WorldWideScience

Sample records for attack registry rationale

  1. The Canadian Registry for Pulmonary Fibrosis: Design and Rationale of a National Pulmonary Fibrosis Registry

    Directory of Open Access Journals (Sweden)

    Christopher J. Ryerson

    2016-01-01

    Full Text Available Background. The relative rarity and diversity of fibrotic interstitial lung disease (ILD have made it challenging to study these diseases in single-centre cohorts. Here we describe formation of a multicentre Canadian registry that is needed to describe the outcomes of fibrotic ILD and to enable detailed healthcare utilization analyses that will be the cornerstone for future healthcare planning. Methods. The Canadian Registry for Pulmonary Fibrosis (CARE-PF is a prospective cohort anticipated to consist of at least 2,800 patients with fibrotic ILD. CARE-PF will be used to (1 describe the natural history of fibrotic ILD, specifically determining the incidence and outcomes of acute exacerbations of ILD subtypes and (2 determine the impact of ILD and acute exacerbations of ILD on health services use and healthcare costs in the Canadian population. Consecutive patients with fibrotic ILD will be recruited from five Canadian ILD centres over a period of five years. Patients will be followed up as clinically indicated and will complete standardized questionnaires at each clinic visit. Prespecified outcomes and health services use will be measured based on self-report and linkage to provincial health administrative databases. Conclusion. CARE-PF will be among the largest prospective multicentre ILD registries in the world, providing detailed data on the natural history of fibrotic ILD and the healthcare resources used by these patients. As the largest and most comprehensive cohort of Canadian ILD patients, CARE-PF establishes a network for future clinical research and early phase clinical trials and provides a platform for translational and basic science research.

  2. Rationale, design, methodology and hospital characteristics of the first gulf acute heart failure registry (gulf care

    Directory of Open Access Journals (Sweden)

    Kadhim J Sulaiman

    2014-01-01

    Full Text Available Background: There is paucity of data on heart failure (HF in the Gulf Middle East. The present paper describes the rationale, design, methodology and hospital characteristics of the first Gulf acute heart failure registry (Gulf CARE. Materials and Methods: Gulf CARE is a prospective, multicenter, multinational registry of patients >18 year of age admitted with diagnosis of acute HF (AHF. The data collected included demographics, clinical characteristics, etiology, precipitating factors, management and outcomes of patients admitted with AHF. In addition, data about hospital readmission rates, procedures and mortality at 3 months and 1-year follow-up were recorded. Hospital characteristics and care provider details were collected. Data were entered in a dedicated website using an electronic case record form. Results: A total of 5005 consecutive patients were enrolled from February 14, 2012 to November 13, 2012. Forty-seven hospitals in 7 Gulf States (Oman, Saudi Arabia, Yemen, Kuwait, United Gulf Emirates, Qatar and Bahrain participated in the project. The majority of hospitals were community hospitals (46%; 22/47 followed by non-University teaching (32%; 15/47 and University hospitals (17%. Most of the hospitals had intensive or coronary care unit facilities (93%; 44/47 with 59% (28/47 having catheterization laboratory facilities. However, only 29% (14/47 had a dedicated HF clinic facility. Most patients (71% were cared for by a cardiologist. Conclusions: Gulf CARE is the first prospective registry of AHF in the Middle East, intending to provide a unique insight into the demographics, etiology, management and outcomes of AHF in the Middle East. HF management in the Middle East is predominantly provided by cardiologists. The data obtained from this registry will help the local clinicians to identify the deficiencies in HF management as well as provide a platform to implement evidence based preventive and treatment strategies to reduce the burden

  3. POL-TAVI – Polish Registry of Transcatheter Aortic Valve Implantation – simple tool, great value, rationale and design

    Science.gov (United States)

    Wilczek, Krzysztof; Tobota, Zdzisław; Chodór, Piotr; Cieśla, Daniel; Jaźwiec, Tomasz; Banasiak, Waldemar; Stępińska, Janina; Kalarus, Zbigniew; Opolski, Grzegorz; Zembala, Marian

    2016-01-01

    Aortic stenosis (AS) is the most common valvular heart disease in adults in Europe and North America. Management of AS patients depends on accurate diagnosis of the cause and stage of the disease process: the first and definitive therapeutic choice for a growing number of elderly patients with symptomatic AS is surgical treatment. In patients not eligible for surgery, transcatheter aortic valve implantation (TAVI) constitutes a safe and effective alternative. As an innovative, costly method of treatment, it requires however careful monitoring of its course, documenting its early and long-term results, and assessment of its safety and medical-economic cost-effectiveness. A medical registry seems to be an excellent tool to perform such analysis. The aim of this paper is to present the design and rationale for creation of the first National Cardiac-Cardiac Surgical Registry of Percutaneous Aortic Valve Treatment POL-TAVI, to describe its genesis and to highlight its key assumptions and aims. Despite its recent beginnings, the POL-TAVI Registry has already demonstrated its value and usability in monitoring and assessment of TAVI procedures, leading to further improvement and development of this new method in Poland. It constitutes an important and valuable tool for patients, the medical community and the payer. PMID:28096826

  4. Hypertrophic Cardiomyopathy Registry: The rationale and design of an international, observational study of hypertrophic cardiomyopathy.

    Science.gov (United States)

    Kramer, Christopher M; Appelbaum, Evan; Desai, Milind Y; Desvigne-Nickens, Patrice; DiMarco, John P; Friedrich, Matthias G; Geller, Nancy; Heckler, Sarahfaye; Ho, Carolyn Y; Jerosch-Herold, Michael; Ivey, Elizabeth A; Keleti, Julianna; Kim, Dong-Yun; Kolm, Paul; Kwong, Raymond Y; Maron, Martin S; Schulz-Menger, Jeanette; Piechnik, Stefan; Watkins, Hugh; Weintraub, William S; Wu, Pan; Neubauer, Stefan

    2015-08-01

    Hypertrophic cardiomyopathy (HCM) is the most common monogenic heart disease with a frequency as high as 1 in 200. In many cases, HCM is caused by mutations in genes encoding the different components of the sarcomere apparatus. Hypertrophic cardiomyopathy is characterized by unexplained left ventricular hypertrophy, myofibrillar disarray, and myocardial fibrosis. The phenotypic expression is quite variable. Although most patients with HCM are asymptomatic, serious consequences are experienced in a subset of affected individuals who present initially with sudden cardiac death or progress to refractory heart failure. The Hypertrophic Cardiomyopathy Registry study is a National Heart, Lung, and Blood Institute-sponsored 2,750-patient, 44-site, international registry and natural history study designed to address limitations in extant evidence to improve prognostication in HCM (NCT01915615). In addition to the collection of standard demographic, clinical, and echocardiographic variables, patients will undergo state-of-the-art cardiac magnetic resonance for assessment of left ventricular mass and volumes as well as replacement scarring and interstitial fibrosis. In addition, genetic and biomarker analyses will be performed. The Hypertrophic Cardiomyopathy Registry has the potential to change the paradigm of risk stratification in HCM, using novel markers to identify those at higher risk.

  5. Dutch Chronic Pancreatitis Registry (CARE) : Design and rationale of a nationwide prospective evaluation and follow-up

    NARCIS (Netherlands)

    Ali, U. Ahmed; Issa, Y.; van Goor, H.; van Eijck, C. H.; Nieuwenhuijs, V. B.; Keulemans, Y.; Fockens, P.; Busch, O. R.; Drenth, J. P.; Dejong, C. H.; van Dullemen, H. M.; van Hooft, J. E.; Siersema, P. D.; Spanier, B. W. M.; Poley, J. W.; Poen, A. C.; Timmer, R.; Seerden, T.; Tan, A. C.; Thijs, W. J.; Witteman, B. J. M.; Romkens, T. E. H.; Roeterdink, A. J.; Gooszen, H. G.; Van Santvoort, H. C.; Bruno, M. J.; Boermeester, M. A.

    2015-01-01

    Background: Chronic pancreatitis is a complex disease with many unanswered questions regarding the natural history and therapy. Prospective longitudinal studies with long-term follow-up are warranted. Methods: The Dutch Chronic Pancreatitis Registry (CARE) is a nationwide registry aimed at prospecti

  6. Predictive value of stroke and transient ischemic attack discharge diagnoses in the Danish National Registry of Patients

    DEFF Research Database (Denmark)

    Johnsen, Søren P; Overvad, Kim; Sørensen, Henrik Toft;

    2002-01-01

    We examined the predictive value of the discharge diagnoses of stroke and transient ischemic attack (TIA) in The National Registry of Patients (NRP) for participants in the Danish cohort study “Diet, Cancer, and Health.” We retrieved all probable incident registered cases of stroke and TIA, i...... and intracerebral hemorrhage were confirmed in 14 of 29 cases (48.3%, 95% CI: 29.4–67.5%), and 23 of 35 cases (65.7%, 95% CI: 47.8–80.9%), respectively. By contrast, ischemic stroke and unspecified stroke were confirmed in 99 of 113 cases (87.6%, 95% CI: 80.1–93.1%) and 152 of 200 cases (76.0%, 95% CI: 69...

  7. Unmet mental health care need 10–11 years after the 9/11 terrorist attacks: 2011–2012 results from the World Trade Center Health Registry

    Science.gov (United States)

    2014-01-01

    Background There is little current information about the unmet mental health care need (UMHCN) and reasons for it among those exposed to the World Trade Center (WTC) terrorist attacks. The purpose of this study was to assess the level of UMHCN among symptomatic individuals enrolled in the WTC Health Registry (WTCHR) in 2011–2012, and to analyze the relationship between UMHCN due to attitudinal, cost, and access factors and mental health symptom severity, mental health care utilization, health insurance availability, and social support. Methods The WTCHR is a prospective cohort study of individuals with reported exposure to the 2001 WTC attacks. This study used data from 9,803 adults who completed the 2003–2004 (Wave 1) and 2011–2012 (Wave 3) surveys and had posttraumatic stress disorder (PTSD) or depression in 2011–2012. We estimated logistic regression models relating perceived attitudinal, cost and access barriers to symptom severity, health care utilization, a lack of health insurance, and social support after adjusting for sociodemographic characteristics. Results Slightly more than one-third (34.2%) of study participants reported an UMHCN. Symptom severity was a strong predictor of UMHCN due to attitudinal and perceived cost and access reasons. Attitudinal UMHCN was common among those not using mental health services, particularly those with relatively severe mental health symptoms. Cost-related UMHCN was significantly associated with a lack of health insurance but not service usage. Access-related barriers were significantly more common among those who did not use any mental health services. A higher level of social support served as an important buffer against cost and access UMHCN. Conclusions A significant proportion of individuals exposed to the WTC attacks with depression or PTSD 10 years later reported an UMHCN, and individuals with more severe and disabling conditions, those who lacked health insurance, and those with low levels of social

  8. Racionalidade e métodos: estudo BREATHE - I registro brasileiro de insuficiência cardíaca Rationale and design: BREATHE registry - I brazilian registry of heart failure

    Directory of Open Access Journals (Sweden)

    2013-05-01

    Full Text Available FUNDAMENTO: Diversos registros locais buscam de forma isolada retratar características clínicas de pacientes internados com Insuficiência Cardíaca (IC em hospitais e comunidades brasileiras. De forma geral, a análise desses dados sugere que existam diferenças importantes na etiologia, nos fatores de descompensação, no tratamento e no prognóstico de pacientes com IC nas diferentes regiões brasileiras. OBJETIVOS: Avaliar as características demográficas, clínicas, prognósticas de 1.200 pacientes admitidos com diagnóstico clínico de insuficiência cardíaca descompensada em um grupo de 60 hospitais representativos das diferentes regiões brasileiras. MÉTODOS: Estudo observacional transversal (registro com seguimento longitudinal de doze meses (visitas de admissão, alta hospitalar, três meses, seis meses e doze meses após inclusão, em que pacientes admitidos em hospitais da rede pública e privada com quadro clínico primariamente de IC definida serão estudados. RESULTADOS: Os resultados serão apresentados logo após o término da coleta, avaliação da qualidade e análise estatística dos dados. CONCLUSÕES: A análise dos resultados deste registro multicêntrico permitirá um planejamento mais adequado do aporte de recursos financeiros, pessoais e tecnológicos para a área da saúde, bem como o planejamento de medidas preventivas mais eficazes na IC descompensada.BACKGROUND: Several local registries have sought to individually depict clinical characteristics of patients hospitalized with heart failure (HF in Brazilian hospitals and communities. Overall, the analysis of these data suggests that there are important differences in etiology, decompensation factors, treatment and prognosis of patients with HF in different Brazilian regions. OBJECTIVES: To evaluate the demographic, clinical and prognostic characteristics of 1,200 patients admitted with a clinical diagnosis of decompensated HF in a group of 60 hospitals

  9. Nanomaterial Registry

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Nanomaterial Registry compiles data from multiple databases into a single resource. The goal of this resource is to establish a curated nanomaterial registry,...

  10. The Danish Stroke Registry

    DEFF Research Database (Denmark)

    Johnsen, Søren Paaske; Ingeman, Annette; Hundborg, Heidi Holmager

    2016-01-01

    AIM OF DATABASE: The aim of the Danish Stroke Registry is to monitor and improve the quality of care among all patients with acute stroke and transient ischemic attack (TIA) treated at Danish hospitals. STUDY POPULATION: All patients with acute stroke (from 2003) or TIA (from 2013) treated...... at Danish hospitals. Reporting is mandatory by law for all hospital departments treating these patients. The registry included >130,000 events by the end of 2014, including 10,822 strokes and 4,227 TIAs registered in 2014. MAIN VARIABLES: The registry holds prospectively collected data on key processes...... of care, mainly covering the early phase after stroke, including data on time of delivery of the processes and the eligibility of the individual patients for each process. The data are used for assessing 18 process indicators reflecting recommendations in the national clinical guidelines for patients...

  11. Evaluation oF FactORs ImpacTing CLinical Outcome and Cost EffectiveneSS of the S-ICD: Design and Rationale of the EFFORTLESS S-ICD Registry

    DEFF Research Database (Denmark)

    Pedersen, Susanne S; Lambiase, Pier; Boersma, Lucas V A;

    2012-01-01

    utilization. Methods: The Registry is an observational, nonrandomized, standard of care evaluation to be conducted at approximately 50 investigational centers in Europe and New Zealand where the S-ICD is approved for use and distribution. Clinical Registry endpoints include perioperative (30 days postimplant......) complication-free rate, 360-day complication-free rate, and percentage of inappropriate shocks for atrial fibrillation and supraventricular ventricular tachyarrhythmia. Other endpoints include patient-reported outcomes (e.g., quality of life) and hospital personnel implant and follow-up experience with the S...

  12. Clinical Case Registries (CCR)

    Data.gov (United States)

    Department of Veterans Affairs — The Clinical Case Registries (CCR) replaced the former Immunology Case Registry and the Hepatitis C Case Registry with local and national databases. The CCR:HIV and...

  13. Stroke Trials Registry

    Science.gov (United States)

    ... News About Neurology Image Library Search The Internet Stroke Center Trials Registry Clinical Trials Interventions Conditions Sponsors ... a clinical trial near you Welcome to the Stroke Trials Registry Our registry of clinical trials in ...

  14. Converged Registries Solution (CRS)

    Data.gov (United States)

    Department of Veterans Affairs — The Converged Registries platform is a hardware and software architecture designed to host individual patient registries and eliminate duplicative development effort...

  15. Impact of Frailty and Other Geriatric Syndromes on Clinical Management and Outcomes in Elderly Patients With Non-ST-Segment Elevation Acute Coronary Syndromes: Rationale and Design of the LONGEVO-SCA Registry.

    Science.gov (United States)

    Alegre, Oriol; Ariza-Solé, Albert; Vidán, María T; Formiga, Francesc; Martínez-Sellés, Manuel; Bueno, Héctor; Sanchís, Juan; López-Palop, Ramón; Abu-Assi, Emad; Cequier, Àngel

    2016-07-01

    The incidence of acute coronary syndromes (ACS) is high in the elderly. Despite a high prevalence of frailty and other aging-related variables, little information exists about the optimal clinical management in patients with coexisting geriatric syndromes. The aim of the LONGEVO-SCA registry (Impacto de la Fragilidad y Otros Síndromes Geriátricos en el Manejo y Pronóstico Vital del Anciano con Síndrome Coronario Agudo sin Elevación de Segmento ST) is to assess the impact of aging-related variables on clinical management, prognosis, and functional status in elderly patients with ACS. A series of 500 consecutive octogenarian patients with non-ST-segment elevation ACS from 57 centers in Spain will be included. A comprehensive geriatric assessment will be performed during the admission, assessing functional status (Barthel Index, Lawton-Brody Index), frailty (FRAIL scale, Short Physical Performance Battery), comorbidity (Charlson Index), nutritional status (Mini Nutritional Assessment-Short Form), and quality of life (Seattle Angina Questionnaire). Patients will be managed according to current recommendations. The primary outcome will be the description of mortality and its causes at 6 months. Secondary outcomes will be changes in functional status and quality of life. Results from this study might significantly improve the knowledge about the impact of aging-related variables on management and outcomes of elderly patients with ACS. Clinical management of these patients has become a major health care problem due to the growing incidence of ACS in the elderly and its particularities.

  16. Genetic Testing Registry

    Science.gov (United States)

    ... Medicine Bookshelf Database of Genotypes and Phenotypes (dbGaP) Genetic Testing Registry Influenza Virus Map Viewer Online Mendelian Inheritance ... My NCBI Sign in to NCBI Sign Out Genetic Testing Registry All GTR Tests Conditions/Phenotypes Genes Labs ...

  17. EMI Registry Design

    CERN Document Server

    Memon, S

    2011-01-01

    Grid services are the fundamental building blocks of today's Distributed Computing Infrastructures (DCI). The discovery of services in the DCI is a primary function that is a precursor to other tasks such as workload and data management. In this context, a service registry can be used to fulfil such a requirement. Existing service registries, such as the ARC Information Index or UNICORE Registry, are examples that have proven themselves in production environments. Such implementations provide a centralized service registry, however, todays DCIs, such as EGI, are based on a federation model. It is therefore necessary for the service registry to mirror such a model in order for it to seamlessly fit into the operational and management requirements - a DCI built using federated approach. This document presents an architecture for a federated service registry and a prototype based on this architecture, the EMI Registry. Special attention is given to how the federated service registry is robust to environment failu...

  18. The Virtual Observatory Registry

    CERN Document Server

    Demleitner, Markus; Sidaner, Pierre Le; Plante, Raymond L

    2014-01-01

    In the Virtual Observatory (VO), the Registry provides the mechanism with which users and applications discover and select resources -- typically, data and services -- that are relevant for a particular scientific problem. Even though the VO adopted technologies in particular from the bibliographic community where available, building the Registry system involved a major standardisation effort, involving about a dozen interdependent standard texts. This paper discusses the server-side aspects of the standards and their application, as regards the functional components (registries), the resource records in both format and content, the exchange of resource records between registries (harvesting), as well as the creation and management of the identifiers used in the system based on the notion of authorities. Registry record authors, registry operators or even advanced users thus receive a big picture serving as a guideline through the body of relevant standard texts. To complete this picture, we also mention comm...

  19. The virtual observatory registry

    Science.gov (United States)

    Demleitner, M.; Greene, G.; Le Sidaner, P.; Plante, R. L.

    2014-11-01

    In the Virtual Observatory (VO), the Registry provides the mechanism with which users and applications discover and select resources-typically, data and services-that are relevant for a particular scientific problem. Even though the VO adopted technologies in particular from the bibliographic community where available, building the Registry system involved a major standardisation effort, involving about a dozen interdependent standard texts. This paper discusses the server-side aspects of the standards and their application, as regards the functional components (registries), the resource records in both format and content, the exchange of resource records between registries (harvesting), as well as the creation and management of the identifiers used in the system based on the notion of authorities. Registry record authors, registry operators or even advanced users thus receive a big picture serving as a guideline through the body of relevant standard texts. To complete this picture, we also mention common usage patterns and open issues as appropriate.

  20. Facility Registry Service (FRS)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Facility Registry Service (FRS) provides an integrated source of comprehensive (air, water, and waste) environmental information about facilities across EPA,...

  1. EMI Registry Development Plan

    CERN Document Server

    Memon, S.; Szigeti, G.; Field, L.

    2012-01-01

    This documents describes the overall development plan of the EMI Registry product, the plan focuses on the realisation of the EMI Registry specification as defined in the document. It is understood that during the course of the development phase the specification will likely evolve and the changes will be fed into the specification document.

  2. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  3. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  4. [Role of cancer registries].

