01-01

    Defines and describes virtual reality technology and differentiates between virtual learning environment, learning material, and learning tools. Links learning rationales to virtual reality technology to pave conceptual foundations for application of virtual reality technology education. Constructivism, case-based learning, problem-based learning,…

  3. Rationale of Early Adopters of Fossil Fuel Divestment

    Science.gov (United States)

    Beer, Christopher Todd

    2016-01-01

    Purpose: This research uses the social science perspectives of institutions, ecological modernization and social movements to analyze the rationale used by the early-adopting universities of fossil fuel divestment in the USA. Design/methodology/approach: Through analysis of qualitative data from interviews with key actors at the universities that…

  4. Karl Popper and Jean Piaget: A Rationale for Constructivism

    Science.gov (United States)

    Harlow, Steve; Cummings, Rhoda; Aberasturi, Suzanne M.

    2006-01-01

    The current faddish use of the term constructivism has taken on as many different definitions as the number of people attempting to define it. This essay clarifies the meaning of constructivism through an examination of Karl Popper's and Jean Piaget's theories. The authors provide a rationale for the use of Popper's paradigm of "Three Worlds" and…

  5. Oral Health Promotion in Schools: Rationale and Evaluation

    Science.gov (United States)

    Kizito, Alex; Caitlin, Meredith; Wang, Yili; Kasangaki, Arabat; Macnab, Andrew J.

    2014-01-01

    Purpose: The purpose of this paper is to explain the rationale and potential for the WHO health promoting schools (HPS) to improve children's oral health, and describe validated quantitative methodologies and qualitative approaches to measure program impact. Design/Methodology/Approach: Critical discussion of the impact of poor oral health and…

  6. Rationale for the Cultural Construction of School Mental Health Programming

    Science.gov (United States)

    Arora, Prerna G.; Nastasi, Bonnie K.; Leff, Stephen S.

    2017-01-01

    The implementation of evidence-based psychological programming to meet the needs of a global population has been impeded by the translation of theories and research findings across populations and settings without due consideration of cultural factors. The purpose of this article is to discuss the rationale for use of partnership-based methods in…

  7. "ComPost": A Writing Program Newsletter and Its Rationale.

    Science.gov (United States)

    Hall, Dennis R.

    1993-01-01

    Discusses the development and rationale of "ComPost," a weekly newsletter of the Composition Program at the University of Louisville. Suggests that a vehicle like ComPost can promote the communications that contribute to accomplishing collegiality and genuine program consensus. (RS)

  8. Invitation to the Birthday Party: Rationale and Description

    Science.gov (United States)

    Ginsburg, Herbert P.; Pappas, Sandra

    2016-01-01

    Educators in many countries around the world have a strong interest in improving early childhood mathematics education, one component of which is formative assessment. Unlike summative assessment, this approach can provide teachers with information useful for understanding and teaching individual children. This paper describes the rationale for…

  9. The rationale of scored tablets as dosage form.

    NARCIS (Netherlands)

    Rodenhuis, N.; Smet, P.A.G.M. de; Barends, D.M.

    2004-01-01

    The aim of the study was to get insight into the rationale of scored tablets. This was pursued by studying patient's reasons for subdividing ("breaking") scored and unscored tablets. Patients who picked up their prescriptions in 5 community pharmacies in The Netherlands were questioned. Two-hundred

  10. Genomewide Association Studies: History, Rationale, and Prospects for Psychiatric Disorders

    NARCIS (Netherlands)

    Cichon, S.; Craddock, N.; Daly, M.J.; Faraone, S.V.; Gejman, P.V.; Kelsoe, J.; Lehner, T.; Levinson, D.F.; Moran, A.P.; Sklar, P.; Sullivan, P.F.; Boomsma, D.I.; de Geus, E.J.C.; Posthuma, D.; Willemsen, G.

    2009-01-01

    Objective: The authors conducted a review of the history and empirical basis of genomewide association studies (GWAS), the rationale for GWAS of psychiatric disorders, results to date, limitations, and plans for GWAS meta-analyses. Method: A literature review was carried out, power and other issues

  11. Genomewide association studies: history, rationale, and prospects for psychiatric disorders.

    NARCIS (Netherlands)

    Franke, B.; Buitelaar, J.K.; Cichon, S.; Craddock, N.; Daly, M.; Faraone, S.V.; Gejman, P.V.; Kelsoe, J.; Lehner, T.; Levinson, D.F.; Moran, A.; Sklar, P.; Sullivan, P.F.

    2009-01-01

    OBJECTIVE: The authors conducted a review of the history and empirical basis of genomewide association studies (GWAS), the rationale for GWAS of psychiatric disorders, results to date, limitations, and plans for GWAS meta-analyses. METHOD: A literature review was carried out, power and other issues

  12. Meeting a Moral Imperative: A Rationale for Teaching the Holocaust

    Science.gov (United States)

    Lindquist, David H.

    2011-01-01

    A primary rationale for studying the Holocaust (Shoah) involves the opportunity to consider the moral implications that can be drawn from examining the event. Studying the Shoah forces students to consider what it means to be human and humane by examining the full continuum of individual behavior, from "ultimate evil" to "ultimate good". This…

  13. Rationales behind the choice of administration form with fentanyl

    DEFF Research Database (Denmark)

    Jacobsen, Ramune; Møldrup, Claus; Christrup, Lona

    2010-01-01

    BACKGROUND AND AIM: The aim of this study was to describe the rationale behind the choice of fentanyl administration forms among Danish general practitioners (GPs). METHODS: Thirty-eight Danish GPs were contacted via an Internet survey system to perform a Delphi survey. In the brainstorming phase...

  14. I RBH - First Brazilian Hypertension Registry.

    Science.gov (United States)

    Jardim, Paulo César Brandão Veiga; Souza, Weimar Kunz Sebba Barroso de; Lopes, Renato Delascio; Brandão, Andréa Araújo; Malachias, Marcus V Bolívar; Gomes, Marco Mota; Moreno Júnior, Heitor; Barbosa, Eduardo Costa Duarte; Póvoa, Rui Manoel Dos Santos

    2016-08-01

    A registry assessing the care of hypertensive patients in daily clinical practice in public and private centers in various Brazilian regions has not been conducted to date. Such analysis is important to elucidate the effectiveness of this care. To document the current clinical practice for the treatment of hypertension with identification of the profile of requested tests, type of administered treatment, level of blood pressure (BP) control, and adherence to treatment. National, observational, prospective, and multicenter study that will include patients older than 18 years with hypertension for at least 4 weeks, following up in public and private centers and after signing a consent form. The study will exclude patients undergoing dialysis, hospitalized in the previous 30 days, with class III or IV heart failure, pregnant or nursing, with severe liver disease, stroke or acute myocardial infarction in the past 30 days, or with diseases with a survival prognosis crisis, cardiocirculatory events, and cardiovascular death, while secondary outcomes will be hospitalization for heart failure and requirement of dialysis. A subgroup analysis of 15% of the sample will include noninvasive central pressure evaluation at baseline and study end. The estimated sample size is 3,000 individuals for a prevalence of 5%, sample error of 2%, and 95% confidence interval. The results will be presented after the final evaluation, which will occur at the end of a 1-year follow-up. The analysis of this registry will improve the knowledge and optimize the treatment of hypertension in Brazil, as a way of modifying the prognosis of cardiovascular disease in the country.

  15. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  16. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  17. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  18. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  19. Advantages and limitations of national arthroplasty registries. The need for multicenter registries: the Rempro-SBQ

    Directory of Open Access Journals (Sweden)

    Luiz Sérgio Marcelino Gomes

    Full Text Available Abstract While the value of national arthroplasty registries (NAR for quality improvement in total hip arthroplasty (THA has already been widely reported, some methodological limitations associated with observational epidemiological studies that may interfere with the assessment of safety and efficacy of prosthetic implants have recently been described in the literature. Among the main limitations of NAR, the need for at least 80% compliance of all health institutions covered by the registry is emphasized; completeness equal or greater than 90% of all THA performed; restricted data collection; use of revision surgery as the sole criterion for outcome; and the inability of establishing a definite causal link with prosthetic dysfunction. The present article evaluates the advantages and limitations of NAR, in the light of current knowledge, which point to the need for a broader data collection and the use of more structured criteria for defining outcomes. In this scenario, the authors describe of idealization, conceptual and operational structure, and the project of implantation and implementation of a multicenter registry model, called Rempro-SBQ, which includes healthcare institutions already linked to the Brazilian Hip Society (Sociedade Brasileira de Quadril [SBQ]. This partnership enables the collection of more reliable and comprehensive data at a higher hierarchical level, with a significant reduction in maintenance and financing costs. The quality improvement actions supported by SBQ may enhance its effectiveness and stimulate greater adherence for collecting, storing, interpreting, and disseminating information (feedback.

  20. Advantages and limitations of national arthroplasty registries. The need for multicenter registries: the Rempro-SBQ.

    Science.gov (United States)

    Gomes, Luiz Sérgio Marcelino; Roos, Milton Valdomiro; Takata, Edmilson Takehiro; Schuroff, Ademir Antônio; Alves, Sérgio Delmonte; Camisa Júnior, Antero; Miranda, Ricardo Horta

    2017-01-01

    While the value of national arthroplasty registries (NAR) for quality improvement in total hip arthroplasty (THA) has already been widely reported, some methodological limitations associated with observational epidemiological studies that may interfere with the assessment of safety and efficacy of prosthetic implants have recently been described in the literature. Among the main limitations of NAR, the need for at least 80% compliance of all health institutions covered by the registry is emphasized; completeness equal or greater than 90% of all THA performed; restricted data collection; use of revision surgery as the sole criterion for outcome; and the inability of establishing a definite causal link with prosthetic dysfunction. The present article evaluates the advantages and limitations of NAR, in the light of current knowledge, which point to the need for a broader data collection and the use of more structured criteria for defining outcomes. In this scenario, the authors describe of idealization, conceptual and operational structure, and the project of implantation and implementation of a multicenter registry model, called Rempro-SBQ, which includes healthcare institutions already linked to the Brazilian Hip Society (Sociedade Brasileira de Quadril [SBQ]). This partnership enables the collection of more reliable and comprehensive data at a higher hierarchical level, with a significant reduction in maintenance and financing costs. The quality improvement actions supported by SBQ may enhance its effectiveness and stimulate greater adherence for collecting, storing, interpreting, and disseminating information (feedback).