    Science.gov (United States)

    Schaffer, P

    1995-05-01

    The first Cancer Registries were created in 1975 in France. Their ulterior development and their scientific production have been furthered by the apparition from 1986 under the aegis of the Health Ministry and of the INSERM, of a National Population Registry Committee. Cancer Registries have seriously contributed to a better knowledge of the cancer problem in our country and to describe the french specificities, in particular the importance of the mouth and pharynx cancers. They insure both a monitoring and an alert role; they also contribute to the medical supervision of the Chernobyl accident effects. French registries play a very active role concerning clinical research. They participate to many European studies of health care evaluation. In other respects, many etiological studies have been realized about professional risks of cancer, risks linked with nutritional habits, and on the etiologic role of the Tamoxifen. Finally, certain registries have created DNA banks. If nowadays their role in health planning remains modest, they very actively contribute in evaluating screening actions of breast, cervix and large bowel cancers. They also attracted the attention of Health Authorities on the cervix cancer screening's incoherencies. They evaluate the pilot project of the breast cancer and the registry of the Côte d'Or country evaluates the efficacity of a randomized colo rectal mass screening study. The main difficulties met by the registries are linked with the development of laws protecting more and more the individual freedoms, making it harder and harder the registration exhaustive character.

  5. Data Element Registry Services

    Data.gov (United States)

    U.S. Environmental Protection Agency — Data Element Registry Services (DERS) is a resource for information about value lists (aka code sets / pick lists), data dictionaries, data elements, and EPA data...

  6. The Norwegian Twin Registry.

    Science.gov (United States)

    Nilsen, Thomas S; Brandt, Ingunn; Magnus, Per; Harris, Jennifer R

    2012-12-01

    Norway has a long-standing tradition in twin research, but the data collected in several population-based twin studies were not coordinated centrally or easily accessible to the scientific community. In 2009, the Norwegian Twin Registry was established at the Norwegian Institute of Public Health (NIPH) in Oslo with the purpose of creating a single research resource for Norwegian twin data. As of today, the Norwegian Twin Registry contains 47,989 twins covering birth years 1895-1960 and 1967-1979; 31,440 of these twins consented to participate in health-related research. In addition, DNA from approximately 4,800 of the twins is banked at the NIPH biobank and new studies are continually adding new data to the registry. The value of the Norwegian twin data is greatly enhanced by the linkage opportunities offered by Norway's many nationwide registries, spanning a broad array of medical, demographic, and socioeconomic information.

  7. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  8. Danish Hip Arthroscopy Registry

    DEFF Research Database (Denmark)

    Mygind-Klavsen, Bjarne; Grønbech Nielsen, Torsten; Maagaard, Niels

    2016-01-01

    and Pincer resection in 93.5% of the cases. Labral refixation or repair was done in 70.3% of the cases. The most common type of acetabular chondral damage was grade II lesions (36.6%). Grade III and IV changes were seen in 36.1% of the cases. The preoperative iHOT12 was 45 (mean) based on all 12 items. EQ-5D....... The problems with development and maintaining a large clinical registry are described and further studies are needed to validate data completeness. We consider the development of a national clinical registry for hip arthroscopy as a successful way of developing and maintaining a valuable clinical...

  9. The Danish Heart Registry

    DEFF Research Database (Denmark)

    Özcan, Cengiz; Juel, Knud; Flensted Lassen, Jens;

    2016-01-01

    AIM: The Danish Heart Registry (DHR) seeks to monitor nationwide activity and quality of invasive diagnostic and treatment strategies in patients with ischemic heart disease as well as valvular heart disease and to provide data for research. STUDY POPULATION: All adult (≥15 years) patients...... undergoing coronary angiography (CAG), percutaneous coronary intervention (PCI), coronary artery bypass grafting, and heart valve surgery performed across all Danish hospitals were included. MAIN VARIABLES: The DHR contains a subset of the data stored in the Eastern and Western Denmark Heart Registries (EDHR...

  10. Psoriatic Arthritis Registries.

    Science.gov (United States)

    Sarzi-Puttini, Piercarlo; Varisco, Valentina; Ditto, Maria Chiara; Benucci, Maurizio; Atzeni, Fabiola

    2015-11-01

    The introduction of new biological drugs for the treatment of rheumatoid arthritis and spondyloarthritis has led to the creation of a number of registries in Europe and the United States. Most of them are sponsored by national rheumatology societies, and provide information that is useful in clinical practice concerning the clinical characteristics, efficacy, and safety of all licensed biological drugs. Their findings also help to improve our understanding of the quality of life and working ability of patients receiving biological drugs, and suggest methods for allocating resources. However, there are only a few registries for psoriatic arthritis, and efforts should be made to increase their number to obtain further reliable and useful data.

  11. The Qingdao Twin Registry

    DEFF Research Database (Denmark)

    Duan, Haiping; Ning, Feng; Zhang, Dongfeng;

    2013-01-01

    In 1998, the Qingdao Twin Registry was initiated as the main part of the Chinese National Twin Registry. By 2005, a total of 10,655 twin pairs had been recruited. Since then new twin cohorts have been sampled, with one longitudinal cohort of adolescent twins selected to explore determinants...... of metabolic disorders and health behaviors during puberty and young adulthood. Adult twins have been sampled for studying heritability of multiple phenotypes associated with metabolic disorders. In addition, an elderly twin cohort has been recruited with a focus on genetic studies of aging-related phenotypes...

  12. The Danish Heart Registry

    DEFF Research Database (Denmark)

    Özcan, Cengiz; Juel, Knud; Lassen, Jens Flensted

    2016-01-01

    AIM: The Danish Heart Registry (DHR) seeks to monitor nationwide activity and quality of invasive diagnostic and treatment strategies in patients with ischemic heart disease as well as valvular heart disease and to provide data for research. STUDY POPULATION: All adult (≥15 years) patients...

  13. Does Design Rationale Enhance Creativity?

    Directory of Open Access Journals (Sweden)

    Jing Wang

    2010-01-01

    Full Text Available Creativity and rationale are often viewed as two contrasting facets in software design. A lack in recognizing the facilitative relationship between creativity and rationale not only underestimates the benefits designers can obtain from rationale practices, but also confines the approaches that support creativity in software design. Our exploratory study provides empirical evidence of the positive correlation between rationale and creativity. Furthermore, we found that the feasibility of design alternatives and the comprehensiveness of tradeoff evaluation are critical to enhancing novelty, persuasiveness, and insightfulness. We also discuss future directions to further understand how these properties, or rationale quality in general, affects design creativity.

  14. The Danish Twin Registry

    DEFF Research Database (Denmark)

    Skytthe, Axel; Ohm Kyvik, Kirsten; Vilstrup Holm, Niels;

    2011-01-01

    Introduction: The Danish Twin Registry is a unique source for studies of genetic, familial and environmental factors on life events, health conditions and diseases. Content: More than 85,000 twin pairs born 1870-2008 in Denmark. Validity and coverage: Four main ascertainment methods have been...... employed. Completeness of ascertainment varies according to birth cohorts. For birth cohorts 1870-1930 both twins should survive to age 6 years. From 1931-1968 72% of all twin pairs has been ascertained, with complete ascertainment of all live born twins since 1968. CONCLUSION: Because twins have been...... identified independent of traits and on a population basis, the Danish Twin Registry is well suited for studies to understand the influence of genetic and environmental factors for a wide variety of diseases and traits....

  15. Malaysian Twin Registry.

    Science.gov (United States)

    Jahanfar, Shayesteh; Jaffar, Sharifah Halimah

    2013-02-01

    The National Malaysian Twin Registry was established in Royal College of Medicine, Perak, University Kuala Lumpur (UniKL) in June 2008 through a grant provided by UniKL. The general objective is to facilitate scientific research involving participation of twins and their family members in order to answer questions of health and wellbeing relevant to Malaysians. Recruitment is done via mass media, poster, and pamphlets. We now have 266 adult and 204 children twins registered. Several research projects including reproductive health study of twins and the role of co-bedding on growth and development of children are carried out. Registry holds annual activities for twins and seeks to provide health-related information for twins. We seek international collaboration.

  16. The Danish Schizophrenia Registry

    DEFF Research Database (Denmark)

    Baandrup, Lone; Cerqueira, Charlotte; Haller, Lea

    2016-01-01

    evaluation, antipsychotic treatment including adverse reactions, cardiovascular risk factors including laboratory values, family intervention, psychoeducation, postdischarge mental health care, assessment of suicide risk in relation to discharge, and assessment of global functioning. DESCRIPTIVE DATA......: The recorded data are available electronically for the reporting clinicians and responsible administrative personnel, and they are updated monthly. The registry publishes the national and regional results of all included quality measures in the annual audit reports. External researchers may obtain access...

  17. Disseminating Service Registry Records

    OpenAIRE

    A. Apps

    2006-01-01

    The JISC Information Environment Service Registry (IESR) contains descriptions of collections of resources available to researchers, learners and teachers in the UK, along with technical service access details. This paper describes the data model and metadata description schema of IESR, and the services IESR provides to disseminate its records. There is a particular focus on the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) interface, including a possible use scenario. I...

  18. The Brazilian Twin Registry.

    Science.gov (United States)

    Ferreira, Paulo H; Oliveira, Vinicius C; Junqueira, Daniela R; Cisneros, Lígia C; Ferreira, Lucas C; Murphy, Kate; Ordoñana, Juan R; Hopper, John L; Teixeira-Salmela, Luci F

    2016-12-01

    The Brazilian Twin Registry (BTR) was established in 2013 and has impelled twin research in South America. The main aim of the initiative was to create a resource that would be accessible to the Brazilian scientific community as well as international researchers interested in the investigation of the contribution of genetic and environmental factors in the development of common diseases, phenotypes, and human behavior traits. The BTR is a joint effort between academic and governmental institutions from Brazil and Australia. The collaboration includes the Federal University of Minas Gerais (UFMG) in Brazil, the University of Sydney and University of Melbourne in Australia, the Australian Twin Registry, as well as the research foundations CNPq and CAPES in Brazil. The BTR is a member of the International Network of Twin Registries. Recruitment strategies used to register twins have been through participation in a longitudinal study investigating genetic and environmental factors for low back pain occurrence, and from a variety of sources including media campaigns and social networking. Currently, 291 twins are registered in the BTR, with data on demographics, zygosity, anthropometrics, and health history having been collected from 151 twins using a standardized self-reported questionnaire. Future BTR plans include the registration of thousands of Brazilian twins identified from different sources and collaborate nationally and internationally with other research groups interested on twin studies.

  19. The New ADL Registry. ADL Registry Web Portal Changes

    Science.gov (United States)

    2009-08-19

    Approaches 18 19 Primary ADL Registry Contributors Contributor Records Entry Date Navy eLearning (US Navy) 2,086 08/05/2008 Joint Knowledge Development...ADL Registry  http://adlregistry.adlnet.gov/  Navy eLearning Content Team  https://www.netc.navy.mil/ile  Joint Knowledge Online  http

  20. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  1. Rationale Management Challenges in Requirements Engineering

    NARCIS (Netherlands)

    Liang, Peng; Avgeriou, Paris; He, Keqing

    2010-01-01

    Rationale and rationale management have been playing an increasingly prominent role in software system development mainly due to the knowledge demand during system evaluation, maintenance, and evolution, especially for large and complex systems. The rationale management for requirements engineering,

  2. The Danish Twin Registry

    DEFF Research Database (Denmark)

    Skytthe, Axel; Christiansen, Lene; Kyvik, Kirsten Ohm;

    2013-01-01

    decade of combining questionnaire and survey data with national demographic, social, and health registers in Statistics Denmark. Second, we describe our most recent data collection effort, which was conducted during the period 2008-2011 and included both in-person assessments of 14,000+ twins born 1931......Over the last 60 years, the resources and the research in the Danish Twin Registry (DTR) have periodically been summarized. Here, we give a short overview of the DTR and a more comprehensive description of new developments in the twenty-first century. First, we outline our experience over the last......-1969 and sampling of biological material, hereby expanding and consolidating the DTR biobank. Third, two examples of intensively studied twin cohorts are given. The new developments in the DTR in the last decade have facilitated the ongoing research and laid the groundwork for new research directions....

  3. Danish National Lymphoma Registry

    DEFF Research Database (Denmark)

    Arboe, Bente; Josefsson, Pär; Jørgensen, Judit;

    2016-01-01

    AIM OF DATABASE: The Danish National Lymphoma Registry (LYFO) was established in order to monitor and improve the diagnostic evaluation and the quality of treatment of all lymphoma patients in Denmark. STUDY POPULATION: The LYFO database was established in 1982 as a seminational database including...... all lymphoma patients referred to the departments of hematology. The database became nationwide on January 1, 2000. MAIN VARIABLES: The main variables include both clinical and paraclinical variables as well as details of treatment and treatment evaluation. Up to four forms are completed for each...... patient: a primary registration form, a treatment form, a relapse form, and a follow-up form. Variables are used to calculate six result quality indicators (mortality 30 and 180 days after diagnosis, response to first-line treatment, and survival estimates 1, 3, and 5 years after the time of diagnosis...

  4. Evaluation of the short- and long-term safety and therapy outcomes of the everolimus-eluting bioresorbable vascular scaffold system in patients with coronary artery stenosis: Rationale and design of the German–Austrian ABSORB RegIstRy (GABI-R)

    Energy Technology Data Exchange (ETDEWEB)

    Nef, Holger, E-mail: holger.nef@innere.med.uni-giessen.de [University of Giessen, Medizinische Klinik I, Department of Cardiology, Giessen (Germany); Wiebe, Jens [University of Giessen, Medizinische Klinik I, Department of Cardiology, Giessen (Germany); Achenbach, Stefan [University of Erlangen, Medizinische Klinik II, Department of Cardiology, Erlangen (Germany); Münzel, Thomas [Department of Medicine II, University Medical Center, Johannes Gutenberg University Mainz, Mainz (Germany); Naber, Christoph [Klinik für Kardiologie und Angiologie, Elisabeth-Krankenhaus, Essen (Germany); Richardt, Gert [Herzzentrum, Segeberger Kliniken GmbH, Bad Segeberg (Germany); Mehilli, Julinda [Department of Cardiology, Klinikum Großhadern, Ludwig- Maximilian Universität, Munich (Germany); Wöhrle, Jochen [Department of Internal Medicine II, University of Ulm, Ulm (Germany); Neumann, Till; Biermann, Janine [University of Essen, Department of Cardiology, Essen (Germany); Zahn, Ralf [Abteilung für Kardiologie, Herzzentrum Ludwigshafen, Ludwigshafen (Germany); Kastner, Johannes [Department of Cardiology, University of Vienna Medical School, Vienna (Austria); Schmermund, Axel [CCB, Cardioangiologisches Centrum Bethanien, Frankfurt (Germany); Pfannebecker, Thomas [Abbott Vascular Deutschland GmbH, Wetzlar (Germany); Schneider, Steffen; Limbourg, Tobias [Institut für Herzinfarktforschung, Ludwigshafen (Germany); Hamm, Christian W. [University of Giessen, Medizinische Klinik I, Department of Cardiology, Giessen (Germany); Kerckhoff Heart and Thorax Center, Department of Cardiology, Bad Nauheim (Germany)

    2016-01-15

    Background: Third-generation drug-eluting metal stents are the gold standard for treatment of coronary artery disease. The permanent metallic caging of the vessel, however, can result in limited vasomotion, chronic inflammation, and late expansive remodeling, conditions that can lead to late and very late stent thrombosis. The development of bioresorbable scaffolds (BRSs) promises advantages over metal stents due to complete biodegradation within 2–4 years. Theoretically, since vessel scaffolding is temporary and no permanent implant remains in the vessel, BRSs, as opposed to metal stents, once degraded would no longer be potential triggers for stent-related adverse events or side effects. Methods/design: The short- and long-term outcome after implantation of an everolimus-eluting, poly-L-lactic acid-based bioresorbable scaffold system (ABSORB, Abbott Vascular, Santa Clara, CA, USA) in the world-wide greatest all-comers cohort will be evaluated in the prospective, non-interventional, multicenter German–Austrian ABSORB RegIstRy (GABI-R). GABI-R will include over 5000 patients from about 100 study sites in Austria and Germany. Safety endpoints such as cardiac death, myocardial infarction, and clinically driven percutaneous or surgical target lesion and vessel revascularization will be evaluated during hospitalization and in the follow-up period (minimum of 5 years). Conclusion: Although two randomized controlled trials and several registries have documented safety and efficacy as well as non-inferiority of this everolimus-eluting ABSORB device compared with drug-eluting metal stents, the current knowledge regarding clinical application, treatment success, and long-term safety of using this BRS in daily routine is limited. Thus, the goal of GABI-R is to address this lack of information. - Highlights: • The GABI-R addresses a lack of data about bioresorbable scaffolds in daily practice. • 5000 patients with minimal in- and exclusion criteria at 100 sites will

  5. Rituximab use in the catastrophic antiphospholipid syndrome: descriptive analysis of the CAPS registry patients receiving rituximab.

    Science.gov (United States)

    Berman, Horacio; Rodríguez-Pintó, Ignasi; Cervera, Ricard; Morel, Nathalie; Costedoat-Chalumeau, Nathalie; Erkan, Doruk; Shoenfeld, Yehuda; Espinosa, Gerard

    2013-09-01

    The catastrophic variant of the antiphospholipid syndrome (APS) is characterized by thrombosis in multiple organs developing over a short period of time. First-line treatment for the catastrophic APS is the combination of anticoagulation plus corticosteroids plus plasma exchange and/or intravenous immunoglobulin. Despite this regimen, the mortality remains high and new treatment options are needed. By a systematic review of the Catastrophic APS Registry (CAPS Registry), we identified 20 patients treated with rituximab. The purpose of this study is to describe the clinical manifestations, laboratory features, and outcomes of rituximab-treated CAPS patients. In addition, the rationale for using rituximab in catastrophic APS is discussed.

  6. Tools and data services registry

    DEFF Research Database (Denmark)

    Ison, Jon; Rapacki, Kristoffer; Ménager, Hervé

    2016-01-01

    at hand.Here we present a community-driven curation effort, supported by ELIXIR-the European infrastructure for biological information-that aspires to a comprehensive and consistent registry of information about bioinformatics resources. The sustainable upkeep of this Tools and Data Services Registry...... is assured by a curation effort driven by and tailored to local needs, and shared amongst a network of engaged partners.As of September 2015, the registry includes 1633 resources, with depositions from 91 individual registrations including 40 institutional providers and 51 individuals. With community support...

  7. Iranian Joint Registry (Iranian National Hip and Knee Arthroplasty Registry).

    Science.gov (United States)

    Aslani, Hamidreza; Nourbakhsh, Seyed Taghi; Lahiji, Farivar A; Heydarian, Keykavoos; Jabalameli, Mahmood; Ghazavi, Mohammad Taghi; Tahmasebi, Mohammad Naghi; Fayyaz, Mahmoud Reza; Sazegari, Mohammad Ali; Mohaddes, Maziar; Rajabpour, Mojtaba; Emami, Mohammad; Jazayeri, Seyyed Mohammad; Madadi, Firooz; Farahini, Hossein; Mirzatoloee, Fardin; Gharahdaghi, Mohammad; Ebrahimzadeh, Mohammad Hossein; Ebrahimian, Mohammadreza; Mirvakili, Hossein; Bashti, Kaveh; Almasizadeh, Mohtasham; Abolghasemian, Mansour; Taheriazam, Afshin; Motififard, Mehdi; Yazdi, Hamidreza; Mobarakeh, Mahmood Karimi; Shayestehazar, Masoud; Moghtadae, Mehdi; Siavashi, Babak; Sajjadi, Mohammadreza M; Rasi, Alireza Manafi; Chabok, Seyyed Kazem; Zafarani, Zohreh; Salehi, Shahin; Ahmadi, Monireh; Mohammadi, Amin; Shahsavand, Mohammad Ebrahim

    2016-04-01

    Periodic evaluation and monitoring the health and economic outcome of joint replacement surgery is a common and popular process under the territory of joint registries in many countries. In this article we introduce the methodology used for the foundation of the National Iranian Joint Registry (IJR) with a joint collaboration of the Social Security Organization (SSO) and academic research departments considering the requirements of the Iran's Ministry of Health and Education.

  8. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  9. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  10. Environmental Agents Service (EAS) Registry System of Records

    Data.gov (United States)

    Department of Veterans Affairs — The Environmental Agent Service (EAS) Registries is the information system encompassing the Ionizing Radiation Registry (IRR), the Agent Orange Registry (AOR), and...

  11. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  12. Danish National Lymphoma Registry

    Directory of Open Access Journals (Sweden)

    Arboe B

    2016-10-01

    Full Text Available Bente Arboe,1 Pär Josefsson,2 Judit Jørgensen,3 Jacob Haaber,4 Paw Jensen,5 Christian Poulsen,6 Dorthe Rønnov-Jessen,7 Robert S Pedersen,8 Per Pedersen,9 Mikael Frederiksen,10 Michael Pedersen,1 Peter de Nully Brown1 1Department of Hematology, Copenhagen University Hospital, Rigshospitalet, 2Department of Hematology, Copenhagen University Hospital, Herlev Hospital, Copenhagen, 3Department of Hematology, Aarhus University Hospital, Aarhus, 4Department of Hematology, Odense University Hospital, Odense, 5Department of Hematology, Aalborg University Hospital, Aalborg, 6Department of Hematology, Roskilde Hospital, Roskilde, 7Department of Hematology, Vejle Hospital, Vejle, 8Department of Hematology, Holstebro Hospital, Holstebro, 9Department of Hematology, Esbjerg Hospital, Esbjerg, 10Department of Hematology, Haderslev Hospital, Haderslev, Denmark Aim of database: The Danish National Lymphoma Registry (LYFO was established in order to monitor and improve the diagnostic evaluation and the quality of treatment of all lymphoma patients in Denmark. Study population: The LYFO database was established in 1982 as a seminational database including all lymphoma patients referred to the departments of hematology. The database became nationwide on January 1, 2000. Main variables: The main variables include both clinical and paraclinical variables as well as details of treatment and treatment evaluation. Up to four forms are completed for each patient: a primary registration form, a treatment form, a relapse form, and a follow-up form. Variables are used to calculate six result quality indicators (mortality 30 and 180 days after diagnosis, response to first-line treatment, and survival estimates 1, 3, and 5 years after the time of diagnosis, and three process quality indicators (time from diagnosis until the start of treatment, the presence of relevant diagnostic markers, and inclusion rate in clinical protocols. Descriptive data: Approximately 23

  13. Humanities Program: Critique and Rationale.

    Science.gov (United States)

    Pinar, William Frederick

    The psychological impact of schooling is examined within the context of a new school of British psychoanalytic thought. It is concluded that schooling is maddening, in the sense used by Laing, Cooper, and others. A rationale for a sane humanities program is established consisting of two components: the nuclear and the cortical. The nuclear is the…

  14. Breast and Colon Cancer Family Registries

    Science.gov (United States)

    The Breast Cancer Family Registry and the Colon Cancer Family Registry were established by the National Cancer Institute as a resource for investigators to use in conducting studies on the genetics and molecular epidemiology of breast and colon cancer.

  15. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  16. The danish multiple sclerosis registry

    DEFF Research Database (Denmark)

    Brønnum-Hansen, Henrik; Koch-Henriksen, Nils; Stenager, Egon

    2011-01-01

    Introduction: The Danish Multiple Sclerosis (MS) Registry was established in 1956. Content: The register comprises data on all Danes who had MS in 1949 or who have been diagnosed since. Data on new cases and updated information on persons with an MS diagnosis already notified are continuously...

  17. 33 CFR 279.9 - Objective rationale.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Objective rationale. 279.9... DEFENSE RESOURCE USE: ESTABLISHMENT OF OBJECTIVES § 279.9 Objective rationale. (a) Statement of objectives... objective(s) and providing the rationale, impact, and basic management measures for their...

  18. New England Medical Center Posterior Circulation registry.

    Science.gov (United States)

    Caplan, Louis R; Wityk, Robert J; Glass, Thomas A; Tapia, Jorge; Pazdera, Ladislav; Chang, Hui-Meng; Teal, Phillip; Dashe, John F; Chaves, Claudia J; Breen, Joan C; Vemmos, Kostas; Amarenco, Pierre; Tettenborn, Barbara; Leary, Megan; Estol, Conrad; Dewitt, L Dana; Pessin, Michael S

    2004-09-01

    Among 407 New England Medical Center Posterior Circulation registry patients, 59% had strokes without transient ischemic attacks (TIAs), 24% had TIAs then strokes, and 16% had only TIAs. Embolism was the commonest stroke mechanism (40% of patients including 24% cardiac origin, 14% intraarterial, 2% cardiac and arterial sources). In 32% large artery occlusive lesions caused hemodynamic brain ischemia. Infarcts most often included the distal posterior circulation territory (rostral brainstem, superior cerebellum and occipital and temporal lobes); the proximal (medulla and posterior inferior cerebellum) and middle (pons and anterior inferior cerebellum) territories were equally involved. Severe occlusive lesions (>50% stenosis) involved more than one large artery in 148 patients; 134 had one artery site involved unilaterally or bilaterally. The commonest occlusive sites were: extracranial vertebral artery (52 patients, 15 bilateral) intracranial vertebral artery (40 patients, 12 bilateral), basilar artery (46 patients). Intraarterial embolism was the commonest mechanism of brain infarction in patients with vertebral artery occlusive disease. Thirty-day mortality was 3.6%. Embolic mechanism, distal territory location, and basilar artery occlusive disease carried the poorest prognosis. The best outcome was in patients who had multiple arterial occlusive sites; they had position-sensitive TIAs during months to years.

  19. A renal registry for Africa: first steps.

    Science.gov (United States)

    Davids, M Razeen; Eastwood, John B; Selwood, Neville H; Arogundade, Fatiu A; Ashuntantang, Gloria; Benghanem Gharbi, Mohammed; Jarraya, Faiçal; MacPhee, Iain A M; McCulloch, Mignon; Plange-Rhule, Jacob; Swanepoel, Charles R; Adu, Dwomoa

    2016-02-01

    There is a dearth of data on end-stage renal disease (ESRD) in Africa. Several national renal registries have been established but have not been sustainable because of resource limitations. The African Association of Nephrology (AFRAN) and the African Paediatric Nephrology Association (AFPNA) recognize the importance of good registry data and plan to establish an African Renal Registry. This article reviews the elements needed for a successful renal registry and gives an overview of renal registries in developed and developing countries, with the emphasis on Africa. It then discusses the proposed African Renal Registry and the first steps towards its implementation. A registry requires a clear purpose, and agreement on inclusion and exclusion criteria, the dataset and the data dictionary. Ethical issues, data ownership and access, the dissemination of findings and funding must all be considered. Well-documented processes should guide data collection and ensure data quality. The ERA-EDTA Registry is the world's oldest renal registry. In Africa, registry data have been published mainly by North African countries, starting with Egypt and Tunisia in 1975. However, in recent years no African country has regularly reported national registry data. A shared renal registry would provide participating countries with a reliable technology platform and a common data dictionary to facilitate joint analyses and comparisons. In March 2015, AFRAN organized a registry workshop for African nephrologists and then took the decision to establish, for the first time, an African Renal Registry. In conclusion, African nephrologists have decided to establish a continental renal registry. This initiative could make a substantial impact on the practice of nephrology and the provision of services for adults and children with ESRD in many African countries.

  20. Forensic Analysis of Windows Registry Against Intrusion

    Directory of Open Access Journals (Sweden)

    Haoyang Xie

    2012-03-01

    Full Text Available Windows Registry forensics is an important branch of computer and network forensics. Windows Registry is often considered as the heart of Windows Operating Systems because it contains allof the configuration setting of specific users, groups, hardware, software, and networks. Therefore, Windows Registry can be viewed as a gold mine of forensic evidences which could be used in courts. This paper introduces the basics of Windows Registry, describes its structure and its keys and subkeys thathave forensic values. This paper also discusses how the Windows Registry forensic keys can be applied in intrusion detection.

  1. New registry: National Cancer Patient Registry--Colorectal Cancer.

    Science.gov (United States)

    Wendy, L; Radzi, M

    2008-09-01

    Colorectal cancer is emerging as one of the commonest cancers in Malaysia. Data on colorectal cancer from the National Cancer Registry is very limited. Comprehensive information on all aspects of colorectal cancer, including demographic details, pathology and treatment outcome are needed as the management of colorectal cancer has evolved rapidly over the years involving several disciplines including gastroenterology, surgery, radiology, pathology and oncology. This registry will be an important source of information that can help the development of guidelines to improve colorectal cancer care relevant to this country. The database will initially recruit all colorectal cancer cases from eight hospitals. The data will be stored on a customized web-based case report form. The database has begun collecting data from 1 October 2007 and will report on its first year findings at the end of 2008.

  2. Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack

    OpenAIRE

    2014-01-01

    We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, P...

  3. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  4. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  5. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  6. On the Cooperation of Independent Registries

    CERN Document Server

    Miraz, Matteo

    2010-01-01

    Registries play a key role in service-oriented applications. Originally, they were neutral players between service providers and clients. The UDDI Business Registry (UBR) was meant to foster these concepts and provide a common reference for companies interested in Web services. The more Web services were used, the more companies started create their own local registries: more efficient discovery processes, better control over the quality of published information, and also more sophisticated publication policies motivated the creation of private repositories. The number and heterogeneity of the different registries - besides the decision to close the UBR are pushing for new and sophisticated means to make different registries cooperate. This paper proposes DIRE (DIstributed REgistry), a novel approach based on a publish and subscribe (P/S) infrastructure to federate different heterogeneous registries and make them exchange information about published services. The paper discusses the main motivations for the P...

  7. Client interfaces to the Virtual Observatory Registry

    Science.gov (United States)

    Demleitner, M.; Harrison, P.; Taylor, M.; Normand, J.

    2015-04-01

    The Virtual Observatory Registry is a distributed directory of information systems and other resources relevant to astronomy. To make it useful, facilities to query that directory must be provided to humans and machines alike. This article reviews the development and status of such facilities, also considering the lessons learnt from about a decade of experience with Registry interfaces. After a brief outline of the history of the standards development, it describes the use of Registry interfaces in some popular clients as well as dedicated UIs for interrogating the Registry. It continues with a thorough discussion of the design of the two most recent Registry interface standards, RegTAP on the one hand and a full-text-based interface on the other hand. The article finally lays out some of the less obvious conventions that emerged in the interaction between providers of registry records and Registry users as well as remaining challenges and current developments.

  8. Client Interfaces to the Virtual Observatory Registry

    CERN Document Server

    Demleitner, Markus; Taylor, Mark; Normand, Jonathan

    2015-01-01

    The Virtual Observatory Registry is a distributed directory of information systems and other resources relevant to astronomy. To make it useful, facilities to query that directory must be provided to humans and machines alike. This article reviews the development and status of such facilities, also considering the lessons learnt from about a decade of experience with Registry interfaces. After a brief outline of the history of the standards development, it describes the use of Registry interfaces in some popular clients as well as dedicated UIs for interrogating the Registry. It continues with a thorough discussion of the design of the two most recent Registry interface standards, RegTAP on the one hand and a full-text-based interface on the other hand. The article finally lays out some of the less obvious conventions that emerged in the interaction between providers of registry records and Registry users as well as remaining challenges and current developments.

  9. The Danish Lung Cancer Registry

    DEFF Research Database (Denmark)

    Jakobsen, Erik; Rasmussen, Torben Riis

    2016-01-01

    AIM OF DATABASE: The Danish Lung Cancer Registry (DLCR) was established by the Danish Lung Cancer Group. The primary and first goal of the DLCR was to improve survival and the overall clinical management of Danish lung cancer patients. STUDY POPULATION: All Danish primary lung cancer patients since...... 2000 are included into the registry and the database today contains information on more than 50,000 cases of lung cancer. MAIN VARIABLES: The database contains information on patient characteristics such as age, sex, diagnostic procedures, histology, tumor stage, lung function, performance...... the results are commented for local, regional, and national audits. Indicator results are supported by descriptive reports with details on diagnostics and treatment. CONCLUSION: DLCR has since its creation been used to improve the quality of treatment of lung cancer in Denmark and it is increasingly used...

  10. The Danish Shoulder Arthroplasty Registry

    DEFF Research Database (Denmark)

    Rasmussen, Jeppe; Jakobsen, John; Brorson, Stig

    2012-01-01

    The Danish Shoulder Arthroplasty Registry (DSR) was established in 2004. Data are reported electronically by the surgeons. Patient-reported outcome is collected 10-14 months postoperatively using the Western Ontario osteoarthritis of the shoulder index (WOOS). 2,137 primary shoulder arthroplasties......% reverse shoulder arthroplasties, and 3% total arthroplasties. Median WOOS was 59% (IQR: 37-82). 5% had been revised by the end of June 2010. The most frequent indications for revision were dislocation or glenoid attrition....

  11. The Danish National Prescription Registry

    DEFF Research Database (Denmark)

    Kildemoes, Helle Wallach; Toft Sørensen, Henrik; Hallas, Jesper

    2011-01-01

    Introduction: Individual-level data on all prescription drugs sold in Danish community pharmacies has since 1994 been recorded in the Register of Medicinal Products Statistics of the Danish Medicines Agency. Content: The register subset, termed the Danish National Prescription Registry (DNPR...... on the dispensed drug. Conclusion: The possibility of linkage with many other nationwide individual-level data sources renders the DNPR a very powerful pharmacoepidemiological tool...

  12. The Danish Heart Failure Registry

    Directory of Open Access Journals (Sweden)

    Schjødt I

    2016-10-01

    Full Text Available Inge Schjødt,1 Anne Nakano,2,3 Kenneth Egstrup,4 Charlotte Cerqueira5 1Department of Cardiology, 2Department of Clinical Epidemiology, Aarhus University Hospital, 3Registry Support Centre of Clinical Quality and Health Informatics (West, Aarhus, 4Department of Cardiology, Odense University Hospital, Svendborg Hospital, Svendborg, 5Registry Support Centre of Epidemiology and Biostatistics (East, Research Centre for Prevention and Health, Capital Region of Denmark, Glostrup, Denmark Aim of database: The aim of the Danish Heart Failure Registry (DHFR is to monitor and improve the care of patients with incident heart failure (HF in Denmark. Study population: The DHFR includes inpatients and outpatients ($18 years with incident HF. Reporting to the DHFR is mandatory for the Danish hospital departments treating patients with incident HF. Final decision to register a patient in the DHFR is made by a cardiologist to ensure the validity of the diagnosis. Approximately 42,400 patients with incident HF were registered in the DHFR in July 2015. Main variables and descriptive data: The main variables recorded in the DHFR are related to the indicators for quality of care in patients with incident HF: performance of echocardiography, functional capacity (New York Heart Association functional classification, pharmacological therapy (angiotensin converting enzyme/angiotensin II antagonist inhibitors, beta-blockers, and mineralocorticoid receptor antagonist, nonpharmacological therapy (physical training, patient education, 4-week readmission rate, and 1-year mortality. Furthermore, basic patient characteristics and prognostic factors (eg, smoking and alcohol are recorded. At the annual national audit in the DHFR, the indicators and standards for good clinical quality of care for patients with HF are discussed, and recommendations are reported back to clinicians to promote quality improvement initiatives. Furthermore, results and recommendations are communicated

  13. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  14. Evaluation of institutional cancer registries in Colombia.

    Science.gov (United States)

    Cuervo, L G; Roca, S; Rodríguez, M N; Stein, J; Izquierdo, J; Trujillo, A; Mora, M

    1999-09-01

    The four primary objectives of this descriptive study were to: 1) design a quality-measurement instrument for institutional cancer registries (ICRs), 2) evaluate the existing ICRs in Colombia with the designed instrument, 3) categorize the different registries according to their quality and prioritize efforts that will efficiently promote better registries with the limited resources available, and 4) determine the institution with the greatest likelihood of successfully establishing Colombia's second population-based cancer registry. In 1990 the National Cancer Institute of Colombia developed 13 institution-based cancer registries in different Colombian cities in order to promote the collection of data from a large group of cancer diagnostic and treatment centers. During the first half of 1997, this evaluation reviewed 12 registries; one of the original 13 no longer existed. All of the Colombian institutions (hospitals) that maintain institution-based cancer registries were included in the study. At each institution, a brief survey was administered to the hospital director, the registry coordinator, and the registrar (data manager). Researchers investigated the institutions by looking at six domains that are in standard use internationally. Within each domain, questions were developed and selected through the Delphi method. Each domain and each question were assigned weights through a consensus process. In most cases, two interviewers went to each site to collect the information. The university hospitals in Cali, Pereira, and Medellín had substantially higher scores, reflecting a good level of performance. Four of the 12 institutions had almost no cancer registry work going on. Five of the 12 hospital directors considered that the information provided by the cancer registries influenced their administrative decisions. Three of the registries had patient survival data. Four of the institutions allocated specific resources to operate their cancer registries; in the

  15. The gulf implantable cardioverter-defibrillator registry: Rationale, methodology, and implementation

    Directory of Open Access Journals (Sweden)

    Alawi A Alsheikh-Ali

    2015-01-01

    Conclusions: Gulf ICD is the first prospective, observational, multi-center, and multinational study of the characteristics and, the outcomes of patients receiving ICDs in the Arab Gulf region. The study will provide valuable insights into the utilization of and outcomes related to ICD therapy in the Gulf region.

  16. [Current registry studies of acute ischemic stroke].

    Science.gov (United States)

    Veltkamp, R; Jüttler, E; Pfefferkorn, T; Purrucker, J; Ringleb, P

    2012-10-01

    Study registries offer the opportunity to evaluate the effects of new therapies or to observe the consequences of new treatments in clinical practice. The SITS-MOST registry confirmed the validity of findings from randomized trials on intravenous thrombolysis concerning safety and efficacy in the clinical routine. Current study registries concerning new interventional thrombectomy techniques suggest a high recanalization rate; however, the clinical benefit can only be evaluated in randomized, controlled trials. Similarly, the experiences of the BASICS registry on basilar artery occlusion have led to the initiation of a controlled trial. The benefit of hemicraniectomy in malignant middle cerebral artery infarction has been demonstrated by the pooled analysis of three randomized trials. Numerous relevant aspects are currently documented in the DESTINY-R registry. Finally, the recently started RASUNOA registry examines diagnostic and therapeutic aspects of ischemic and hemorrhagic stroke occurring during therapy with new oral anticoagulants.

  17. Supply Chain Attack Framework and Attack Patterns

    Science.gov (United States)

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  18. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  19. The Danish Heart Failure Registry

    DEFF Research Database (Denmark)

    Schjødt, Inge; Nakano, Anne; Egstrup, Kenneth

    2016-01-01

    AIM OF DATABASE: The aim of the Danish Heart Failure Registry (DHFR) is to monitor and improve the care of patients with incident heart failure (HF) in Denmark. STUDY POPULATION: The DHFR includes inpatients and outpatients (≥18 years) with incident HF. Reporting to the DHFR is mandatory...... in an annual report. All standards for the quality indicators have been met at a national level since 2014. Indicators for treatment status 1 year after diagnosis are under consideration (now prevalent HF). CONCLUSION: The DHFR is a valuable tool for continuous improvement of quality of care in patients...

  20. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  1. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  2. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  3. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  4. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  5. Private provider participation in statewide immunization registries

    Directory of Open Access Journals (Sweden)

    Cowan Anne E

    2006-02-01

    Full Text Available Abstract Background Population-based registries have been promoted as an effective method to improve childhood immunization rates, yet rates of registry participation in the private sector are low. We sought to describe, through a national overview, the perspectives of childhood immunization providers in private practice regarding factors associated with participation or non-participation in immunization registries. Methods Two mailed surveys, one for 264 private practices identified as registry non-participants and the other for 971 identified as registry participants, from 15 of the 31 states with population-based statewide immunization registries. Frequency distributions were calculated separately for non-participants and participants regarding the physician-reported factors that influenced decisions related to registry participation. Pearson chi-square tests of independence were used to assess associations among categorical variables. Results Overall response rate was 62% (N = 756. Among non-participants, easy access to records of vaccines provided at other sites (N = 101, 68% and printable immunization records (N = 82, 55% were most often cited as "very important" potential benefits of a registry, while the most commonly cited barriers to participation were too much cost/staff time (N = 36, 38% and that the practice has its own system for recording and monitoring immunizations (N = 35, 37%. Among registry participants, most reported using the registry to input data on vaccines administered (N = 326, 87% and to review immunization records of individual patients (N = 302, 81%. A minority reported using it to assess their practice's immunization coverage (N = 110, 29% or generate reminder/recall notices (N = 54, 14%. Few participants reported experiencing "significant" problems with the registry; the most often cited was cost/staff time to use the registry (N = 71, 20%. Conclusion Most registry participants report active participation with few

  6. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  7. Windows registry forensics advanced digital forensic analysis of the Windows registry

    CERN Document Server

    Carvey, Harlan

    2011-01-01

    Harlan Carvey brings readers an advanced book on Windows Registry - the most difficult part of Windows to analyze in forensics! Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. This book also has a DVD containing tools, instructions and videos.