  1. Limitations of drug registries to evaluate orphan medicinal products for the treatment of lysosomal storage disorders

    NARCIS (Netherlands)

    Hollak, Carla E. M.; Aerts, Johannes M. F. G.; Aymé, Ségolène; Manuel, Jeremy

    2011-01-01

    Orphan drugs are often approved under exceptional circumstances, requiring submission of additional data on safety and effectiveness through registries. These registries are mainly focused on one drug only and data is frequently incomplete. Some registries also address phenotypic heterogeneity and

  2. Protecting buildings from a biological or chemical attack: Actions to take before or during a release

    Energy Technology Data Exchange (ETDEWEB)

    Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

    2003-01-29

    This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

  3. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  4. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  5. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  6. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  7. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  8. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  9. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  10. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  11. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  12. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  13. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  14. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  15. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  16. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  17. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  18. Glocal clinical registries: pacemaker registry design and implementation for global and local integration--methodology and case study.

    Directory of Open Access Journals (Sweden)

    Kátia Regina da Silva

    Full Text Available The ability to apply standard and interoperable solutions for implementing and managing medical registries as well as aggregate, reproduce, and access data sets from legacy formats and platforms to advanced standard formats and operating systems are crucial for both clinical healthcare and biomedical research settings.Our study describes a reproducible, highly scalable, standard framework for a device registry implementation addressing both local data quality components and global linking problems.We developed a device registry framework involving the following steps: (1 Data standards definition and representation of the research workflow, (2 Development of electronic case report forms using REDCap (Research Electronic Data Capture, (3 Data collection according to the clinical research workflow and, (4 Data augmentation by enriching the registry database with local electronic health records, governmental database and linked open data collections, (5 Data quality control and (6 Data dissemination through the registry Web site. Our registry adopted all applicable standardized data elements proposed by American College Cardiology / American Heart Association Clinical Data Standards, as well as variables derived from cardiac devices randomized trials and Clinical Data Interchange Standards Consortium. Local interoperability was performed between REDCap and data derived from Electronic Health Record system. The original data set was also augmented by incorporating the reimbursed values paid by the Brazilian government during a hospitalization for pacemaker implantation. By linking our registry to the open data collection repository Linked Clinical Trials (LinkedCT we found 130 clinical trials which are potentially correlated with our pacemaker registry.This study demonstrates how standard and reproducible solutions can be applied in the implementation of medical registries to constitute a re-usable framework. Such approach has the potential to

  19. Glocal Clinical Registries: Pacemaker Registry Design and Implementation for Global and Local Integration – Methodology and Case Study

    Science.gov (United States)

    da Silva, Kátia Regina; Costa, Roberto; Crevelari, Elizabeth Sartori; Lacerda, Marianna Sobral; de Moraes Albertini, Caio Marcos; Filho, Martino Martinelli; Santana, José Eduardo; Vissoci, João Ricardo Nickenig; Pietrobon, Ricardo; Barros, Jacson V.

    2013-01-01

    Background The ability to apply standard and interoperable solutions for implementing and managing medical registries as well as aggregate, reproduce, and access data sets from legacy formats and platforms to advanced standard formats and operating systems are crucial for both clinical healthcare and biomedical research settings. Purpose Our study describes a reproducible, highly scalable, standard framework for a device registry implementation addressing both local data quality components and global linking problems. Methods and Results We developed a device registry framework involving the following steps: (1) Data standards definition and representation of the research workflow, (2) Development of electronic case report forms using REDCap (Research Electronic Data Capture), (3) Data collection according to the clinical research workflow and, (4) Data augmentation by enriching the registry database with local electronic health records, governmental database and linked open data collections, (5) Data quality control and (6) Data dissemination through the registry Web site. Our registry adopted all applicable standardized data elements proposed by American College Cardiology / American Heart Association Clinical Data Standards, as well as variables derived from cardiac devices randomized trials and Clinical Data Interchange Standards Consortium. Local interoperability was performed between REDCap and data derived from Electronic Health Record system. The original data set was also augmented by incorporating the reimbursed values paid by the Brazilian government during a hospitalization for pacemaker implantation. By linking our registry to the open data collection repository Linked Clinical Trials (LinkedCT) we found 130 clinical trials which are potentially correlated with our pacemaker registry. Conclusion This study demonstrates how standard and reproducible solutions can be applied in the implementation of medical registries to constitute a re-usable framework

  20. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  1. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  2. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  3. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  4. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  5. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  6. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  7. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  8. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  9. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  10. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  11. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  12. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  13. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  14. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  15. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  16. The Danish National Chronic Myeloid Neoplasia Registry

    Directory of Open Access Journals (Sweden)