  8. [Local registries in general/family practice].

    Science.gov (United States)

    Cindrić, Jasna

    2007-02-01

    Entering medical records into registries of all sorts has always been a part of everyday work of a general/family physician. There is a distinction between public/population registries on the one hand, and internal, local registries on the other hand. Local registries refer to the catchment population of a particular general/family practice. While keeping population-registries has become a routine with a high level of uniformity in collecting, delivering, recording, analyzing and controlling information, there are no recommendations or standards for keeping local registries, although their importance as well as indisputable necessity have been recognized. They are invaluable for providing an insight into the condition and history of a particular disease in a particular area, planning and taking preventive measures and activities, supervising therapy and medical treatment, as well as for statistical analyses and scientific studies. The most important registry in the field of general practice is the one called "List of health care under the supervision of chosen general/family physicians", which can serve as an index for any other individual record or record of diseases by name kept at a particular general/family practice. Although local registries have "evolved" from notebooks into modern informatic databases, the problem of up-to-dateness cannot be solved until the whole health care system has been connected for competent and authorized persons to be able to record changes of data where and when they take place.

  9. 50 CFR 600.1410 - Registry process.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Registry process. 600.1410 Section 600.1410 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC... United States § 600.1410 Registry process. (a) A person may register through the NMFS web site at...

  10. Service registry design: an information service approach

    NARCIS (Netherlands)

    Ferreira Pires, Luis; Oostrum, van Arjen; Wijnhoven, Fons; Wang, J.

    2010-01-01

    A service registry is a Service-Oriented Architecture (SOA) component that keeps a ‘catalogue’ of available services. It stores service specifications so that these specifications can be found by potential users. Discussions on the design of service registries currently focus on technical issues, wh

  11. Central registry in psychiatry: A structured review

    Directory of Open Access Journals (Sweden)

    Jyoti Prakash

    2014-01-01

    Full Text Available Background: Central registry in psychiatry is being practiced in few countries and has been found useful in research and clinical management. Role of central registry has also expanded over the years. Materials and Methods: All accessible internet database Medline, Scopus, Embase were accessed from 1990 till date. Available data were systematically reviewed in structured manner and analyzed. Results: Central registry was found useful in epidemiological analysis, association studies, outcome studies, comorbidity studies, forensic issue, effective of medication, qualitative analysis etc., Conclusion: Central registry proves to be effective tool in quantitative and qualitative understanding of psychiatry practice. Findings of studies from central registry can be useful in modifying best practice and evidence based treatment in psychiatry.

  12. The Danish National Chronic Lymphocytic Leukemia Registry

    DEFF Research Database (Denmark)

    da Cunha-Bang, Caspar; Geisler, Christian Hartmann; Enggaard, Lisbeth;

    2016-01-01

    , and for decision on treatment initiation as well as characteristics included in the CLL International Prognostic Index are collected. DESCRIPTIVE DATA: To ensure full coverage of Danish CLL patients in the registry, both continuous queries in case of missing data, and cross-referencing with the Danish National......, 3,082 patients have been registered. CONCLUSION: The Danish National CLL Registry is based within the Danish National Hematology Database. The registry covers a cohort of all patients diagnosed with CLL in Denmark since 2008. It forms the basis for quality assessment of CLL treatment in Denmark......AIM: In 2008, the Danish National Chronic Lymphocytic Leukemia Registry was founded within the Danish National Hematology Database. The primary aim of the registry is to assure quality of diagnosis and care of patients with chronic lymphocytic leukemia (CLL) in Denmark. Secondarily, to evaluate...

  13. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  14. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  15. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  16. The Danish adult diabetes registry

    DEFF Research Database (Denmark)

    Jørgensen, Marit Eika; Kristensen, Jette K.; Husted, Gitte Reventlov

    2016-01-01

    Aim of the database: The aim of the Danish Adult Diabetes Registry (DADR) is to provide data from both the primary health care sector (general practice [GP]) and the secondary sector (specialized outpatient clinics) to assess the quality of treatment given to patients with diabetes. The indicators...... represent process and outcome indicators selected from the literature. Study population: The total diabetes population in Denmark is estimated to be ∼300,000 adult diabetes patients. Approximately 10% have type 1 diabetes, which is managed mainly in the secondary sector, and 90% have type 2 diabetes......, glucose-, blood pressure-, and lipid-lowering treatment (yes/no), insulin pump treatment (yes/ no), and date of last eye and foot examination. Descriptive data: In 2014, the annual report included data regarding over 38,000 patients from outpatient clinics, which is assumed to have included almost all...

  17. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  18. Applying Registry Services to Spaceflight Technologies to Aid in the Assignment of Assigned Numbers to Disparate Systems and their Technologies to Further Enable Interoperability

    Science.gov (United States)

    Bradford, Robert N.; Nichols, Kelvin F.; Witherspoon, Keith R.

    2006-01-01

    technologies will be those that are currently in need of expansion namely the assignment of satellite designations and the process which controls assignments. Second, we will analyze the technologies currently standardized under the Consultative Committee for Space Data Systems (CCSDS) banner. Third, we will analyze the current CCSDS working group and Birds of a Feather (BoF) activities to ascertain registry requirements. Lastly, we will identify technologies that are either currently under the auspices of another standards body or technologies that are currently not standardized. For activities one through three, we will provide the analysis by either discipline or technology with rationale, identification and brief description of requirements and precedence. For activity four, we will provide a list of current standards bodies e.g. IETF and a list of potential candidates.

  19. Bioethics: A Rationale and a Model

    Science.gov (United States)

    Barman, Charles R.; Rusch, John J.

    1978-01-01

    Discusses the rationale for and development of an undergraduate bioethics course. Based on experiences with the course, general suggestions are offered to instructors planning to add bioethics to existing curricula. (MA)

  20. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  1. EPA Facility Registry Service (FRS): ACRES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of sites that link to...

  2. EPA Facility Registry Service (FRS): RADINFO

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  3. EPA Facility Registry Service (FRS): SDWIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  4. EPA Facility Registry Service (FRS): RMP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  5. EPA Facility Registry Service (FRS): NEI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  6. EPA Facility Registry Service (FRS): TRI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  7. EPA Facility Registry Service (FRS): OIL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link to the Oil...

  8. Validation of defibrillator lead performance registry data

    DEFF Research Database (Denmark)

    Kristensen, Anders Elgaard; Larsen, Jacob Moesgaard; Nielsen, Jens Cosedis

    2017-01-01

    intervention. The validity of the less detailed overall reasons for lead interventions commonly used to report lead performance is also excellent. These findings indicate high registry data quality appropriate for scientific analysis and industry-independent post-marketing surveillance.......AIMS: The validity of registry data on defibrillator lead performance is described only sparsely, despite its clinical importance. This study investigated the validity of defibrillator lead performance registry data in a nationwide and population-based registry. METHODS AND RESULTS: We identified.......9% (95% CI: 85.2-90.2%) with a κ value of 0.82 (95% CI:0.78-0.86) representing an almost perfect match. CONCLUSION: The validity of data on defibrillator lead performance recorded in the DPIR is excellent for the specific types of lead intervention and good for the specific reasons for defibrillator lead...

  9. The Danish National Acute Leukemia Registry

    DEFF Research Database (Denmark)

    Østgård, Lene Sofie Granfeldt; Nørgaard, Jan Maxwell; Raaschou-Jensen, Klas Kræsten;

    2016-01-01

    AIM OF DATABASE: The main aim of the Danish National Acute Leukemia Registry (DNLR) was to obtain information about the epidemiology of the hematologic cancers acute myeloid leukemia (AML), acute lymphoblastic leukemia (ALL), and myelodysplastic syndrome (MDS). STUDY POPULATION: The registry...... patients is currently 90%. MAIN VARIABLES AND DESCRIPTIVE DATA: Approximately, 250 AML patients, 25 ALL patients, and 230 MDS patients are registered in the DNLR every year. In January 2015, the registry included detailed patient characteristics, disease characteristics, treatment characteristics...... years. To ensure this high coverage, completeness, and quality of data, linkage to the Danish Civil Registration System and the Danish National Registry of Patients, and several programmed data entry checks are used. CONCLUSION: The completeness and positive predictive values of the leukemia data have...

  10. EPA Facility Registry Service (FRS): NCDB

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  11. EPA Facility Registry Service (FRS): RBLC

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  12. EPA Facility Registry System (FRS): NCES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  13. EPA Facility Registry Service (FRS): ICIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  14. EPA Facility Registry Service (FRS): BRAC

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  15. Substance Identification Information from EPA's Substance Registry

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Substance Registry Services (SRS) is the authoritative resource for basic information about substances of interest to the U.S. EPA and its state and tribal...

  16. Assessing Ontario's Personal Support Worker Registry

    Directory of Open Access Journals (Sweden)

    Audrey Laporte

    2013-08-01

    Full Text Available In response to the growing role of personal support workers (PSWs in the delivery of health care services to Ontarians, the Ontario government has moved forward with the creation of a PSW registry. This registry will be mandatory for all PSWs employed by publicly funded health care employers, and has the stated objectives of better highlighting the work that PSWs do in Ontario, providing a platform for PSWs and employers to more easily access the labour market, and to provide government with information for human resources planning. In this paper we consider the factors that brought the creation of a PSW registry onto the Ontario government’s policy agenda, discuss how the registry is being implemented, and provide an analysis of the strengths and weaknesses of this policy change.

  17. EPA Facility Registry Service (FRS): LANDFILL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of non-hazardous waste...

  18. EPA Facility Registry System (FRS): NEPT

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  19. EPA Facility Registry Service (FRS): BIA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  20. EPA Facility Registry Service (FRS): CAMDBS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  1. The Italian registry of soft tissue tumors.

    Science.gov (United States)

    Clemente, C; Orazi, A; Rilke, F

    1988-01-01

    After a review of the incidence data on malignant soft-tissue tumors in Italy (Registro dei Tumori della Regione Lombardia, provincia di Varese), Europe (nine European Cancer Registries considered representative of various geographical areas) and extra-European countries (data of ten World Cancer Registries), the aim and the organization of the Italian Malignant Soft-Tissue Tumor Registry are described. The collection system is based on dedicated forms prepared for the computerization of all data. From 1.1.1985 to 31.3.1987, 207 cases of malignant and potentially malignant soft-tissue tumors entered the Registry, with exclusion of those sarcomas arising in viscera. The distribution, categorized by histologic type, sex and site, and the preliminary results on relapses and metastases are reported.

  2. Veterans Affairs Central Cancer Registry (VACCR)

    Data.gov (United States)

    Department of Veterans Affairs — The Veterans Affairs Central Cancer Registry (VACCR) receives and stores information on cancer diagnosis and treatment constraints compiled and sent in by the local...

  3. Registries Help Moms Measure Medication Risks

    Science.gov (United States)

    ... Home For Consumers Consumer Updates Registries Help Inform Medication Use in Pregnancy Share Tweet Linkedin Pin it ... or epilepsy, pregnant women must often take prescription medication. Studies show that most women take at least ...

  4. Linking Medicare, Medicaid, and Cancer Registry Data...

    Data.gov (United States)

    U.S. Department of Health & Human Services — Linking Medicare, Medicaid, and Cancer Registry Data to Study the Burden of Cancers in West Virginia In the United States, the elderly carry an unequal burden of...

  5. EPA Facility Registry Service (FRS): RCRA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of hazardous waste...

  6. Workload and time management in central cancer registries: baseline data and implication for registry staffing.

    Science.gov (United States)

    Chapman, Susan A; Mulvihill, Linda; Herrera, Carolina

    2012-01-01

    The Workload and Time Management Survey of Central Cancer Registries was conducted in 2011 to assess the amount of time spent on work activities usually performed by cancer registrars. A survey including 39 multi-item questions,together with a work activities data collection log, was sent by email to the central cancer registry (CCR) manager in each of the 50 states and the District of Columbia. Twenty-four central cancer registries (47%) responded to the survey.Results indicate that registries faced reductions in budgeted staffing from 2008-2009. The number of source records and total cases were important indicators of workload. Four core activities, including abstracting at the registry, visual editing,case consolidation, and resolving edit reports, accounted for about half of registry workload. We estimate an average of 12.4 full-time equivalents (FTEs) are required to perform all cancer registration activities tracked by the survey; however,estimates vary widely by registry size. These findings may be useful for registries as a benchmark for their own registry workload and time-management data and to develop staffing guidelines.

  7. Experiences with the ISOcat Data Category Registry

    OpenAIRE

    Broeder, Daan; Schuurman, Ineke; Windhouwer, Menzo; Chair), Nicoletta Calzolari (Conference; Choukri, Khalid; Declerck, Thierry; Loftsson, Hrafn; Maegaard, Bente; Mariani, Joseph; Moreno, Asuncion; Odijk, Jan; Piperidis, Stelios

    2014-01-01

    The ISOcat Data Category Registry has been a joint project of both ISO TC 37 and the European CLARIN infrastructure. In this paper the experiences of using ISOcat in CLARIN are described and evaluated. This evaluation clarifies the requirements of CLARIN with regard to a semantic registry to support its semantic interoperability needs. A simpler model based on concepts instead of data categories and a simpler workflow based on community recommendations will address these needs better and offe...

  8. Experiences with the ISOcat Data Category Registry

    OpenAIRE

    Broeder, Daan; Schuurman, Ineke; Windhouwer, Menzo

    2014-01-01

    The ISOcat Data Category Registry has been a joint project of both ISO TC 37 and the European CLARIN infrastructure. In this paper the experiences of using ISOcat in CLARIN are described and evaluated. This evaluation clarifies the requirements of CLARIN with regard to a semantic registry to support its semantic interoperability needs. A simpler model based on concepts instead of data cate-gories and a simpler workflow based on community recommendations will address these needs better and off...

  9. Patient registries for substance use disorders

    Directory of Open Access Journals (Sweden)

    Tai B

    2014-07-01

    Full Text Available Betty Tai,1 Lian Hu,2 Udi E Ghitza,1 Steven Sparenborg,1 Paul VanVeldhuisen,2 Robert Lindblad2 1Center for the Clinical Trials Network, National Institute on Drug Abuse, National Institutes of Health, Bethesda, MD, USA; 2The EMMES Corporation, Rockville, MD, USA Abstract: This commentary discusses the need for developing patient registries of substance use disorders (SUD in general medical settings. A patient registry is a tool that documents the natural history of target diseases. Clinicians and researchers use registries to monitor patient comorbidities, care procedures and processes, and treatment effectiveness for the purpose of improving care quality. Enactments of the Affordable Care Act 2010 and the Mental Health Parity and Addiction Equity Act 2008 open opportunities for many substance users to receive treatment services in general medical settings. An increased number of patients with a wide spectrum of SUD will initially receive services with a chronic disease management approach in primary care. The establishment of computer-based SUD patient registries can be assisted by wide adoption of electronic health record systems. The linkage of SUD patient registries with electronic health record systems can facilitate the advancement of SUD treatment research efforts and improve patient care. Keywords: substance use disorders, primary care, registry, electronic health records, chronic care model

  10. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  11. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  12. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  13. The Danish Cerebral Palsy Registry. A registry on a specific impairment

    DEFF Research Database (Denmark)

    Uldall, P; Michelsen, S I; Topp, M;

    2001-01-01

    Cerebral palsy (CP) is the commonest disabling impairment in childhood, with a prevalence of 2-3 per 1000 live births. The Danish Cerebral Palsy Registry is a research registry that contains cases of CP from birth year 1925 and has estimated the birth prevalence since 1950. Data on children with CP...

  14. Cancer registries in Japan: National Clinical Database and site-specific cancer registries.

    Science.gov (United States)

    Anazawa, Takayuki; Miyata, Hiroaki; Gotoh, Mitsukazu

    2015-02-01

    The cancer registry is an essential part of any rational program of evidence-based cancer control. The cancer control program is required to strategize in a systematic and impartial manner and efficiently utilize limited resources. In Japan, the National Clinical Database (NCD) was launched in 2010. It is a nationwide prospective registry linked to various types of board certification systems regarding surgery. The NCD is a nationally validated database using web-based data collection software; it is risk adjusted and outcome based to improve the quality of surgical care. The NCD generalizes site-specific cancer registries by taking advantage of their excellent organizing ability. Some site-specific cancer registries, including pancreatic, breast, and liver cancer registries have already been combined with the NCD. Cooperation between the NCD and site-specific cancer registries can establish a valuable platform to develop a cancer care plan in Japan. Furthermore, the prognosis information of cancer patients arranged using population-based and hospital-based cancer registries can help in efficient data accumulation on the NCD. International collaboration between Japan and the USA has recently started and is expected to provide global benchmarking and to allow a valuable comparison of cancer treatment practices between countries using nationwide cancer registries in the future. Clinical research and evidence-based policy recommendation based on accurate data from the nationwide database may positively impact the public.

  15. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  16. The Egyptian clinical trials’ registry profile: Analysis of three trial registries (International Clinical Trials Registry Platform, Pan-African Clinical Trials Registry and clinicaltrials.gov

    Directory of Open Access Journals (Sweden)

    Ahmed A. Zeeneldin

    2016-01-01

    Full Text Available Registering clinical trials (CTs in public domains enhances transparency, increases trust in research, improves participation and safeguards against publication bias. This work was done to study the profile of clinical research in Egypt in three CT registries with different scopes: the WHO International CT Registry Platform (ICTRP, the continental Pan-African CT Registry (PACTR and the US clinicaltrials.gov (CTGR. In March 2014, ICTRP, PACTR and CTGR were searched for clinical studies conducted in Egypt. It was found that the number of studies conducted in Egypt (percentage was 686 (0.30% in ICTRP, 56 (11.3% in PACTR and 548 (0.34% in CTGR. Most studies were performed in universities and sponsored by university/organization, industry or individual researchers. Inclusion of adults from both genders predominated. The median number of participants per study in the three registries ranged between 63 and 155. The conditions researched differed among the three registries and study purpose was mostly treatment followed by prevention. Endpoints were mostly efficacy followed by safety. Observational:Interventional studies (i.e. clinical trials represented 15.5%:84.5% in ICTRP, 0%:100% in PACTR and 16.4%:83.6% in CTGR. Most interventions were drugs or procedures. Observational studies were mostly prospective and cohort studies. Most CTs were phase 3 and tested drugs or procedures. Parallel group assignment and random allocation predominated. Blinding was implemented in many of trials and was mostly double-blind. We conclude that CTs from Egypt in trial registries are apparently low and do not accurately reflect clinical research conducted in Egypt or its potential. Development of an Egyptian CT registry is eagerly needed. Registering all Egyptian CTs in public domains is highly recommended.

  17. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  18. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  19. The National Mental Health Registry (NMHR).

    Science.gov (United States)

    Aziz, A A; Salina, A A; Abdul Kadir, A B; Badiah, Y; Cheah, Y C; Nor Hayati, A; Ruzanna, Z Z; Sharifah Suziah, S M; Chee, K Y

    2008-09-01

    The National Mental Health Registry (NMHR) collects information about patients with mental disorder in Malaysia. This information allows us to estimate the incidence of selected mental disorders, and to evaluate risk factors and treatment in the country. The National Mental Health Registry (NMHR) presented its first report in 2004, a year after its establishment. The report focused on schizophrenia as a pioneer project for the National Mental Health Registry. The development of the registry has progressed with data collected from government-based facilities, the academia and the private sector. The 2003-2005 report was recently published and distributed. Since then the registry has progressed to include suicides and other mental illnesses such as depression. The NMHR Report 2003-2005 provides detailed information about the profile of persons with Schizophrenia who presented for the first time to various psychiatry and mental health providers throughout Malaysia. More detailed description regarding pharmacotherapy is reported and few cross tabulations done in an effort to provide better understanding and more clinically meaningful reports.