    Bak M

    2016-10-01

    Full Text Available Marie Bak,1 Else Helene Ibfelt,2 Thomas Stauffer Larsen,3 Dorthe Rønnov-Jessen,4 Niels Pallisgaard,5 Ann Madelung,6 Lene Udby,1 Hans Carl Hasselbalch,1 Ole Weis Bjerrum,7 Christen Lykkegaard Andersen1,7 1Department of Hematology, Zealand University Hospital, University of Copenhagen, Roskilde, 2Research Centre for Prevention and Health, Rigshospitalet Glostrup, University of Copenhagen, Glostrup, 3Department of Hematology, Odense University Hospital, Odense, 4Department of Hematology, Vejle Hospital, Vejle, 5Department of Surgical Pathology, Zealand University Hospital, University of Copenhagen, Roskilde, 6Department of Surgical Pathology, Zealand University Hospital, University of Copenhagen, Næstved, 7Department of Hematology, Rigshospitalet, University of Copenhagen, Copenhagen, Denmark Aim: The Danish National Chronic Myeloid Neoplasia Registry (DCMR is a population-based clinical quality database, introduced to evaluate diagnosis and treatment of patients with chronic myeloid malignancies. The aim is to monitor the clinical quality at the national, regional, and hospital departmental levels and serve as a platform for research. Study population: The DCMR has nationwide coverage and contains information on patients diagnosed at hematology departments from January 2010 onward, including patients with essential thrombocythemia, polycythemia vera, myelofibrosis, unclassifiable myeloproliferative neoplasms, chronic myelomonocytic leukemia, and chronic myeloid leukemia. Main variables: Data are collected using standardized registration forms (so far up to four forms per patient, which are consecutively filled out online at time of diagnosis, after 2-year and 5-year follow-ups, and at end of follow-up. The forms include variables that describe clinical/paraclinical assessments, treatment, disease progression, and survival – disease-specific variables – as well as variables that are identical for all chronic myeloid malignancies. Descriptive

  17. Marrow donor registry and cord blood bank in Taiwan.

    Science.gov (United States)

    Lee, Tsung Dao

    2002-08-01

    Unrelated Bone marrow transplant was initiated thirty years ago. Though there are over millions of donors registered with the bone marrow registries worldwide, Asian patients rarely find a match with all these donors. Tzu Chi Marrow Donor Registry was established to meet this need. It has become the largest Asian marrow donor registry in the world. With the introduction of high technology to test the HLA of the donors and recipients, the success rate of bone marrow transplant is greatly improved among Asian countries. 50% of blood disease Asian patients who cannot find a bone marrow matched donor will be complemented by the establishment of cord blood banks in Taiwan.

  18. EPA Facility Registry System (FRS): NCES

    Science.gov (United States)

    This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link to the National Center for Education Statistics (NCES). The primary federal database for collecting and analyzing data related to education in the United States and other Nations, NCES is located in the U.S. Department of Education, within the Institute of Education Sciences. FRS identifies and geospatially locates facilities, sites or places subject to environmental regulations or of environmental interest. Using vigorous verification and data management procedures, FRS integrates facility data from EPA00e2??s national program systems, other federal agencies, and State and tribal master facility records and provides EPA with a centrally managed, single source of comprehensive and authoritative information on facilities. This data set contains the subset of FRS integrated facilities that link to NCES school facilities once the NCES data has been integrated into the FRS database. Additional information on FRS is available at the EPA website http://www.epa.gov/enviro/html/fii/index.html.

  19. Italian registry of cardiac magnetic resonance

    Energy Technology Data Exchange (ETDEWEB)

    Francone, Marco [Department of Radiological, Oncological and Pathological Sciences, Sapienza University of Rome (Italy); Di Cesare, Ernesto, E-mail: ernesto.dicesare@cc.univaq.it [Dipartimento di Scienze Cliniche Applicate e Biotecnologie, Università di L’Aquila (Italy); Cademartiri, Filippo [Cardio-Vascular Imaging Unit, Giovanni XXIII Hospital, Monastier di Treviso, TV (Italy); Erasmus Medical Center University, Rotterdam (Netherlands); Pontone, Gianluca [IRCCS Centro Cardiologico Monzino (Italy); Lovato, Luigi [Policlinico S. Orsola Bologna (Italy); Matta, Gildo [Azienda ospedaliera G Brotzu Cagliari (Italy); Secchi, Francesco [IRCCS Policlinico San Donato, Radiology Unit, Milan (Italy); Maffei, Erica [Cardio-Vascular Imaging Unit, Giovanni XXIII Hospital, Monastier di Treviso, TV (Italy); Erasmus Medical Center University, Rotterdam (Netherlands); Pradella, Silvia [Azienda Ospedaliera Universitaria Careggi (Italy); Carbone, Iacopo [Department of Radiological, Oncological and Pathological Sciences, Sapienza University of Rome (Italy); Marano, Riccardo [Policlinico Gemelli, Università Cattolica Roma (Italy); Bacigalupo, Lorenzo [Ospedale Galliera, Genova (Italy); Chiodi, Elisabetta [Ospedale S. Anna Ferrara (Italy); Donato, Rocco [Azienda Ospedaliera Universitaria G. Martino, Me (Italy); Sbarbati, Stefano [Ospedale Madre Giuseppina Vannini, Roma (Italy); De Cobelli, Francesco [IRCCS S. Raffaele, Università Vita Salute, Milano (Italy); Di Renzi, Paolo [Fate Bene Fratelli Isola tiberina, Roma (Italy); Ligabue, Guido; Mancini, Andrea [Azienda Ospedaliera-Universitaria Policlinico di Modena (Italy); Palmieri, Francesco [Diparimento di Diagnostica per immagini e radiologia interventistica, Ospedale S. Maria delle Grazie, Pozzuoli, Napoli (Italy); and others