  20. Systematic Review of Cerebral Palsy Registries/Surveillance Groups: Relationships between Registry Characteristics and Knowledge Dissemination

    Science.gov (United States)

    Hurley, Donna S; Sukal-Moulton, Theresa; Gaebler-Spira, Deborah; Krosschell, Kristin J; Pavone, Larissa; Mutlu, Akmer; Dewald, Julius PA; Msall, Michael E

    2016-01-01

    The aims of this study were to provide a comprehensive summary of the body of research disseminated by Cerebral Palsy (CP) registries and surveillance programs from January 2009 through May 2014 in order to describe the influence their results have on our overall understanding of CP. Secondly, registries/surveillance programs and the work they produced were evaluated and grouped using standardized definitions and classification systems. Method A systematic review search in PubMed, CINAH and Embase for original articles published from 1 January 2009 to 20 May 2014 originating from or supported by population based CP registries and surveillance programs or population based national registries including CP were included. Articles were grouped by 2009 World CP Registry Congress aim, registry/surveillance program classification, geographical region, and the International Classification of Function, Disability and Health (ICF) domain. Registry variables were assessed using the ICF-CY classification. Results Literature searches returned 177 articles meeting inclusion criteria. The majority (69%) of registry/surveillance program productivity was related to contributions as a Resource for CP Research. Prevention (23%) and Surveillance (22%) articles were other areas of achievement, but fewer articles were published in the areas of Planning (17%) and Raising the Profile of CP (2%). There was a range of registry/surveillance program classifications contributing to this productivity, and representation from multiple areas of the globe, although most of the articles originated in Europe, Australia, and Canada. The domains of the ICF that were primarily covered included body structures and function at the early stages of life. Encouragingly, a variety of CP registry/surveillance program initiatives included additional ICF domains of participation and environmental and personal factors. Interpretation CP registries and surveillance programs, including novel non-traditional ones

  1. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  2. The Qingdao Twin Registry: a status update.

    Science.gov (United States)

    Duan, Haiping; Ning, Feng; Zhang, Dongfeng; Wang, Shaojie; Zhang, Dong; Tan, Qihua; Tian, Xiaocao; Pang, Zengchang

    2013-02-01

    In 1998, the Qingdao Twin Registry was initiated as the main part of the Chinese National Twin Registry. By 2005, a total of 10,655 twin pairs had been recruited. Since then new twin cohorts have been sampled, with one longitudinal cohort of adolescent twins selected to explore determinants of metabolic disorders and health behaviors during puberty and young adulthood. Adult twins have been sampled for studying heritability of multiple phenotypes associated with metabolic disorders. In addition, an elderly twin cohort has been recruited with a focus on genetic studies of aging-related phenotypes using twin modeling and genome-wide association analysis. Cross-cultural collaborative studies have been carried out between China, Denmark, Finland, and US cohorts. Ongoing data collection and analysis for the Qingdao Twin Registry will be discussed in this article.

  3. Establishing an institutional therapeutic apheresis registry.

    Science.gov (United States)

    Mann, Steven A; McCleskey, Brandi; Marques, Marisa B; Adamski, Jill

    2016-12-01

    Apheresis was first performed as a therapeutic procedure in the 1950s. The first national therapeutic apheresis (TA) registry was established in Canada in 1981 and other national registries followed, including two attempts at establishing an international TA registry. There is no national registry in the United States. Our large, academic, tertiary hospital has a very active TA service. We created a TA database to track all procedures performed by the apheresis service by transferring data from paper appointment logs and the electronic medical records into a Microsoft Access database. Retrospective data from each TA procedure performed at UAB from January 1, 2003 through December 31, 2012 were entered, including the type of procedure, indication, date, and patient demographics. Microsoft Excel was used for data analysis. During the 10-year period, our TA service treated 1,060 patients and performed 11,718 procedures. Of these patients, 70% received therapeutic plasma exchange (TPE), 21% received extracorporeal photopheresis (ECP), 4.5% received red cell exchange (RCE), 4.2% received leukocytapheresis, and 0.6% underwent platelet depletion. Among the procedures, 54% were TPEs, 44% were ECPs, 1.3% were RCEs, 0.5% were leukocytaphereses, and 0.1% were platelet depletions. According to the current literature, national and international TA use is underreported. We believe that the UAB TA registry provides useful information about TA practices in our region and can serve as a model for other institutions. Furthermore, data from multiple institutional registries can be used for clinical research to increase the available evidence for the role of TA in various conditions. J. Clin. Apheresis 31:516-522, 2016. © 2015 Wiley Periodicals, Inc.

  4. Plasma Exchange in Severe Attacks of Neuromyelitis Optica

    Directory of Open Access Journals (Sweden)

    Mickael Bonnan

    2012-01-01

    Full Text Available Background. Neuromyelitis optica (NMO attacks are poorly controlled by steroids and evolve in stepwise neurological impairments. Assuming the strong humoral response underlying NMO attacks, plasma exchange (PLEX is an appropriate technique in severe NMO attacks. Objective. Presenting an up-to-date review of the literature of PLEX in NMO. Methods. We summarize the rationale of PLEX in relation with the physiology of NMO, the main technical aspects, and the available studies. Results. PLEX in severe attacks from myelitis or optic neuritis are associated with a better outcome, depending on PLEX delay (“time is cord and eyes”. NMO-IgG status has no influence. Finally, we build up an original concept linking the inner dynamic of the lesion, the timing of PLEX onset and the expected clinical results. Conclusion. PLEX is a safe and efficient add-on therapy in NMO, in synergy with steroids. Large therapeutic trials are required to definitely assess the procedure and define the time opportunity window.

  5. The Danish Neuro-Oncology Registry

    DEFF Research Database (Denmark)

    Hansen, Steinbjørn; Nielsen, Jan; Laursen, René J;

    2016-01-01

    BACKGROUND: The Danish Neuro-Oncology Registry (DNOR) is a nationwide clinical cancer database that has prospectively registered data on patients with gliomas since January 2009. The purpose of this study was to describe the establishment of the DNOR and further to evaluate the database completen......BACKGROUND: The Danish Neuro-Oncology Registry (DNOR) is a nationwide clinical cancer database that has prospectively registered data on patients with gliomas since January 2009. The purpose of this study was to describe the establishment of the DNOR and further to evaluate the database...

  6. [The registry for asbesto-related tumors].

    Science.gov (United States)

    Melino, C

    2003-01-01

    The author stresses the importance of DPCM 10 December 2002 no.308, which determines the format and the rules to fill the registry for the cases of asbestos-related mesothelioma, according to art 36, comma 3, DLgs 277/91. The Author admits the usefulness of such a registry, but comments that its official approval came very late, because it actually was started in 1993 by ISPESL (The Higher Institute for Prevention and Safety of Labor), after the approval of DLgs 277/91. According to ISPESL initiative, all cases of mesothelioma and related circumstances were (and are) collected through a periferal information net operated by COR's.

  7. The rationale for Business English Syllabus

    Institute of Scientific and Technical Information of China (English)

    谭玉娣

    2016-01-01

    The syllabus is designed for a one-year business English course for 33 staff from Sino-Silicates Company.This rationale will analyse the arrangement of the syllabus from the following aspects:needs analysis,product-oriented,culture,in-class activity and material selection.

  8. An Expanding Rationale for Cooperative Education.

    Science.gov (United States)

    Abitia, Fred

    1985-01-01

    The author discusses cooperative education: how it is viewed by private enterprise and where it fits into higher education's framework. The cooperative education program at California Polytechnic State University is examined: faculty responsibility, rationale for the program's existence, and reasons for the program's importance. (CT)

  9. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  10. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  11. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  12. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  13. International Clinical Trials Registry Platform (ICTRP)

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ Introduction The mission of the WHO Intemational Clinical Trials Registry Platform is to ensure that a complete view of research is accessible to all those involved in health care decision making.This will improve research transparency and will ultimately strengthen tha validity and value of the scientific evidence base.The registration of all interventional trials is a scientific, ethical and moral responsibility.

  14. Targeted development of registries of biological parts.

    Directory of Open Access Journals (Sweden)

    Jean Peccoud

    Full Text Available BACKGROUND: The design and construction of novel biological systems by combining basic building blocks represents a dominant paradigm in synthetic biology. Creating and maintaining a database of these building blocks is a way to streamline the fabrication of complex constructs. The Registry of Standard Biological Parts (Registry is the most advanced implementation of this idea. METHODS/PRINCIPAL FINDINGS: By analyzing inclusion relationships between the sequences of the Registry entries, we build a network that can be related to the Registry abstraction hierarchy. The distribution of entry reuse and complexity was extracted from this network. The collection of clones associated with the database entries was also analyzed. The plasmid inserts were amplified and sequenced. The sequences of 162 inserts could be confirmed experimentally but unexpected discrepancies have also been identified. CONCLUSIONS/SIGNIFICANCE: Organizational guidelines are proposed to help design and manage this new type of scientific resources. In particular, it appears necessary to compare the cost of ensuring the integrity of database entries and associated biological samples with their value to the users. The initial strategy that permits including any combination of parts irrespective of its potential value leads to an exponential and economically unsustainable growth that may be detrimental to the quality and long-term value of the resource to its users.

  15. An international registry for primary ciliary dyskinesia

    DEFF Research Database (Denmark)

    Werner, Claudius; Lablans, Martin; Ataian, Maximilian

    2016-01-01

    Primary ciliary dyskinesia (PCD) is a rare autosomal recessive disorder leading to chronic upper and lower airway disease. Fundamental data on epidemiology, clinical presentation, course and treatment strategies are lacking in PCD. We have established an international PCD registry to realise an u...

  16. Costing Tool for International Cancer Registries

    Centers for Disease Control (CDC) Podcasts

    2016-11-21

    A health economist at CDC talks about a new tool for estimating how much it costs to run cancer registries in developing countries.  Created: 11/21/2016 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 11/21/2016.

  17. The Savant Syndrome Registry: A Preliminary Report.

    Science.gov (United States)

    Treffert, Darold A; Rebedew, David L

    2015-08-01

    A registry has been established to document certain characteristics on a sizeable worldwide sample of individuals with savant syndrome, a rare but remarkable condition in which persons with developmental disabilities, brain injury, or brain disease have some spectacular "islands" of skill or ability that stand in jarring, marked contrast to overall handicap. Of the 319 savants included in the registry, 90% are congenital savants, while 10% are acquired savants. The registry includes individuals from 33 countries, with 70% from the United States or Canada. Sex distribution was 79% male vs. 21% female (4:1). This report summarizes the findings in the congenital savant syndrome category of the registry. Among the individuals with congenital savant syndrome, the most common underlying disability was Autistic Spectrum Disorder (75%); various other central nervous system (CNS) disorders were present in the other 25%. Fifty-five percent possessed a single special skill, while 45% had multiple skills. Music was the most frequent principal skill followed by art, memory, mathematics, calendar calculating, language, visual-spatial/mechanical, athletic, computer, extrasensory perception, and other skills.

  18. 42 CFR 493.1850 - Laboratory registry.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Laboratory registry. 493.1850 Section 493.1850... (CONTINUED) STANDARDS AND CERTIFICATION LABORATORY REQUIREMENTS Enforcement Procedures § 493.1850 Laboratory... laboratories, including the following: (1) A list of laboratories that have been convicted, under Federal...

  19. Validation of the Netherlands pacemaker patient registry

    NARCIS (Netherlands)

    Dijk, WA; Kingma, T; Hooijschuur, CAM; Dassen, WRM; Hoorntje, JCA; van Gelder, LM

    1997-01-01

    This paper deals with the validation of the information stored in the Netherlands central pacemaker patient database. At this moment the registry database contains information on more than 70500 patients, 85000 pacemakers and 90000 leads. The validation procedures consisted of an internal consistenc

  20. A review of national shoulder and elbow joint replacement registries

    DEFF Research Database (Denmark)

    Rasmussen, Jeppe V; Olsen, Bo S; Fevang, Bjørg-Tilde S

    2012-01-01

    The aim was to review the funding, organization, data handling, outcome measurements, and findings from existing national shoulder and elbow joint replacement registries; to consider the possibility of pooling data between registries; and to consider wether a pan european registry might be feasible....

  1. 37 CFR 201.25 - Visual Arts Registry.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Visual Arts Registry. 201.25... AND PROCEDURES GENERAL PROVISIONS § 201.25 Visual Arts Registry. (a) General. This section prescribes the procedures relating to the submission of Visual Arts Registry Statements by visual artists...

  2. Iranian Joint Registry(Iranian National Hip and Knee Arthroplasty Registry

    Directory of Open Access Journals (Sweden)

    Hamidreza Aslani

    2016-04-01

    Full Text Available Periodic evaluation and monitoring the health and economic outcome of joint replacement surgery is a common and popular process under the territory of joint registries in many countries. In this article we introduce the methodology used for the foundation of the National Iranian Joint Registry (IJR with a joint collaboration of the Social Security Organization (SSO and academic research departments considering the requirements of the Iran’s Ministry of Health and Education.

  3. [Legislation of cancer registries in Japan- an outline of the national cancer registry].

    Science.gov (United States)

    Nishino, Yoshikazu

    2015-04-01

    The national cancer registry in Japan will commence operations in January 2016 under the Cancer Registry Promotion Act, which was established in December 2013. Although data on cancer incidence and survival rates in Japan have been available for limited regions for a long time, accurate nationwide data obtained from the national cancer registry database will contribute to the planning and evaluation of cancer control in Japan. It is expected that this database will be utilized in evaluating the quality of medical care for cancer patients, in assessing the accuracy of cancer screening, and in follow-up surveys in nationwide cohort studies. Furthermore, under the Cancer Registry Promotion Act, hospitals will be permitted to obtain vital patient information from data registered in the national cancer registry database, which will promote the publication of survival rates for cancer patients and accelerate research at hospitals. The founding of the Japanese national cancer registry is a landmark development in the promotion of cancer control and cancer research in Japan and it is essential that the Japanese population benefits from the information obtained from this database.

  4. Cohort Profile : The National Academy of Sciences-National Research Council Twin Registry (NAS-NRC Twin Registry)

    NARCIS (Netherlands)

    Gatz, Margaret; Harris, Jennifer R.; Kaprio, Jaakko; McGue, Matt; Smith, Nicholas L.; Snieder, Harold; Spiro, Avron; Butler, David A.

    2015-01-01

    The National Academy of Sciences-National Research Council Twin Registry (NAS-NRC Twin Registry) is a comprehensive registry of White male twin pairs born in the USA between 1917 and 1927, both of the twins having served in the military. The purpose was medical research and ultimately improved clini

  5. Towards a national trauma registry for the United Arab Emirates

    Directory of Open Access Journals (Sweden)

    Barka Ezedin

    2010-07-01

    Full Text Available Abstract Background Trauma is a major health problem in the United Arab Emirates (UAE as well as worldwide. Trauma registries provide large longitudinal databases for analysis and policy improvement. We aim in this paper to report on the development and evolution of a national trauma registry using a staged approach by developing a single-center registry, a two-center registry, and then a multi-center registry. The three registries were established by developing suitable data collection forms, databases, and interfaces to these databases. The first two registries collected data for a finite period of time and the third is underway. The steps taken to establish these registries depend on whether the registry is intended as a single-center or multi-center registry. Findings Several issues arose and were resolved during the development of these registries such as the relational design of the database, whether to use a standalone database management system or a web-based system, and the usability and security of the system. The inclusion of preventive medicine data elements is important in a trauma registry and the focus on road traffic collision data elements is essential in a country such as the UAE. The first two registries provided valuable data which has been analyzed and published. Conclusions The main factors leading to the successful establishment of a multi-center trauma registry are the development of a concise data entry form, development of a user-friendly secure web-based database system, the availability of a computer and Internet connection in each data collection center, funded data entry personnel well trained in extracting medical data from the medical record and entering it into the computer, and experienced personnel in trauma injuries and data analysis to continuously maintain and analyze the registry.

  6. Reprint of: Client interfaces to the Virtual Observatory Registry

    Science.gov (United States)

    Demleitner, M.; Harrison, P.; Taylor, M.; Normand, J.

    2015-06-01

    The Virtual Observatory Registry is a distributed directory of information systems and other resources relevant to astronomy. To make it useful, facilities to query that directory must be provided to humans and machines alike. This article reviews the development and status of such facilities, also considering the lessons learnt from about a decade of experience with Registry interfaces. After a brief outline of the history of the standards development, it describes the use of Registry interfaces in some popular clients as well as dedicated UIs for interrogating the Registry. It continues with a thorough discussion of the design of the two most recent Registry interface standards, RegTAP on the one hand and a full-text-based interface on the other hand. The article finally lays out some of the less obvious conventions that emerged in the interaction between providers of registry records and Registry users as well as remaining challenges and current developments.

  7. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  8. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  9. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  10. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  11. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  12. The Danish National Chronic Myeloid Neoplasia Registry

    DEFF Research Database (Denmark)

    Bak, Marie; Ibfelt, Else Helene; Stauffer Larsen, Thomas;

    2016-01-01

    AIM: The Danish National Chronic Myeloid Neoplasia Registry (DCMR) is a population-based clinical quality database, introduced to evaluate diagnosis and treatment of patients with chronic myeloid malignancies. The aim is to monitor the clinical quality at the national, regional, and hospital...... of follow-up. The forms include variables that describe clinical/paraclinical assessments, treatment, disease progression, and survival - disease-specific variables - as well as variables that are identical for all chronic myeloid malignancies. DESCRIPTIVE DATA: By the end of 2014, the DCMR contained data...... on 2,690 patients with an inclusion rate of ∼500 patients each year. Since the registry was established, annual reports have shown consistently high national coverage and data completeness, ≥90% and ≥88%, respectively. CONCLUSION: The DCMR is a national database used for monitoring the quality...

  13. The Western Denmark Cardiac Computed Tomography Registry

    DEFF Research Database (Denmark)

    Nielsen, Lene Hüche; Nørgaard, Bjarne Linde; Tilsted, Hans Henrik;

    2015-01-01

    -CCTR, showed that coronary CT angiographies accounted for only 23% of all nonregistered cardiac CTs, indicating >90% completeness of coronary CT angiographies in the WDHR-CCTR. The completeness of individual variables varied substantially (range: 0%-100%), but was >85% for more than 70% of all variables. Using......BACKGROUND: As a subregistry to the Western Denmark Heart Registry (WDHR), the Western Denmark Cardiac Computed Tomography Registry (WDHR-CCTR) is a clinical database established in 2008 to monitor and improve the quality of cardiac computed tomography (CT) in Western Denmark. OBJECTIVE: We...... expected numbers; and 4) positive predictive values as well as negative predictive values of 19 main patient and procedure variables. RESULTS: By December 31, 2012, almost 22,000 cardiac CTs with up to 40 variables for each procedure have been registered. Of these, 87% were coronary CT angiography...

  14. The Danish National Multiple Myeloma Registry

    DEFF Research Database (Denmark)

    Gimsing, Peter; Holmström, Morten O; Klausen, Tobias Wirenfelt

    2016-01-01

    is to support research. Patients are registered with their unique Danish personal identification number, and the combined use of DMMR, other Danish National registries, and the Danish National Cancer Biobank offers a unique platform for population-based translational research. STUDY POPULATION: All newly......, clinical complications, prognostics, first- and second-line treatments, treatment responses, progression free, and overall survival. DESCRIPTIVE DATA: Up to June 2015, 2,907 newly diagnosed patients with MM, 485 patients with smoldering MM, 64 patients with plasma cell leukemia, and 191 patients......AIM: The Danish National Multiple Myeloma Registry (DMMR) is a population-based clinical quality database established in January 2005. The primary aim of the database is to ensure that diagnosis and treatment of plasma cell dyscrasia are of uniform quality throughout the country. Another aim...

  15. Attributing heart attack and stroke to "Old Age": Implications for subsequent health outcomes among older adults.

    Science.gov (United States)

    Stewart, Tara L; Chipperfield, Judith G; Perry, Raymond P; Hamm, Jeremy M

    2016-01-01

    This study assessed the extent to which older adults attribute a recent heart attack/stroke to "old age," and examined consequences for subsequent lifestyle behavior and health-care service utilization. Community-dwelling adults (N = 57, ages 73-98 years) were interviewed about their heart attack/stroke, and an objective health registry provided data on health-care utilization over a 3-year period. Endorsement of "old age" as a cause of heart attack/stroke negatively predicted lifestyle behavior change, and positively predicted frequency of physician visits and likelihood of hospitalization over the subsequent 3 years. Findings suggest the importance of considering "old age" attributions in the context of cardiovascular health events.

  16. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  17. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  18. Open-access clinical trial registries: the Italian scenario

    Directory of Open Access Journals (Sweden)

    Mosconi Paola

    2012-10-01

    Full Text Available Abstract Background Citizens, patients and their representatives are increasingly insisting on working with health professionals to organize and discuss research protocols. The International Committee of Medical Journal Editors recommended setting up a public clinical trial registry where anyone can find key information about a trial. Around the world, governments have, in fact, now begun to legislate mandatory disclosure of all clinical trials. The aims of the present survey were to assess the availability of clinical trial registries for Italian citizens and to examine the transparency of the data items reported. Methods The availability of open-access clinical trial registries was surveyed on a sample of 182 websites, including research institutes and centers of excellence (IRCCS-teaching hospitals, hospitals and associations. For each registry we downloaded a sample of two trials to assess the correspondence of the data items reported. Results from the Italian and international registries were compared. Results Fifteen percent of the sample had an open-access registry of clinical trials. Comparison of the data items available, in terms of completeness and transparency, from institutional and international registries indicated wide variability. Conclusions Italian citizens, patients and their associations have scant access to local registries of clinical trials, and international registries are generally more informative. On the European level, advocacy and lobby actions are needed among citizens and patients to boost the diffusion of open-access clinical trial registries without language barriers, thereby facilitating participation, access to information, and the coordination of clinical research.

  19. Background, introduction and activity of the Japan Primary Registries Network.

    Science.gov (United States)

    Shiokawa, Tomonori

    2009-02-01

    Regarding registration and publication of clinical trials, there are now three registry organizations in Japan; the University Hospital Medical Information Network (UMIN), the Japan Pharmaceutical Information Center (JAPIC) and the Japan Medical Association - Center for Clinical Trials (JMACCT). In addition, a portal site which supports searching for information on clinical trials in all three registries has been operated by the National Institute of Public Health (NIPH). After we established a cooperative system, we became a WHO Primary Registry on October 16, 2008 and announced this in Japan on the next day. This cooperation system is called the Japan Primary Registries Network (JPRN). In order to show that this type of network works well as a Primary Registry, we are cooperating with global activities of World Health Organization's International Clinical Trial Registry Platform (WHO ICTRP) to promote clinical trials and propose appropriate idea to the world.

  20. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  1. The Danish Neuro-Oncology Registry

    DEFF Research Database (Denmark)

    Hansen, Steinbjørn

    2016-01-01

    AIM OF DATABASE: The Danish Neuro-Oncology Registry (DNOR) was established by the Danish Neuro-Oncology Group as a national clinical database. It was established for the purpose of supporting research and development in adult patients with primary brain tumors in Denmark. STUDY POPULATION: DNOR has...... advantage of reporting indicators is the related multidisciplinary discussions giving a better understanding of what actually is going on, thereby facilitating the work on adjusting the national guidelines in the Danish Neuro-Oncology Group. CONCLUSION: The establishment of DNOR has optimized the quality...

  2. Danish Registry of Childhood and Adolescent Diabetes

    Directory of Open Access Journals (Sweden)

    Svensson J

    2016-10-01

    Full Text Available Jannet Svensson,1 Charlotte Cerqueira,2 Per Kjærsgaard,3 Lene Lyngsøe,4 Niels Thomas Hertel,5 Mette Madsen,6 Henrik B Mortensen,1 Jesper Johannesen1 1Pediatric and Adolescent Department, Copenhagen University Hospital, Herlev and Gentofte, Herlev, 2Registry Support Centre (East – Epidemiology and Biostatistics, Research Centre for Prevention and Health, Capital Region of Denmark, Glostrup, 3Pediatric Department, County Hospital Herning, Herning, 4Pediatric and Adolescent Department, Nordsjællands Hospital, Hillerød, 5HC Andersen Childrens Hospital, Odense University Hospital, Odense, 6Pediatric Department, Aalborg University Hospital, Aalborg, Denmark Aim: The aims of the Danish Registry of Childhood and Adolescent Diabetes (DanDiabKids are to monitor and improve the quality of care for children and adolescents with diabetes in Denmark and to follow the incidence and prevalence of diabetes. Study population: The study population consists of all children diagnosed with diabetes before the age of 15 years since 1996. Since 2015, every child followed up at a pediatric center (<18 years of age will be included. Main variables: The variables in the registry are the quality indicators, demographic variables, associated conditions, diabetes classification, family history of diabetes, growth parameters, self-care, and treatment variables. The quality indicators are selected based on international consensus of measures of good clinical practice. The indicators are metabolic control as assessed by HbA1c, blood pressure, albuminuria, retinopathy, neuropathy, number of severe hypoglycemic events, and hospitalization with ketoacidosis. Descriptive data: The number of children diagnosed with diabetes is increasing with ~3% per year mainly for type 1 diabetes (ie, 296 new patients <15 years of age were diagnosed in 2014. The disease management has changed dramatically with more children treated intensively with multiple daily injections, insulin pumps

  3. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error...

  4. Thyroid Cancer and Tumor Collaborative Registry (TCCR).

    Science.gov (United States)

    Shats, Oleg; Goldner, Whitney; Feng, Jianmin; Sherman, Alexander; Smith, Russell B; Sherman, Simon

    2016-01-01

    A multicenter, web-based Thyroid Cancer and Tumor Collaborative Registry (TCCR, http://tccr.unmc.edu) allows for the collection and management of various data on thyroid cancer (TC) and thyroid nodule (TN) patients. The TCCR is coupled with OpenSpecimen, an open-source biobank management system, to annotate biospecimens obtained from the TCCR subjects. The demographic, lifestyle, physical activity, dietary habits, family history, medical history, and quality of life data are provided and may be entered into the registry by subjects. Information on diagnosis, treatment, and outcome is entered by the clinical personnel. The TCCR uses advanced technical and organizational practices, such as (i) metadata-driven software architecture (design); (ii) modern standards and best practices for data sharing and interoperability (standardization); (iii) Agile methodology (project management); (iv) Software as a Service (SaaS) as a software distribution model (operation); and (v) the confederation principle as a business model (governance). This allowed us to create a secure, reliable, user-friendly, and self-sustainable system for TC and TN data collection and management that is compatible with various end-user devices and easily adaptable to a rapidly changing environment. Currently, the TCCR contains data on 2,261 subjects and data on more than 28,000 biospecimens. Data and biological samples collected by the TCCR are used in developing diagnostic, prevention, treatment, and survivorship strategies against TC.

  5. 76 FR 36896 - Notice of Establishment of a New Plant Protection and Quarantine Stakeholder Registry

    Science.gov (United States)

    2011-06-23

    ... Protection and Quarantine Stakeholder Registry AGENCY: Animal and Plant Health Inspection Service, USDA... of interest. FOR FURTHER INFORMATION CONTACT: For information on the PPQ Stakeholder Registry... Protection and Quarantine (PPQ) stakeholder registry is an email subscription service that allows...

  6. Oral pulsatile delivery: rationale and chronopharmaceutical formulations.

    Science.gov (United States)

    Maroni, Alessandra; Zema, Lucia; Del Curto, Maria Dorly; Loreti, Giulia; Gazzaniga, Andrea

    2010-10-15

    Oral pulsatile/delayed delivery systems are designed to elicit programmable lag phases preceding a prompt and quantitative, repeated or prolonged release of drugs. Accordingly, they draw increasing interest because of the inherent suitability for accomplishing chronotherapeutic goals, which have recently been highlighted in connection with a number of widespread chronic diseases with typical night or early-morning recurrence of symptoms (e.g. bronchial asthma, cardiovascular disease, rheumatoid arthritis, early-morning awakening). In addition, time-based colonic release can be attained when pulsatile delivery systems are properly adapted to overcome unpredictable gastric emptying and provide delay phases that would approximately match the small intestinal transit time. Oral pulsatile delivery is pursued by means of a variety of release platforms, namely reservoir, capsular and osmotic devices. The aim of the present review is to outline the rationale and main formulation strategies behind delayed-release dosage forms intended for the pharmacological treatment of chronopathologies.

  7. The Corrona US registry of rheumatic and autoimmune diseases.

    Science.gov (United States)

    Kremer, Joel M

    2016-01-01

    The Corrona US national registry collects data concerning patient status from both the rheumatologist and patient at routine clinical encounters. Corrona has functioning disease registries in rheumatoid arthritis, psoriatic arthritis, spondyloarthropathies, psoriasis and inflammatory bowel disease. Corrona merges data concerning long-term effectiveness and safety, as well as comparative and cost effectiveness of agents to treat these autoimmune diseases.

  8. Data quality in the Danish National Acute Leukemia Registry

    DEFF Research Database (Denmark)

    Ostgård, Lene Sofie Granfeldt; Nørgaard, Jan Maxwell; Severinsen, Marianne Tang;

    2013-01-01

    The Danish National Acute Leukemia Registry (DNLR) has documented coverage of above 98.5%. Less is known about the quality of the recorded data.......The Danish National Acute Leukemia Registry (DNLR) has documented coverage of above 98.5%. Less is known about the quality of the recorded data....

  9. The 2006 ERA-EDTA Registry annual report: a precis

    NARCIS (Netherlands)

    V.S. Stel; A. Kramer; C. Zoccali; K.J. Jager

    2009-01-01

    Introduction: This paper provides a summary of the 2006 European Renal Association-European Dialysis and Transplant Association (ERA-EDTA) Registry report. Methods: Data on renal replacement therapy (RRT) were available from 50 national and regional registries in 28 countries in Europe and bordering

  10. The growing number of hemophilia registries : Quantity vs. quality

    NARCIS (Netherlands)

    Keipert, C; Hesse, J; Haschberger, B; Heiden, M; Seitz, R; van den Berg, H M; Hilger, A

    2015-01-01

    Registries for rare diseases provide a tool for obtaining an overview of the clinical situation and can be used to discover points of improvement and to monitor long-term safety. Registries could also become a powerful tool to provide supporting information for marketing authorization. There is an u

  11. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  12. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  13. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  14. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  15. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  16. Novel features of 3q29 deletion syndrome: Results from the 3q29 registry.

    Science.gov (United States)

    Glassford, Megan R; Rosenfeld, Jill A; Freedman, Alexa A; Zwick, Michael E; Mulle, Jennifer G

    2016-04-01

    3q29 deletion syndrome is caused by a recurrent, typically de novo heterozygous 1.6 Mb deletion, but because incidence of the deletion is rare (1 in 30,000 births) the phenotype is not well described. To characterize the range of phenotypic manifestations associated with 3q29 deletion syndrome, we have developed an online registry (3q29deletion.org) for ascertainment of study subjects and phenotypic data collection via Internet-based survey instruments. We report here on data collected during the first 18 months of registry operation, from 44 patients. This is the largest cohort of 3q29 deletion carriers ever assembled and surveyed in a systematic way. Our data reveal that 28% of registry participants report neuropsychiatric phenotypes, including anxiety disorder, panic attacks, depression, bipolar disorder, and schizophrenia. Other novel findings include a high prevalence (64%) of feeding problems in infancy and reduced weight at birth for 3q29 deletion carriers (average reduction 13.9 oz (394 g), adjusted for gestational age and sex, P = 6.5e-07). We further report on the frequency of heart defects, autism, recurrent ear infections, gastrointestinal phenotypes, and dental phenotypes, among others. We also report on the expected timing of delayed developmental milestones. This is the most comprehensive description of the 3q29 deletion phenotype to date. These results are clinically actionable toward improving patient care for 3q29 deletion carriers, and can guide the expectations of physicians and parents. These data also demonstrate the value of patient-reported outcomes to reveal the full phenotypic spectrum of rare genomic disorders.

  17. Rationale for Student Dress Codes: A Review of School Handbooks

    Science.gov (United States)

    Freeburg, Elizabeth W.; Workman, Jane E.; Lentz-Hees, Elizabeth S.

    2004-01-01

    Through dress codes, schools establish rules governing student appearance. This study examined stated rationales for dress and appearance codes in secondary school handbooks; 182 handbooks were received. Of 150 handbooks containing a rationale, 117 related dress and appearance regulations to students' right to a non-disruptive educational…

  18. "Socialized Music": Historical Formations of Community Music through Social Rationales

    Science.gov (United States)

    Yerichuk, Deanna

    2014-01-01

    This article traces the formation of community music through professional and scholarly articles over the last century in North America, and argues that community music has been discursively formed through social rationales, although the specific rationales have shifted. The author employs an archaeological framework inspired by Michel Foucault to…

  19. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  20. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  1. The GEOSS Component and Service Registry

    Science.gov (United States)

    Di, L.; Bai, Y.; Shen, D.; Shao, Y.; Shrestha, R.; Wang, H.; Nebert, D. D.

    2011-12-01

    Petabytes of Earth science data have been accumulated through space- and air-borne Earth observation programs during the last several decades. The data are valuable both scientifically and socioeconomically. The value of these data could be further increased significantly if the data from these programs can be easily discovered, accessed, integrated, and analyzed. The Global Earth Observation System of Systems (GEOSS) is addressing this need. Coordinated by the Group on Earth Observations (or GEO), a voluntary partnership of 86 governments, the European Commission, and 61 intergovernmental, international, and regional organizations has been working on implementing GEOSS for a number of years. After four years of international collaboration, the GEOSS Common Infrastructure (GCI) has been established. GCI consists of the Standards and Interoperability Registry (SIR), the Component and Service Registry (CSR), the GEO clearinghouse, and the GEO Portal. The SIR maintains the list of the public standards recognized by the GEO. CSR provides a centralized registry for available Earth Observation resources. The GEO clearinghouse works as a single search facility for GEOSS-wide resources and the GEO Portal provides an integrated Web-based interfaces for users. Since January 2007, researchers at CSISS, GMU have collaborated with officials from the Federal Geographic Data Committee (FGDC) on designing, implementing, maintaining, and upgrading CSR. Currently CSR provides the following capabilities for data providers: user registration, resource registration, and service interface registration. The CSR clients can discover the resources registered in CSR through OGC Catalog for Web (CSW), UUDI, and other standard interfaces. During the resource registration process, providers may define detailed descriptive information for their resources, in particular, the targeted societal benefit area and sub-areas of focus, and the targeted critical Earth Observations. The service

  2. The Danish National Multiple Myeloma Registry

    Directory of Open Access Journals (Sweden)

    Gimsing P

    2016-10-01

    Full Text Available Peter Gimsing,1 Morten O Holmström,2 Tobias Wirenfelt Klausen,3 Niels Frost Andersen,4 Henrik Gregersen,5 Robert Schou Pedersen,6 Torben Plesner,7 Per Trøllund Pedersen,8 Mikael Frederiksen,9 Ulf Frølund,2 Carsten Helleberg,3 Annette Vangsted,1 Peter de Nully Brown,1 Niels Abildgaard,10   On behalf of the Danish Myeloma Study Group 1Department of Hematology, Rigshospitalet, Copenhagen, 2Department of Hematology, Roskilde Sygehus, Roskilde, 3Department of Hematology, Herlev Hospital, Copenhagen, 4Department of Hematology, Aarhus University Hospital, Aarhus, 5Department of Hematology, Aalborg University Hospital, Aalborg, 6Department of Hematology, Holstebro Hospital, Holstebro, 7Department of Hematology, Vejle Hospital, Vejle, 8Department of Hematology, Hospital of Southwestern Jutland, Esbjerg, 9Department of Internal Medicine, Hospital of Southern Jutland, Aabenraa, 10Department of Hematology, Odense University Hospital, Odense, Denmark Aim: The Danish National Multiple Myeloma Registry (DMMR is a population-based clinical quality database established in January 2005. The primary aim of the database is to ensure that diagnosis and treatment of plasma cell dyscrasia are of uniform quality throughout the country. Another aim is to support research. Patients are registered with their unique Danish personal identification number, and the combined use of DMMR, other Danish National registries, and the Danish National Cancer Biobank offers a unique platform for population-based translational research.Study population: All newly diagnosed patients with multiple myeloma (MM, smoldering MM, solitary plasmacytomas, and plasma cell leukemia in Denmark are registered annually; ~350 patients. Amyloid light-chain amyloidosis, POEMS syndrome (polyneuropathy, organomegaly, endocrinopathy, monoclonal gammopathy, and skin changes syndrome, monoclonal gammopathy of undetermined significance and monoclonal gammopathy of undetermined significance with

  3. The Danish Registry of Diabetic Retinopathy

    DEFF Research Database (Denmark)

    Andersen, Nis; Hjortdal, Jesper Østergaard; Schielke, Katja Christina;

    2016-01-01

    AIM OF DATABASE: To monitor the development of diabetic eye disease in Denmark and to evaluate the accessibility and effectiveness of diabetic eye screening programs with focus on interregional variations. TARGET POPULATION: The target population includes all patients diagnosed with diabetes....... Denmark (5.5 million inhabitants) has ~320,000 diabetes patients with an annual increase of 27,000 newly diagnosed patients. The Danish Registry of Diabetic Retinopathy (DiaBase) collects data on all diabetes patients aged ≥18 years who attend screening for diabetic eye disease in hospital eye departments...... and in private ophthalmological practice. In 2014-2015, DiaBase included data collected from 77,968 diabetes patients. MAIN VARIABLES: The main variables provide data for calculation of performance indicators to monitor the quality of diabetic eye screening and development of diabetic retinopathy. Data...

  4. Danish Registry of Childhood and Adolescent Diabetes

    DEFF Research Database (Denmark)

    Svensson, Jannet; Cerqueira, Charlotte; Kjærsgaard, Per

    2016-01-01

    classification, family history of diabetes, growth parameters, self-care, and treatment variables. The quality indicators are selected based on international consensus of measures of good clinical practice. The indicators are metabolic control as assessed by HbA1c, blood pressure, albuminuria, retinopathy...... experiencing severe hypoglycemia, diabetic nephropathy, and retinopathy. CONCLUSION: The systematic collection of data in DanDiabKids documents improved quality of care over the last 12 years, despite a substantial increase in the number of patients cared for by pediatric departments in Denmark, fulfilling......AIM: The aims of the Danish Registry of Childhood and Adolescent Diabetes (DanDiabKids) are to monitor and improve the quality of care for children and adolescents with diabetes in Denmark and to follow the incidence and prevalence of diabetes. STUDY POPULATION: The study population consists of all...

  5. Symptom Patterns Among Gulf War Registry Veterans

    Science.gov (United States)

    Hallman, William K.; Kipen, Howard M.; Diefenbach, Michael; Boyd, Kendal; Kang, Han; Leventhal, Howard; Wartenberg, Daniel

    2003-01-01

    Objectives. We identify symptom patterns among veterans who believe they suffer from Gulf War–related illnesses and characterize groups of individuals with similar patterns. Methods. A mail survey was completed by 1161 veterans drawn from the Gulf War Health Registry. Results. An exploratory factor analysis revealed 4 symptom factors. A K-means cluster analysis revealed 2 groups: (1) veterans reporting good health and few moderate/severe symptoms, and (2) veterans reporting fair/poor health and endorsing an average of 37 symptoms, 75% as moderate/severe. Those in Cluster 2 were more likely to report having 1 or more of 24 medical conditions. Conclusions. These findings are consistent with previous investigations of symptom patterns in Gulf War veterans. This multisymptom illness may be more fully characterized by the extent, breadth, and severity of symptoms reported. PMID:12660208

  6. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  7. Segueing from a Data Category Registry to a Data Concept Registry

    OpenAIRE

    Wright, S. E.; Windhouwer, Menzo; Schuurman, I.; Broeder, D.

    2014-01-01

    International audience; The terminology Community of Practice has long standardized data categories in the framework of ISO TC 37. ISO 12620:2009 specifies the data model and procedures for a Data Category Registry (DCR), which has been implemented by the Max Planck Institute for Psycholinguistics as the ISOcat DCR. The DCR has been used by not only ISO TC 37, but also by the CLARIN research infrastructure. This paper describes how the needs of these communities have started to diverge and th...