    2014-01-15

    Objectives: Forty sites were involved in this multicenter and multivendor registry, which sought to evaluate indications, spectrum of protocols, impact on clinical decision making and safety profile of cardiac magnetic resonance (CMR). Materials and methods: Data were prospectively collected on a 6-month period and included 3376 patients (47.2 ± 19 years; range 1–92 years). Recruited centers were asked to complete a preliminary general report followed by a single form/patient. Referral physicians were not required to exhibit any specific certificate of competency in CMR imaging. Results: Exams were performed with 1.5 T scanners in 96% of cases followed by 3 T (3%) and 1 T (1%) magnets and contrast was administered in 84% of cases. The majority of cases were performed for the workup of inflammatory heart disease/cardiomyopathies representing overall 55.7% of exams followed by the assessment of myocardial viability and acute infarction (respectively 6.9% and 5.9% of patients). In 49% of cases the final diagnosis provided was considered relevant and with impact on patient's clinical/therapeutic management. Safety evaluation revealed 30 (0.88%) clinical events, most of which due to patient's preexisting conditions. Radiological reporting was recorded in 73% of exams. Conclusions: CMR is performed in a large number of centers in Italy with relevant impact on clinical decision making and high safety profile.

  20. Supporting awareness in creative group work by exposing design rationale

    Directory of Open Access Journals (Sweden)

    Umer Farooq

    2011-01-01

    Full Text Available When creativity is taken as a long-term, complex, and collaborative activity, support for awareness is required for group members to monitor the development of ideas, track how these ideas became narrowed, and understand how alternatives are being implemented and integrated by colleagues. In this paper, we investigate the effects of exposing design rationale to convey awareness, specifically activity awareness, in group creativity. Through evaluating a prototype, we investigate status updates that convey design rationale, and to what consequences, in small groups in fully distributed collaboration. We found that status updates are used for a variety of purposes and that participants’ comments on their collaborators’ status updates provided feedback. Overall, results suggest that participants’ awareness about their collaborators’ future plans increased over time. Majority of participants found the status updates useful, particularly those with higher metacognitive knowledge. Based on our results, two design strategies for activity awareness are proposed.

  1. Mineralized Collagen: Rationale, Current Status, and Clinical Applications

    Directory of Open Access Journals (Sweden)

    Zhi-Ye Qiu

    2015-07-01

    Full Text Available This paper presents a review of the rationale for the in vitro mineralization process, preparation methods, and clinical applications of mineralized collagen. The rationale for natural mineralized collagen and the related mineralization process has been investigated for decades. Based on the understanding of natural mineralized collagen and its formation process, many attempts have been made to prepare biomimetic materials that resemble natural mineralized collagen in both composition and structure. To date, a number of bone substitute materials have been developed based on the principles of mineralized collagen, and some of them have been commercialized and approved by regulatory agencies. The clinical outcomes of mineralized collagen are of significance to advance the evaluation and improvement of related medical device products. Some representative clinical cases have been reported, and there are more clinical applications and long-term follow-ups that currently being performed by many research groups.

  2. The Pediatric Emergency Care Applied Research Network Registry: A Multicenter Electronic Health Record Registry of Pediatric Emergency Care.

    Science.gov (United States)

    Deakyne Davies, Sara J; Grundmeier, Robert W; Campos, Diego A; Hayes, Katie L; Bell, Jamie; Alessandrini, Evaline A; Bajaj, Lalit; Chamberlain, James M; Gorelick, Marc H; Enriquez, Rene; Casper, T Charles; Scheid, Beth; Kittick, Marlena; Dean, J Michael; Alpern, Elizabeth R

    2018-04-01

     Electronic health record (EHR)-based registries allow for robust data to be derived directly from the patient clinical record and can provide important information about processes of care delivery and patient health outcomes.  A data dictionary, and subsequent data model, were developed describing EHR data sources to include all processes of care within the emergency department (ED). ED visit data were deidentified and XML files were created and submitted to a central data coordinating center for inclusion in the registry. Automated data quality control occurred prior to submission through an application created for this project. Data quality reports were created for manual data quality review.  The Pediatric Emergency Care Applied Research Network (PECARN) Registry, representing four hospital systems and seven EDs, demonstrates that ED data from disparate health systems and EHR vendors can be harmonized for use in a single registry with a common data model. The current PECARN Registry represents data from 2,019,461 pediatric ED visits, 894,503 distinct patients, more than 12.5 million narrative reports, and 12,469,754 laboratory tests and continues to accrue data monthly.  The Registry is a robust harmonized clinical registry that includes data from diverse patients, sites, and EHR vendors derived via data extraction, deidentification, and secure submission to a central data coordinating center. The data provided may be used for benchmarking, clinical quality improvement, and comparative effectiveness research. Schattauer.

  3. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  4. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  5. The Mataró Stroke Registry: a 10-year registry in a community hospital.

    Science.gov (United States)

    Palomeras Soler, E; Fossas Felip, P; Casado Ruiz, V; Cano Orgaz, A; Sanz Cartagena, P; Muriana Batiste, D

    2015-06-01

    A prospective stroke registry leads to improved knowledge of the disease. We present data on the Mataró Hospital Registry. In February-2002 a prospective stroke registry was initiated in our hospital. It includes sociodemographic data, previous diseases, clinical, topographic, etiological and prognostic data. We have analyzed the results of the first 10 years. A total of 2,165 patients have been included, 54.1% male, mean age 73 years. The most frequent vascular risk factor was hypertension (65.4%). Median NIHSS on admission: 3 (interquartile range, 1-8). Stroke subtype: 79.7% ischemic strokes, 10.9% hemorrhagic, and 9.4% TIA. Among ischemic strokes, the etiology was cardioembolic in 26.5%, large-vessel disease in 23.7%, and small-vessel in 22.9%. The most frequent topography of hemorrhages was lobar (47.4%), and 54.8% were attributed to hypertension. The median hospital stay was 8 days. At discharge, 60.7% of patients were able to return directly to their own home, and 52.7% were independent for their daily life activities. After 3 months these percentages were 76.9% and 62.9%, respectively. Hospital mortality was 6.5%, and after 3 months 10.9%. Our patient's profile is similar to those of other series, although the severity of strokes was slightly lower. Length of hospital stay, short-term and medium term disability, and mortality rates are good, if we compare them with other series. Copyright © 2013 Sociedad Española de Neurología. Published by Elsevier España, S.L.U. All rights reserved.