  8. I RBH - First Brazilian Hypertension Registry

    Science.gov (United States)

    Jardim, Paulo César Brandão Veiga; de Souza, Weimar Kunz Sebba Barroso; Lopes, Renato Delascio; Brandão, Andréa Araújo; Malachias, Marcus V. Bolívar; Gomes, Marco Mota; Moreno Júnior, Heitor; Barbosa, Eduardo Costa Duarte; Póvoa, Rui Manoel dos Santos

    2016-01-01

    Background: A registry assessing the care of hypertensive patients in daily clinical practice in public and private centers in various Brazilian regions has not been conducted to date. Such analysis is important to elucidate the effectiveness of this care. Objective: To document the current clinical practice for the treatment of hypertension with identification of the profile of requested tests, type of administered treatment, level of blood pressure (BP) control, and adherence to treatment. Methods: National, observational, prospective, and multicenter study that will include patients older than 18 years with hypertension for at least 4 weeks, following up in public and private centers and after signing a consent form. The study will exclude patients undergoing dialysis, hospitalized in the previous 30 days, with class III or IV heart failure, pregnant or nursing, with severe liver disease, stroke or acute myocardial infarction in the past 30 days, or with diseases with a survival prognosis < 1 year. Evaluations will be performed at baseline and after 1 year of follow-up. The parameters that will be evaluated include anthropometric data, lifestyle habits, BP levels, lipid profile, metabolic syndrome, and adherence to treatment. The primary outcomes will be hospitalization due to hypertensive crisis, cardiocirculatory events, and cardiovascular death, while secondary outcomes will be hospitalization for heart failure and requirement of dialysis. A subgroup analysis of 15% of the sample will include noninvasive central pressure evaluation at baseline and study end. The estimated sample size is 3,000 individuals for a prevalence of 5%, sample error of 2%, and 95% confidence interval. Results: The results will be presented after the final evaluation, which will occur at the end of a 1-year follow-up. Conclusion: The analysis of this registry will improve the knowledge and optimize the treatment of hypertension in Brazil, as a way of modifying the prognosis of

  9. I RBH - First Brazilian Hypertension Registry

    Directory of Open Access Journals (Sweden)

    Paulo César Brandão Veiga Jardim

    Full Text Available Abstract Background: A registry assessing the care of hypertensive patients in daily clinical practice in public and private centers in various Brazilian regions has not been conducted to date. Such analysis is important to elucidate the effectiveness of this care. Objective: To document the current clinical practice for the treatment of hypertension with identification of the profile of requested tests, type of administered treatment, level of blood pressure (BP control, and adherence to treatment. Methods: National, observational, prospective, and multicenter study that will include patients older than 18 years with hypertension for at least 4 weeks, following up in public and private centers and after signing a consent form. The study will exclude patients undergoing dialysis, hospitalized in the previous 30 days, with class III or IV heart failure, pregnant or nursing, with severe liver disease, stroke or acute myocardial infarction in the past 30 days, or with diseases with a survival prognosis < 1 year. Evaluations will be performed at baseline and after 1 year of follow-up. The parameters that will be evaluated include anthropometric data, lifestyle habits, BP levels, lipid profile, metabolic syndrome, and adherence to treatment. The primary outcomes will be hospitalization due to hypertensive crisis, cardiocirculatory events, and cardiovascular death, while secondary outcomes will be hospitalization for heart failure and requirement of dialysis. A subgroup analysis of 15% of the sample will include noninvasive central pressure evaluation at baseline and study end. The estimated sample size is 3,000 individuals for a prevalence of 5%, sample error of 2%, and 95% confidence interval. Results: The results will be presented after the final evaluation, which will occur at the end of a 1-year follow-up. Conclusion: The analysis of this registry will improve the knowledge and optimize the treatment of hypertension in Brazil, as a way of

  10. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  11. Zika Attacks Nerves, Muscles, Other Tissues

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  12. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  13. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore......AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... side-channels attacks can be applied to ECC. This paper reflects an ongoing research in the field of countermeasures against the attacks mentioned above....

  14. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  15. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  16. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin , S.; M. FAIZAL A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  17. Educational Rationale Metadata for Learning Objects

    Directory of Open Access Journals (Sweden)

    Tom Carey

    2002-10-01

    Full Text Available Instructors searching for learning objects in online repositories will be guided in their choices by the content of the object, the characteristics of the learners addressed, and the learning process embodied in the object. We report here on a feasibility study for metadata to record process-oriented information about instructional approaches for learning objects, though a set of Educational Rationale [ER] tags which would allow authors to describe the critical elements in their design intent. The prototype ER tags describe activities which have been demonstrated to be of value in learning, and authors select the activities whose support was critical in their design decisions. The prototype ER tag set consists descriptors of the instructional approach used in the design, plus optional sub-elements for Comments, Importance and Features which implement the design intent. The tag set was tested by creators of four learning object modules, three intended for post-secondary learners and one for K-12 students and their families. In each case the creators reported that the ER tag set allowed them to express succinctly the key instructional approaches embedded in their designs. These results confirmed the overall feasibility of the ER tag approach as a means of capturing design intent from creators of learning objects. Much work remains to be done before a usable ER tag set could be specified, including evaluating the impact of ER tags during design to improve instructional quality of learning objects.

  18. Rationale for Antioxidant Supplementation in Hemodialysis Patients

    Directory of Open Access Journals (Sweden)

    Morena Marion

    2001-01-01

    Full Text Available Oxidative stress, which results from an imbalance between reactive oxygen species (ROS production and antioxidant defense mechanisms, is now a well recognized pathogenic process in hemodialysis (HD patients that could be involved in dialysis-related pathologies such as accelerated atherosclerosis, amyloidosis and anemia. This review is aimed at evaluating the rationale for preventive intervention against oxidative damage during HD as well as the putative causal factors implicated in this imbalance. The antioxidant system is severely impaired in uremic patients and impairment increases with the degree of renal failure. HD further worsens this condition mainly by losses of hydrophilic unbound small molecular weight substances such as vitamin C, trace elements and enzyme regulatory compounds. Moreover, inflammatory state due to the hemo-incompatibility of the dialysis system plays a critical role in the production of oxidants contributing further to aggravate the pro-oxidant status of uremic patients. Prevention of ROS overproduction can be achieved by improvement of dialysis biocompatibility, a main component of adequate dialysis, and further complimented by antioxidant supplementation. This could be achieved either orally or via the extracorporeal circuit. Antioxidants such as vitamin E could be bound on dialyzer membranes. Alternatively, hemolipodialysis consisting of loading HD patients with vitamin C or E via an ancillary circuit made of vitamin E-rich liposomes may be used.

  19. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like...

  20. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  1. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  2. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  3. Paper 6: EUROCAT member registries: organization and activities

    DEFF Research Database (Denmark)

    Greenlees, Ruth; Neville, Amanda; Addor, Marie-Claude

    2011-01-01

    anomalies covered by their region. Associate members transmit aggregate case counts for each EUROCAT anomaly subgroup by year and by type of birth. This article describes the organization and activities of each of the current 29 full member and 6 associate member registries of EUROCAT.......EUROCAT is a network of population-based congenital anomaly registries providing standardized epidemiologic information on congenital anomalies in Europe. There are three types of EUROCAT membership: full, associate, or affiliate. Full member registries send individual records of all congenital...

  4. The Danish Registry of Diabetic Retinopathy

    Directory of Open Access Journals (Sweden)

    Andersen N

    2016-10-01

    Full Text Available Nis Andersen,1,2 Jesper Østergaard Hjortdal,1,3 Katja Christina Schielke,4 Toke Bek,3 Jakob Grauslund,5 Caroline Schmidt Laugesen,6 Henrik Lund-Andersen,7 Charlotte Cerqueira,8 Jens Andresen2 1Danish Ophthalmological Society, Copenhagen, 2Organization of Danish Ophthalmologists in Private Practice, Copenhagen, 3Department of Ophthalmology, Aarhus University Hospital, Aarhus, 4Department of Ophthalmology, Aalborg University Hospital, Aalborg, 5Department of Ophthalmology, Odense University Hospital, Odense, 6Department of Ophthalmology, Copenhagen University Hospital Roskilde, Roskilde, 7Department of Ophthalmology, Glostrup Hospital, 8Registry Support Centre (East – Epidemiology and Biostatistics, Research Centre for Prevention and Health, Rigshospitalet – Glostrup, University of Copenhagen, Copenhagen, Denmark Aim of database: To monitor the development of diabetic eye disease in Denmark and to evaluate the accessibility and effectiveness of diabetic eye screening programs with focus on interregional variations.Target population: The target population includes all patients diagnosed with diabetes. Denmark (5.5 million inhabitants has ~320,000 diabetes patients with an annual increase of 27,000 newly diagnosed patients. The Danish Registry of Diabetic Retinopathy (DiaBase ­collects data on all diabetes patients aged ≥18 years who attend screening for diabetic eye disease in hospital eye departments and in private ophthalmological practice. In 2014–2015, DiaBase included data collected from 77,968 diabetes patients.Main variables: The main variables provide data for calculation of performance indicators to monitor the quality of diabetic eye screening and development of diabetic retinopathy. Data with respect to age, sex, best corrected visual acuity, screening frequency, grading of diabetic retinopathy and maculopathy at each visit, progression/regression of diabetic eye disease, and prevalence of blindness were obtained. Data

  5. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  6. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  7. Continuous Weight Attack on Complex Network

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We introduce a continuous weight attack strategy and numerically investigate the effect of continuous use a weight coefficient ω to define the attack intensity. The weight coefficient ω increases continuously from 1 to infinity, where 1 represents no attack and infinity represents complete destructive attack. Our results show that the continuous weight attack on two selected nodes with small ω (ω≈ 3) could achieve the same damage of complete elimination of a single selected node on both BA and ER networks. It is found that the continuous weight attack on a single selected edge with small ω (ω≈ 2) can reach the same effect of complete elimination of a single edge on BA network, but on ER network the damage of the continuous weight attack on a single edge is close to but always smaller than that of complete elimination of edge even if ω is very large.

  8. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  9. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  10. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  11. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identifi...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  12. How Suitable Are Registry Data for Recurrence Risk Calculations?

    DEFF Research Database (Denmark)

    Ellesøe, Sabrina Gade; Jensen, Anders Boeck; Ängquist, Lars Henrik

    2016-01-01

    identifier in the Danish registries, thus enabling connection of information from several registries. Utilizing the CPR number, we identified Danish patients with familial CHD and reviewed each patient's file. We compared diagnoses from the registries with those manually assigned, which enabled calculation......BACKGROUND: Congenital heart disease (CHD) occurs in approximately 1% of all live births, and 3% to 8% of these have until now been considered familial cases, defined as the occurrence of two or more affected individuals in a family. The validity of CHD diagnoses in Danish administrative registry...... data has only been studied previously in highly selected patient populations. These studies identified high positive predictive values (PPVs) and recurrence risk ratios (RRRs-ratio between probabilities of CHD given family history of CHD and no family history). However, the RRR can be distorted...

  13. EPA Facility Registry Service (FRS): ALL FRS INTERESTS LAYER

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data provides location and attribute information on all facilities in EPA's Facility Registry Service (FRS) for a internet web feature service . The FRS is an...

  14. EPA Facility Registry Service (FRS): AIRS_AFS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  15. EPA Facility Registry Service (FRS): ER_CERCLIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  16. EPA Facility Registry Service (FRS): ER_TSCA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  17. EPA Facility Registry Service (FRS): AIRS_AQS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  18. EPA Facility Registry Service (FRS): Facility Interests Dataset Download

    Data.gov (United States)

    U.S. Environmental Protection Agency — This downloadable data package consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are...

  19. EPA Facility Registry Service (FRS): PCS_NPDES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  20. EPA Facility Registry Service (FRS): ER_WWTP_NPDES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of Waste Water Treatment...

  1. EPA Facility Registry Service (FRS): Facility Interests Dataset - Intranet Download

    Data.gov (United States)

    U.S. Environmental Protection Agency — This downloadable data package consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are...

  2. EPA Facility Registry Service (FRS): Wastewater Treatment Plants

    Data.gov (United States)

    U.S. Environmental Protection Agency — This GIS dataset contains data on wastewater treatment plants, based on EPA's Facility Registry Service (FRS), EPA's Integrated Compliance Information System (ICIS)...

  3. EPA Facility Registry Service (FRS): AIRS_AFS_MAJOR

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  4. EPA Facility Registry Service (FRS): ER_TRI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  5. EPA Facility Registry Service (FRS): Facility Interests Dataset - Intranet

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are available in...

  6. EPA Facility Registry Service (FRS): ER_RCRATSD

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  7. EPA Facility Registry Service (FRS): PCS_NPDES_MAJOR

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that are...

  8. EPA Facility Registry Service (FRS): RCRA_LQG

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  9. EPA Facility Registry Service (FRS): RCRA_TSD

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of Hazardous Waste...

  10. EPA Facility Registry Service (FRS): RCRA_ACTIVE

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of active hazardous...

  11. EPA Facility Registry Service (FRS): CERCLIS_NPL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that are...

  12. EPA Facility Registry Service (FRS): ER_EPLAN

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  13. EPA Facility Registry Service (FRS): ER_RMP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  14. EPA Facility Registry Service (FRS): ER_FRP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link to Facility...

  15. Environmental Protection Agency (EPA) Facility Registry Service (FRS) Power Plants

    Data.gov (United States)

    Department of Homeland Security — This GIS dataset contains data on wastewater treatment plants, based on EPA's Facility Registry Service (FRS) and NPDES, along with Clean Watersheds Needs Survey...

  16. EPA Facility Registry Service (FRS): Facility Interests Dataset

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are available in...

  17. EPA Facility Registry Service (FRS): RCRA_TRANS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  18. EPA Facility Registry Service (FRS): RCRA_INACTIVE

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of hazardous waste...

  19. The rationale for early intervention in schizophrenia and related disorders

    DEFF Research Database (Denmark)

    Nordentoft, Merete; Jeppesen, Pia; Petersen, Lone;

    2009-01-01

    Abstract Aim: To examine the rationale and evidence supporting an early intervention approach in schizophrenia. Methods: A selective literature review was conducted. Results: During the onset of schizophrenia, there is often a significant delay between the emergence of psychotic symptoms and the ......Abstract Aim: To examine the rationale and evidence supporting an early intervention approach in schizophrenia. Methods: A selective literature review was conducted. Results: During the onset of schizophrenia, there is often a significant delay between the emergence of psychotic symptoms...

  20. The growing number of hemophilia registries: Quantity vs. quality.

    Science.gov (United States)

    Keipert, C; Hesse, J; Haschberger, B; Heiden, M; Seitz, R; van den Berg, H M; Hilger, A

    2015-05-01

    Registries for rare diseases provide a tool for obtaining an overview of the clinical situation and can be used to discover points of improvement and to monitor long-term safety. Registries could also become a powerful tool to provide supporting information for marketing authorization. There is an urgent need for a pan-European or global strategy that supports consistent data. Therefore, transparency in data collection, harmonization of the database structures, and the convergence of scientific approaches are required.

  1. Registry data trends of total ankle replacement use.

    Science.gov (United States)

    Roukis, Thomas S; Prissel, Mark A

    2013-01-01

    Joint arthroplasty registry data are meaningful when evaluating the outcomes of total joint replacement, because they provide unbiased objective information regarding survivorship and incidence of use. Critical evaluation of the registry data information will benefit the surgeon, patient, and industry. However, the implementation and acceptance of registry data for total ankle replacement has lagged behind that of hip and knee implant arthroplasty. Currently, several countries have national joint arthroplasty registries, with only some procuring information for total ankle replacement. We performed an electronic search to identify publications and worldwide registry databanks with pertinent information specific to total ankle replacement to determine the type of prostheses used and usage trends over time. We identified worldwide registry data from 33 countries, with details pertinent to total ankle replacement identified in only 6 countries. The obtained information was arbitrarily stratified into 3 distinct periods: 2000 to 2006, 2007 to 2010, and 2011. Within these study periods, the data from 13 total ankle replacement systems involving 3,980 ankles were identified. The vast majority (97%) of the reported ankle replacements were 3-component, mobile-bearing, uncemented prostheses. Three usage trends were identified: initial robust embracement followed by abrupt disuse, minimal use, and initial embracement followed by sustained growth in implantation. Before the widespread acceptance of new total ankle replacements, the United States should scrutinize and learn from the international registry data and develop its own national joint registry that would include total ankle replacement. Caution against the adoption of newly released prostheses, especially those without readily available revision components, is recommended.

  2. The National Anesthesia Clinical Outcomes Registry.

    Science.gov (United States)

    Liau, Adrian; Havidich, Jeana E; Onega, Tracy; Dutton, Richard P

    2015-12-01

    The Anesthesia Quality Institute (AQI) was chartered in 2008 by the American Society of Anesthesiologists to develop the National Anesthesia Clinical Outcomes Registry (NACOR). In this Technical Communication, we will describe how data enter NACOR, how they are authenticated, and how they are analyzed and reported. NACOR accepts case-level administrative, clinical, and quality capture data from voluntarily participating anesthesia practices and health care facilities in the United States. All data are transmitted to the AQI in summary electronic files generated by billing, quality capture, and electronic health care record software, typically on a monthly basis. All data elements are mapped to fields in the NACOR schema in accordance with a publicly available data dictionary. Incoming data are loaded into NACOR by AQI technologists and are subject to both manual and automated review to identify systematically missing elements, miscoding, and inadvertent corruption. Data are deidentified in compliance with Health Insurance Portability and Accountability Act regulations. The database server of AQI, which houses the NACOR database, is protected by 2 firewalls within the American Society of Anesthesiologists' network infrastructure; this system has not been breached. The NACOR Participant User File, a deidentified case-level dataset of information from NACOR, is available to researchers at participating institutions. NACOR architecture and the nature of the Participant User File include both strengths and weaknesses.

  3. Italian Registry of Congenital Bleeding Disorders

    Science.gov (United States)

    Giampaolo, Adele; Abbonizio, Francesca; Arcieri, Romano; Hassan, Hamisa Jane

    2017-01-01

    In Italy, the surveillance of people with bleeding disorders is based on the National Registry of Congenital Coagulopathies (NRCC) managed by the Italian National Institute of Health (Istituto Superiore di Sanità). The NRCC collects epidemiological and therapeutic data from the 54 Hemophilia Treatment Centers, members of the Italian Association of Hemophilia Centres (AICE). The number of people identified with bleeding disorders has increased over the years, with the number rising from approx. 7000 in 2000 to over 11,000 in 2015. The NRCC includes 4020 patients with hemophilia A and 859 patients with hemophilia B. The prevalence of the rare type 3 vWD is 0.20/100,000 inhabitants. Less common congenital bleeding disorders include the following deficiencies: Factor I (fibrinogen), Factor II (prothrombin), Factor V, Factor VII, Factor X, Factor XI and Factor XIII, which affect 1953 patients. Hepatitis C Virus (HCV) infection affects 1561 patients, more than 200 of whom have two infections (HCV + HIV). Estimated hemophilia-related drug consumption in 2015 was approx. 550 million IU of FVIII for hemophilia A patients and approx. 70 million IU of FIX for hemophilia B patients. The NRCC, with its bleeding disorder data set, is a tool that can provide answers to fundamental questions in public health, monitoring care provision and drug treatment, as well as facilitating clinical and epidemiological research. PMID:28335488

  4. Italian registry of cardiac magnetic resonance

    Energy Technology Data Exchange (ETDEWEB)

    Francone, Marco [Department of Radiological, Oncological and Pathological Sciences, Sapienza University of Rome (Italy); Di Cesare, Ernesto, E-mail: ernesto.dicesare@cc.univaq.it [Dipartimento di Scienze Cliniche Applicate e Biotecnologie, Università di L’Aquila (Italy); Cademartiri, Filippo [Cardio-Vascular Imaging Unit, Giovanni XXIII Hospital, Monastier di Treviso, TV (Italy); Erasmus Medical Center University, Rotterdam (Netherlands); Pontone, Gianluca [IRCCS Centro Cardiologico Monzino (Italy); Lovato, Luigi [Policlinico S. Orsola Bologna (Italy); Matta, Gildo [Azienda ospedaliera G Brotzu Cagliari (Italy); Secchi, Francesco [IRCCS Policlinico San Donato, Radiology Unit, Milan (Italy); Maffei, Erica [Cardio-Vascular Imaging Unit, Giovanni XXIII Hospital, Monastier di Treviso, TV (Italy); Erasmus Medical Center University, Rotterdam (Netherlands); Pradella, Silvia [Azienda Ospedaliera Universitaria Careggi (Italy); Carbone, Iacopo [Department of Radiological, Oncological and Pathological Sciences, Sapienza University of Rome (Italy); Marano, Riccardo [Policlinico Gemelli, Università Cattolica Roma (Italy); Bacigalupo, Lorenzo [Ospedale Galliera, Genova (Italy); Chiodi, Elisabetta [Ospedale S. Anna Ferrara (Italy); Donato, Rocco [Azienda Ospedaliera Universitaria G. Martino, Me (Italy); Sbarbati, Stefano [Ospedale Madre Giuseppina Vannini, Roma (Italy); De Cobelli, Francesco [IRCCS S. Raffaele, Università Vita Salute, Milano (Italy); Di Renzi, Paolo [Fate Bene Fratelli Isola tiberina, Roma (Italy); Ligabue, Guido; Mancini, Andrea [Azienda Ospedaliera-Universitaria Policlinico di Modena (Italy); Palmieri, Francesco [Diparimento di Diagnostica per immagini e radiologia interventistica, Ospedale S. Maria delle Grazie, Pozzuoli, Napoli (Italy); and others

    2014-01-15

    Objectives: Forty sites were involved in this multicenter and multivendor registry, which sought to evaluate indications, spectrum of protocols, impact on clinical decision making and safety profile of cardiac magnetic resonance (CMR). Materials and methods: Data were prospectively collected on a 6-month period and included 3376 patients (47.2 ± 19 years; range 1–92 years). Recruited centers were asked to complete a preliminary general report followed by a single form/patient. Referral physicians were not required to exhibit any specific certificate of competency in CMR imaging. Results: Exams were performed with 1.5 T scanners in 96% of cases followed by 3 T (3%) and 1 T (1%) magnets and contrast was administered in 84% of cases. The majority of cases were performed for the workup of inflammatory heart disease/cardiomyopathies representing overall 55.7% of exams followed by the assessment of myocardial viability and acute infarction (respectively 6.9% and 5.9% of patients). In 49% of cases the final diagnosis provided was considered relevant and with impact on patient's clinical/therapeutic management. Safety evaluation revealed 30 (0.88%) clinical events, most of which due to patient's preexisting conditions. Radiological reporting was recorded in 73% of exams. Conclusions: CMR is performed in a large number of centers in Italy with relevant impact on clinical decision making and high safety profile.