  6. Rationale for single molecule detection by means of Raman spectroscopy

    International Nuclear Information System (INIS)

    Gaponenko, S.V.; Guzatov, D.V.

    2009-01-01

    A consistent quantum electrodynamical description is proposed of Raman scattering of light by a molecule in a medium with a modified photon density of states. Enhanced local density of states near a metal nanobody is shown to increase a scattering rate by several orders of magnitude, thus providing a rationale for experimental detection of single molecules by means of Raman spectroscopy. For an ellipsoidal particle 10 14 -fold enhancement of the Raman scattering cross-section is obtained. (authors)

  7. Physics rationale for the engineering specifications for ZTH

    International Nuclear Information System (INIS)

    Dimarco, J.N.

    1987-01-01

    This report presents the physics rationale that established the engineering design of ZTH. The physics criteria are given and the implications regarding the engineering design are presented. Experimental and theoretical background evidence is given in support of the criteria but the justification is left to other reports and peer reviews. The physics criteria discussed here are limited to the ones deemed to be of highest engineering priority. 32 refs., 9 figs

  8. The rationale for early intervention in schizophrenia and related disorders

    DEFF Research Database (Denmark)

    Nordentoft, Merete; Jeppesen, Pia; Petersen, Lone

    2009-01-01

    , adherence to treatment, comorbid drug abuse, relapse and readmission. Some benefits persist after cessation of the intervention. Conclusions: Early intervention in schizophrenia is justified to reduce the negative personal and social impact of prolonged periods of untreated symptoms. Furthermore, phase......Abstract Aim: To examine the rationale and evidence supporting an early intervention approach in schizophrenia. Methods: A selective literature review was conducted. Results: During the onset of schizophrenia, there is often a significant delay between the emergence of psychotic symptoms...

  9. Sampling in Qualitative Research: Rationale, Issues, and Methods

    OpenAIRE

    LUBORSKY, MARK R.; RUBINSTEIN, ROBERT L.

    1995-01-01

    In gerontology the most recognized and elaborate discourse about sampling is generally thought to be in quantitative research associated with survey research and medical research. But sampling has long been a central concern in the social and humanistic inquiry, albeit in a different guise suited to the different goals. There is a need for more explicit discussion of qualitative sampling issues. This article will outline the guiding principles and rationales, features, and practices of sampli...

  10. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  11. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  12. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  13. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  14. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  15. EPA Facility Registry Service (FRS): RCRA_INACTIVE

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of hazardous waste...

  16. EPA Facility Registry Service (FRS): Facility Interests Dataset - Intranet

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are available in...

  17. Establishment of the Fox Chase Network Breast Cancer Risk Registry

    National Research Council Canada - National Science Library

    Daly, Mary

    1997-01-01

    .... The development of the Fox Chase Cancer Center Breast Cancer Risk Registry was proposed to facilitate research in the epidemiologic and genetic predictors of disease and will permit evaluation...

  18. EPA Facility Registry Service (FRS): Facility Interests Dataset - Intranet Download

    Data.gov (United States)

    U.S. Environmental Protection Agency — This downloadable data package consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are...

  19. EPA Facility Registry Service (FRS): ALL FRS INTERESTS LAYER

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data provides location and attribute information on all facilities in EPA's Facility Registry Service (FRS) for a internet web feature service . The FRS is an...

  20. EPA Facility Registry Service (FRS): ER_FRP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link to Facility...

  1. EPA Facility Registry Service (FRS): AIRS_AQS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  2. Recent progress of the United States transuranium and uranium registries

    International Nuclear Information System (INIS)

    Kathren, R.L.

    1986-01-01

    This paper provides a brief overview of the history and objectives of the US Transuranium and Uranium Registries along with a discussion of some recent activities and accomplishments of these two parallel programs. 17 refs

  3. EPA Facility Registry Service (FRS): ER_EPLAN

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  4. EPA Facility Registry Service (FRS): Facility Interests Dataset

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are available in...

  5. EPA Facility Registry Service (FRS): Facility Interests Dataset Download

    Data.gov (United States)

    U.S. Environmental Protection Agency — This downloadable data package consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are...

  6. Functional requirements regarding medical registries--preliminary results.

    Science.gov (United States)

    Oberbichler, Stefan; Hörbst, Alexander

    2013-01-01

    The term medical registry is used to reference tools and processes to support clinical or epidemiologic research or provide a data basis for decisions regarding health care policies. In spite of this wide range of applications the term registry and the functional requirements which a registry should support are not clearly defined. This work presents preliminary results of a literature review to discover functional requirements which form a registry. To extract these requirements a set of peer reviewed articles was collected. These set of articles was screened by using methods from qualitative research. Up to now most discovered functional requirements focus on data quality (e. g. prevent transcription error by conducting automatic domain checks).

  7. EPA Facility Registry Service (FRS): RCRA_ACTIVE

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of active hazardous...

  8. EPA Facility Registry Service (FRS): RCRA_LQG

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  9. EPA Facility Registry Service (FRS): AIRS_AFS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  10. EPA Facility Registry Service (FRS): RCRA_TRANS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  11. EPA Facility Registry Service (FRS): ER_TRI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  12. EPA Facility Registry Service (FRS): ER_TSCA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  13. EPA Facility Registry Service (FRS): Wastewater Treatment Plants

    Data.gov (United States)

    U.S. Environmental Protection Agency — This GIS dataset contains data on wastewater treatment plants, based on EPA's Facility Registry Service (FRS), EPA's Integrated Compliance Information System (ICIS)...

  14. EPA Facility Registry Service (FRS): ER_WWTP_NPDES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of Waste Water Treatment...

  15. EPA Facility Registry Service (FRS): ER_CERCLIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  16. EPA Facility Registry Service (FRS): RCRA_TSD

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of Hazardous Waste...

  17. EPA Facility Registry Service (FRS): CERCLIS_NPL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that are...

  18. EPA Facility Registry Service (FRS): PCS_NPDES_MAJOR

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that are...

  19. EPA Facility Registry Service (FRS): PCS_NPDES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  20. Functional principles of registry-based service discovery

    NARCIS (Netherlands)

    Sundramoorthy, V.; Tan, C.; Hartel, P.H.; Hartog, den J.I.; Scholten, J.

    2005-01-01

    As Service Discovery Protocols (SDP) are becoming increasingly important for ubiquitous computing, they must behave according to predefined principles. We present the functional Principles of Service Discovery for robust, registry-based service discovery. A methodology to guarantee adherence to

  1. EPA Facility Registry Service (FRS): ER_RMP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  2. EPA Facility Registry Service (FRS): ER_RCRATSD

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  3. EPA Facility Registry Service (FRS): Facility Interests Dataset - Intranet Download

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are available in...

  4. Clinical features of paediatric pulmonary hypertension : a registry study

    NARCIS (Netherlands)

    Berger, Rolf M. F.; Beghetti, Maurice; Humpl, Tilman; Raskob, Gary E.; Ivy, D. Dunbar; Jing, Zhi-Cheng; Bonnet, Damien; Schulze-Neick, Ingram; Barst, Robyn J.

    2012-01-01

    Background Paediatric pulmonary hypertension, is an important cause of morbidity and mortality, and is insufficiently characterised in children. The Tracking Outcomes and Practice in Pediatric Pulmonary Hypertension (TOPP) registry is a global, prospective study designed to provide information about

  5. Environmental Protection Agency (EPA) Facility Registry Service (FRS) Power Plants

    Data.gov (United States)

    Department of Homeland Security — This GIS dataset contains data on wastewater treatment plants, based on EPA's Facility Registry Service (FRS) and NPDES, along with Clean Watersheds Needs Survey...

  6. EPA Facility Registry Service (FRS): AIRS_AFS_MAJOR

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  7. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  8. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  9. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  10. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  11. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  12. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals within the CAESAR competition which aim at providing...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  13. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Marnik G. Dekimpe

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  14. The Danish Neuro-Oncology Registry

    Directory of Open Access Journals (Sweden)

    Hansen S

    2016-10-01

    Full Text Available Steinbjørn Hansen Department of Oncology, Odense University Hospital and Institute of Clinical Research, Faculty of Health Sciences, University of Southern Denmark, Odense, Denmark Aim of database: The Danish Neuro-Oncology Registry (DNOR was established by the Danish Neuro-Oncology Group as a national clinical database. It was established for the purpose of supporting research and development in adult patients with primary brain tumors in Denmark. Study population: DNOR has registered clinical data on diagnostics and treatment of all adult patients diagnosed with glioma since January 1, 2009, which numbers approximately 400 patients each year. Main variables: The database contains information about symptoms, presurgical magnetic resonance imaging (MRI characteristics, performance status, surgical procedures, residual tumor on postsurgical MRI, postsurgical complications, diagnostic and histology codes, radiotherapy, and chemotherapy. Descriptive data: DNOR publishes annual reports on descriptive data. During the period of registration, postoperative MRI is performed in a higher proportion of the patients (Indicator II, and a higher proportion of patients have no residual tumor after surgical resection of the primary tumor (Indicator IV. Further data are available in the annual reports. The indicators reflect only minor elements of handling brain tumor patients. Another advantage of reporting indicators is the related multidisciplinary discussions giving a better understanding of what actually is going on, thereby facilitating the work on adjusting the national guidelines in the Danish Neuro-Oncology Group. Conclusion: The establishment of DNOR has optimized the quality in handling primary brain tumor patients in Denmark by reporting indicators and facilitating a better multidisciplinary collaboration at a national level. DNOR provides a valuable resource for research. Keywords: brain neoplasms, brain cancer, glioma, clinical quality indicators

  15. Patient registries: useful tools for clinical research in myasthenia gravis.

    Science.gov (United States)

    Baggi, Fulvio; Mantegazza, Renato; Antozzi, Carlo; Sanders, Donald

    2012-12-01

    Clinical registries may facilitate research on myasthenia gravis (MG) in several ways: as a source of demographic, clinical, biological, and immunological data on large numbers of patients with this rare disease; as a source of referrals for clinical trials; and by allowing rapid identification of MG patients with specific features. Physician-derived registries have the added advantage of incorporating diagnostic and treatment data that may allow comparison of outcomes from different therapeutic approaches, which can be supplemented with patient self-reported data. We report the demographic analysis of MG patients in two large physician-derived registries, the Duke MG Patient Registry, at the Duke University Medical Center, and the INNCB MG Registry, at the Istituto Neurologico Carlo Besta, as a preliminary study to assess the consistency of the two data sets. These registries share a common structure, with an inner core of common data elements (CDE) that facilitate data analysis. The CDEs are concordant with the MG-specific CDEs developed under the National Institute of Neurological Disorders and Stroke Common Data Elements Project. © 2012 New York Academy of Sciences.

  16. Utility of an Australasian registry for children undergoing radiation treatment

    International Nuclear Information System (INIS)

    Ahern, Verity

    2014-01-01

    The aim of this study was to evaluate the utility of an Australasian registry ('the Registry') for children undergoing radiation treatment (RT). Children under the age of 16years who received a course of radiation between January 1997 and December 2010 and were enrolled on the Registry form the subjects of this study. A total of 2232 courses of RT were delivered, predominantly with radical intent (87%). Registrations fluctuated over time, but around one-half of children diagnosed with cancer undergo a course of RT. The most prevalent age range at time of RT was 10–15years, and the most common diagnoses were central nervous system tumours (34%) and acute lymphoblastic leukaemia (20%). The Registry provides a reflection of the patterns of care of children undergoing RT in Australia and a mechanism for determining the resources necessary to manage children by RT (human, facilities and emerging technologies, such as proton therapy). It lacks the detail to provide information on radiotherapy quality and disease outcomes which should be the subject of separate audit studies. The utility of the Registry has been hampered by its voluntary nature and varying needs for consent. Completion of registry forms is a logical requirement for inclusion in the definition of a subspecialist in paediatric radiation oncology.

  17. Presenting an Evaluation Model for the Cancer Registry Software.

    Science.gov (United States)

    Moghaddasi, Hamid; Asadi, Farkhondeh; Rabiei, Reza; Rahimi, Farough; Shahbodaghi, Reihaneh

    2017-12-01

    As cancer is increasingly growing, cancer registry is of great importance as the main core of cancer control programs, and many different software has been designed for this purpose. Therefore, establishing a comprehensive evaluation model is essential to evaluate and compare a wide range of such software. In this study, the criteria of the cancer registry software have been determined by studying the documents and two functional software of this field. The evaluation tool was a checklist and in order to validate the model, this checklist was presented to experts in the form of a questionnaire. To analyze the results of validation, an agreed coefficient of %75 was determined in order to apply changes. Finally, when the model was approved, the final version of the evaluation model for the cancer registry software was presented. The evaluation model of this study contains tool and method of evaluation. The evaluation tool is a checklist including the general and specific criteria of the cancer registry software along with their sub-criteria. The evaluation method of this study was chosen as a criteria-based evaluation method based on the findings. The model of this study encompasses various dimensions of cancer registry software and a proper method for evaluating it. The strong point of this evaluation model is the separation between general criteria and the specific ones, while trying to fulfill the comprehensiveness of the criteria. Since this model has been validated, it can be used as a standard to evaluate the cancer registry software.

  18. Cost of Operating Central Cancer Registries and Factors That Affect Cost: Findings From an Economic Evaluation of Centers for Disease Control and Prevention National Program of Cancer Registries.

    Science.gov (United States)

    Tangka, Florence K L; Subramanian, Sujha; Beebe, Maggie Cole; Weir, Hannah K; Trebino, Diana; Babcock, Frances; Ewing, Jean

    2016-01-01

    The Centers for Disease Control and Prevention (CDC) evaluated the economics of the National Program of Cancer Registries to provide the CDC, the registries, and policy makers with the economics evidence-base to make optimal decisions about resource allocation. Cancer registry budgets are under increasing threat, and, therefore, systematic assessment of the cost will identify approaches to improve the efficiencies of this vital data collection operation and also justify the funding required to sustain registry operations. To estimate the cost of cancer registry operations and to assess the factors affecting the cost per case reported by National Program of Cancer Registries-funded central cancer registries. We developed a Web-based cost assessment tool to collect 3 years of data (2009-2011) from each National Program of Cancer Registries-funded registry for all actual expenditures for registry activities (including those funded by other sources) and factors affecting registry operations. We used a random-effects regression model to estimate the impact of various factors on cost per cancer case reported. The cost of reporting a cancer case varied across the registries. Central cancer registries that receive high-quality data from reporting sources (as measured by the percentage of records passing automatic edits) and electronic data submissions, and those that collect and report on a large volume of cases had significantly lower cost per case. The volume of cases reported had a large effect, with low-volume registries experiencing much higher cost per case than medium- or high-volume registries. Our results suggest that registries operate with substantial fixed or semivariable costs. Therefore, sharing fixed costs among low-volume contiguous state registries, whenever possible, and centralization of certain processes can result in economies of scale. Approaches to improve quality of data submitted and increasing electronic reporting can also reduce cost.

  19. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  20. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...