  5. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  6. [Presentation of the new Spanish home artificial nutrition registry].

    Science.gov (United States)

    Cuerda, C; Parón, L; Planas, M; Gómez Candela, C; Moreno, J M

    2007-01-01

    The registries are databases including information about a treatment or a disease in a definite population. Concerning home artificial nutrition there are registries of patients in different European countries, USA and Japan, collecting data such as the prevalence, indication, follow-up and complications of these treatments. The Spanish group of Home Artificial Nutrition (HAN), NADYA, was established in 1992 with professionals devoted to the practise of artificial nutrition. Since then, one of its wills was the development of the Spanish registry of HAN. This is a voluntary registry accessible through the web page www.nadya-senpe.com. In 2005, this group decided to update the registry according to the Data Protection Law and including other improvements. Thank to the work of all the members of this group we have many data on the practise of HAN in our country. Since 1994, except the years 97-98, the annual registries of patients on home parenteral nutrition and home enteral nutrition have been published periodically, observing an increase in both, the number of patients and collaborating centres, presenting to us the actual practise of HAN in our country.

  7. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  8. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to ...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs.......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...

  9. ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL

    Institute of Scientific and Technical Information of China (English)

    Wei Baodian; Liu Dongsu; Wang Xinmei

    2004-01-01

    The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.

  10. Peritoneal Dialysis Registry With 2012 Survey Report.

    Science.gov (United States)

    Hasegawa, Takeshi; Nakai, Shigeru; Moriishi, Misaki; Ito, Yasuhiko; Itami, Noritomo; Masakane, Ikuto; Hanafusa, Norio; Taniguchi, Masatomo; Hamano, Takayuki; Shoji, Tetsuo; Yamagata, Kunihiro; Shinoda, Toshio; Kazama, Junichiro; Watanabe, Yuzo; Shigematsu, Takashi; Marubayashi, Seiji; Morita, Osamu; Wada, Atsushi; Hashimoto, Seiji; Suzuki, Kazuyuki; Kimata, Naoki; Wakai, Kenji; Fujii, Naohiko; Ogata, Satoshi; Tsuchida, Kenji; Nishi, Hiroshi; Iseki, Kunitoshi; Tsubakihara, Yoshiharu; Nakamoto, Hidetomo

    2015-12-01

    Since 2009, the peritoneal dialysis (PD) registry survey has been carried out as part of the annual nationwide survey conducted by the Statistical Survey Committee of the Japanese Society for Dialysis Therapy with the cooperation of the Japanese Society for Peritoneal Dialysis. In this report, the current status of PD patients is presented on the basis of the results of the survey conducted at the end of 2012. The subjects were PD patients who lived in Japan and participated in the 2012 survey. Descriptive analysis of various items was performed, which included the current status of the combined use of PD and another dialysis method such as hemodialysis (HD) or hemodiafiltration (HDF), the method of exchanging dialysate, the use of an automated peritoneal dialysis (APD) machine, and the rates of peritonitis and catheter exit-site infection. From the results of the facility survey in 2012, the number of PD patients was 9514, a decrease of 128 from 2011. Among the entire dialysis patient population, 3.1% were PD patients, a decrease of 0.1%. Among the studied patients, 347 had a peritoneal catheter and underwent peritoneal lavage, 175 were started on PD in 2012 but introduced to other blood purification methods in the same year, and 1932 underwent both PD and another dialysis method such as HD or HDF. The percentage of patients who underwent PD and another dialysis method increased with PD vintage: vintage of ≥2 years. The mean rate of peritonitis was 0.22 per patient per year. The mean rate of catheter exit-site infections was 0.36 per patient per year.

  11. [The EUCORE registry: objectives and general results].

    Science.gov (United States)

    Cercenado, Emilia; Pachón, Jerónimo

    2012-02-01

    The European Cubicin Outcomes Registry and Experience (EUCORE) is an ongoing, retrospective, European, post-marketing, non-comparative database of daptomycin use in patients that have received at least one daptomycin dose. The primary objective is to evaluate the clinical outcomes of patients treated with this drug. This article presents the analysis of patients included in Spanish institutions from January 2006 to March 2010. A total of 726 patients were included: 66% males, 48.6% aged more than 65 years old, and 70% with comorbidities. Daptomycin was administered in the outpatient setting in 20.3% of the patients. More than 50% of the patients received a dose of 6 mg/kg/day and in 80% daptomycin was administered as a rescue therapy. The median treatment duration was 14 days. The infections treated were bacteremia (32.51%), skin and soft tissue infections (31.4%), infectious endocarditis (14.33%), infections associated with prosthetic materials (10.9%), osteoarticular infections (6.1%), and others. Infections were caused by Staphylococcus aureus (40.5%; 14.4% methicilllin-resistant), coagulase-negative staphylococci (34.5%), enterococci (11.7%) and group viridans streptococci (2.9%). The overall rate of clinical success was 78.4% (81.5% when administered as first-line therapy and 77.6% when administered as rescue therapy). In patients with renal failure, the efficacy of daptomycin was lower. At the end of therapy, 8.7% of patients showed a decrease in creatinine clearance, and in 25 patients creatine kinase values were more than 10 times higher than normal values. Daptomycin is a safe and effective antimicrobial agent for the treatment of severe infections caused by Gram-positive bacteria.

  12. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  13. The Toxicology Investigators Consortium Case Registry--the 2014 Experience.

    Science.gov (United States)

    Rhyee, Sean H; Farrugia, Lynn; Campleman, Sharan L; Wax, Paul M; Brent, Jeffrey

    2015-12-01

    The Toxicology Investigators Consortium (ToxIC) Case Registry was established in 2010 by the American College of Medical Toxicology. The Registry includes all medical toxicology consultations performed at participating sites. The Registry was queried for all cases entered between January 1 and December 31, 2014. Specific data reviewed for analysis included demographics (age, gender, ethnicity), source of consultation, reasons for consultation, agents involved in toxicological exposures, signs, symptoms, clinical findings, fatalities, and treatment. In 2014, 9172 cases were entered in the Registry across 47 active member sites. Females accounted for 51.1 % of cases. The majority (65.1 %) of cases were adults between the ages of 19 and 65. Caucasians made up the largest identified ethnic group (48.9 %). Most Registry cases originated from the inpatient setting (93.5 %), with a large majority of these consultations coming from the emergency department or inpatient admission services. Intentional and unintentional pharmaceutical exposures continued to be the most frequent reasons for consultation, accounting for 61.7 % of cases. Among cases of intentional pharmaceutical exposure, 62.4 % were associated with a self-harm attempt. Non-pharmaceutical exposures accounted for 14.1 % of Registry cases. Similar to the past years, non-opioid analgesics, sedative-hypnotics, and opioids were the most commonly encountered agents. Clinical signs or symptoms were noted in 81.9 % of cases. There were 89 recorded fatalities (0.97 %). Medical treatment (e.g., antidotes, antivenom, chelators, supportive care) was rendered in 62.3 % of cases. Patient demographics and exposure characteristics in 2014 Registry cases remain similar to prior years. The majority of consultations arose in the acute care setting (emergency department or inpatient) and involved exposures to pharmaceutical products. Among exposures, non-opioid analgesics, sedative/hypnotics, and opioids were the most frequently

  14. Establishment of an Australian National Genetic Heart Disease Registry.

    Science.gov (United States)

    Ingles, Jodie; McGaughran, Julie; Vohra, Jitendra; Weintraub, Robert G; Davis, Andrew; Atherton, John; Semsarian, Christopher

    2008-12-01

    A National Genetic Heart Disease Registry has recently been established, with the aim to enroll every family in Australia with a genetically determined cardiomyopathy or primary arrhythmic disorder. The Registry seeks to further our understanding of the impact and burden of disease in this population; increase awareness and provide education to health professionals and families; and establish a large cardiac genetic cohort as a resource for approved research studies. The Registry is currently recruiting families with inherited cardiomyopathies (e.g. hypertrophic cardiomyopathy) and primary arrhythmogenic disorders (e.g. long QT syndrome), with scope to expand this in the future. Affected individuals, as well as their first-degree (at-risk) family members are eligible to enroll. Participants are currently being recruited from cardiac genetics clinics in approved recruitment sites and hope to expand to other Australian centres including general cardiology practice in the future. A significant focus of the Registry is to improve understanding and create awareness of inherited heart diseases, which includes ensuring families are aware of genetic testing options and current clinical screening recommendations for at-risk family members. A Registry Advisory Committee has been established under the NHMRC Guidelines, and includes a representative from each major recruitment centre. This committee approves all decisions relating to the Registry including approval of research studies. A National Genetic Heart Disease Registry will provide a valuable resource to further our knowledge of the clinical and genetic aspects of these diseases. Since most of the current data about the prevalence, natural history and outcomes of genetic heart diseases has emanated from the United States and Europe, characterising these Australian populations will be of significant benefit, allowing for more informed and specific health care planning and resource provision.

  15. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  16. Impact of Alleged Russian Cyber Attacks

    Science.gov (United States)

    2009-05-01

    March 14, 2009). 96 Ivan Buranov, Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal...Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated by Open Source...Buranov, Ivan; Vodo, Vladimir; and Yegikyan, Seda Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated

  17. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  18. Attacks on Local Searching Tools

    CERN Document Server

    Nielson, Seth James; Wallach, Dan S

    2011-01-01

    The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

  19. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  20. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  1. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  2. Japan Renal Biopsy Registry and Japan Kidney Disease Registry: Committee Report for 2009 and 2010.

    Science.gov (United States)

    Sugiyama, Hitoshi; Yokoyama, Hitoshi; Sato, Hiroshi; Saito, Takao; Kohda, Yukimasa; Nishi, Shinichi; Tsuruya, Kazuhiko; Kiyomoto, Hideyasu; Iida, Hiroyuki; Sasaki, Tamaki; Higuchi, Makoto; Hattori, Motoshi; Oka, Kazumasa; Kagami, Shoji; Kawamura, Tetsuya; Takeda, Tetsuro; Hataya, Hiroshi; Fukasawa, Yuichiro; Fukatsu, Atsushi; Morozumi, Kunio; Yoshikawa, Norishige; Shimizu, Akira; Kitamura, Hiroshi; Yuzawa, Yukio; Matsuo, Seiichi; Kiyohara, Yutaka; Joh, Kensuke; Nagata, Michio; Taguchi, Takashi; Makino, Hirofumi

    2013-04-01

    The Japan Renal Biopsy Registry (J-RBR) was started in 2007 and the Japan Kidney Disease Registry (J-KDR) was then started in 2009 by the Committee for Standardization of Renal Pathological Diagnosis and the Committee for the Kidney Disease Registry of the Japanese Society of Nephrology. The purpose of this report is to describe and summarize the registered data from 2009 and 2010. For the J-KDR, data were collected from 4,016 cases, including 3,336 (83.1 %) by the J-RBR and 680 (16.9 %) other cases from 59 centers in 2009, and from 4,681 cases including 4,106 J-RBR cases (87.7 %) and 575 other cases (12.3 %) from 94 centers in 2010, including the affiliate hospitals. In the J-RBR, 3,165 native kidneys (94.9 %) and 171 renal grafts (5.1 %) and 3,869 native kidneys (94.2 %) and 237 renal grafts (5.8 %) were registered in 2009 and 2010, respectively. Patients younger than 20 years of age comprised 12.1 % of the registered cases, and those 65 years and over comprised 24.5 % of the cases with native kidneys in 2009 and 2010. The most common clinical diagnosis was chronic nephritic syndrome (55.4 % and 50.0 % in 2009 and 2010, respectively), followed by nephrotic syndrome (22.4 % and 27.0 %); the most frequent pathological diagnosis as classified by the pathogenesis was IgA nephropathy (31.6 % and 30.4 %), followed by primary glomerular diseases (except IgA nephropathy) (27.2 % and 28.1 %). Among the primary glomerular diseases (except IgA nephropathy) in the patients with nephrotic syndrome, membranous nephropathy was the most common histopathology in 2009 (40.3 %) and minor glomerular abnormalities (50.0 %) were the most common in 2010 in native kidneys in the J-RBR. Five new secondary and longitudinal research studies by the J-KDR were started in 2009 and one was started in 2010.

  3. What roles should population-based cancer registries be playing in the 21st century? Reflections on the Asian Cancer Registry Forum, Bangkok, February 2014.

    Science.gov (United States)

    Roder, David

    2014-01-01

    Cancer registries have fundamental roles in cancer surveillance, research, and health services planning, monitoring and evaluation. Many are now assuming a broader role by contributing data for health-service management, alongside data inputs from other registries and administrative data sets. These data are being integrated into de-identified databases using privacy-protecting data linkage practices. Structured pathology reporting is increasing registry access to staging and other prognostic descriptors. Registry directions need to vary, depending on local need, barriers and opportunities. Flexibility and adaptability will be essential to optimize registry contributions to cancer control.

  4. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  5. Nephrology registry gives specialty control of quality data.

    Science.gov (United States)

    Weinstein, Adam; Beckrich, Amy; Singer, Dale

    2015-11-01

    It is important for providers and practices to begin working with registry level data. Submitting data to a qualified clinical data registry currently satisfies Meaningful Use Stage II menu set items. In the future, with the rollout of MIPS and the increasing focus on sharing risk, registry data will be used as a benchmark for both publicly-reported performance (the physician compare program will be linked to provider-level QCDR data) and modifications to reimbursement. It is important to remember that PQRS data is the basis for the value based modifier now and MIPS- related quality data after 2018. The RPA has launched and is evolving a unique and versatile nephrology-specific data collection and analytics tool. In collaboration with the American Society of Diagnostic and Interventional Nephrology, vascular access measures will be added to the registry for 2016. The registry and the analytics platform is a tier of software operating above your practice management system and EHR and, if data can be obtained, it can span all the locations in which nephrologists provide care.

  6. OCLC Registry of Digital Masters – Opportunities for European Cooperation

    Directory of Open Access Journals (Sweden)

    Janet Lees

    2005-11-01

    Full Text Available I would like to thank the Preservation Division for the invitation to participate in the programme today. I would also like to thank the LIBER Board for their interest in the early stages of this project culminating in the announcement LIBER President Erland Kolding Nielsen made last night about LIBER support and collaboration with OCLC PICA with respect to the Digital Registry. This initiative reflects my new role within OCLC PICA, which is to identify opportunities for joint development with our major shareholder OCLC, and sometimes 3rd parties such as LIBER. My main purpose today is to provide a descriptive paper to inform LIBER members about the OCLC Digital Registry and to outline the possible role for LIBER and its membership in a model for European participation. My presentation will be in three phases: the need for a registry, a description of the Registry and finally, and perhaps most importantly, to outline opportunities for LIBER and its members in establishing a model for European contribution. We are all familiar with the concept of a registry through our participation in union catalogues and perhaps also from our experience with microfilms through the European Register of Microform Masters (EROMM hosted by our friends in Göttingen.

  7. Rationales behind the choice of administration form with fentanyl

    DEFF Research Database (Denmark)

    Jacobsen, Ramune; Møldrup, Claus; Christrup, Lona

    2010-01-01

    BACKGROUND AND AIM: The aim of this study was to describe the rationale behind the choice of fentanyl administration forms among Danish general practitioners (GPs). METHODS: Thirty-eight Danish GPs were contacted via an Internet survey system to perform a Delphi survey. In the brainstorming phase...... in two rating rounds, respectively. The most important reason to choose fentanyl patches was that patients' clinical condition did not allow them to take analgesia orally. OTFCs were primarily seen as a self-administrative alternative to injections in case of breakthrough pain. The main reasons...... for not choosing OTFCs were intolerance to fentanyl and price. The most important possible rationale to choose fentanyl nasal spray was easy administration. The most important possible reasons to not choose fenanyl nasal spray were application side effects. CONCLUSIONS: The rationale behind the choice...

  8. [The medical rationale category and a new epistemology in health].

    Science.gov (United States)

    do Nascimento, Marilene Cabral; de Barros, Nelson Filice; Nogueira, Maria Inês; Luz, Madel Therezinha

    2013-12-01

    This article is an analytical report on the 20-year trajectory of the 'medical rationale' category that emerged in the early 1990s in the area of Social and Human Sciences in Health in the field of Public Health. Its objective was to study complex and therapeutic medical systems and traditional, complementary and alternative medicines. Based on a critical review of the literature, it presents some aspects of the cultural, political, institutional and social context of its emergence, as well as its main contributions and developments on a theoretical level and on social policies and practices in health. The southern epistemology concept of Boaventura de Sousa Santos is used to reflect upon the contribution of the 'medical rationale' category to the critique of the post-modern scientific rationale and to the creation of a new epistemology in health.

  9. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  10. Is it feasible to merge data from national shoulder registries?

    DEFF Research Database (Denmark)

    Rasmussen, Jeppe V; Brorson, Stig; Hallan, Geir

    2016-01-01

    BACKGROUND: The Nordic Arthroplasty Register Association was initiated in 2007, and several papers about hip and knee arthroplasty have been published. Inspired by this, we aimed to examine the feasibility of merging data from the Nordic national shoulder arthroplasty registries by defining...... a common minimal data set. METHODS: A group of surgeons met in 2014 to discuss the feasibility of merging data from the national shoulder registries in Denmark, Norway, and Sweden. Differences in organization, definitions, variables, and outcome measures were discussed. A common minimal data set...... of arthroplasties for osteoarthritis have increased in the study period. The most common arthroplasty type was total shoulder arthroplasty (34%) for osteoarthritis and stemmed hemiarthroplasty (90%) for acute fractures. CONCLUSION: We were able to merge data from the Nordic national registries into 1 common data...

  11. Patient-reported outcome measures in arthroplasty registries

    DEFF Research Database (Denmark)

    Rolfson, Ola; Bohm, Eric; Franklin, Patricia

    2016-01-01

    unsatisfied, dissatisfied, neutral, satisfied, or very satisfied). Survey logistics include patient instructions, paper- and electronic-based data collection, reminders for follow-up, centralized as opposed to hospital-based follow-up, sample size, patient- or joint-specific evaluation, collection intervals......The International Society of Arthroplasty Registries (ISAR) Patient-Reported Outcome Measures (PROMs) Working Group have evaluated and recommended best practices in the selection, administration, and interpretation of PROMs for hip and knee arthroplasty registries. The 2 generic PROMs in common use...... are the Short Form health surveys (SF-36 or SF-12) and EuroQol 5-dimension (EQ-5D). The Working Group recommends that registries should choose specific PROMs that have been appropriately developed with good measurement properties for arthroplasty patients. The Working Group recommend the use of a 1-item pain...

  12. REAC/TS Radiation Accident Registry: An Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doran M. Christensen, DO, REAC/TS Associate Director and Staff Physician Becky Murdock, REAC/TS Registry and Health Physics Technician

    2012-12-12

    Over the past four years, REAC/TS has presented a number of case reports from its Radiation Accident Registry. Victims of radiological or nuclear incidents must meet certain dose criteria for an incident to be categorized as an “accident” and be included in the registry. Although the greatest numbers of “accidents” in the United States that have been entered into the registry involve radiation devices, the greater percentage of serious accidents have involved sealed sources of one kind or another. But if one looks at the kinds of accident scenarios that have resulted in extreme consequence, i.e., death, the greater share of deaths has occurred in medical settings.

  13. Health technology assessment in Australia: a role for clinical registries?

    Science.gov (United States)

    Scott, Anna Mae

    2016-03-31

    Objective Health technology assessment (HTA) is a process of assessing evidence to inform policy decisions about public subsidy of new drugs and medical procedures. Where evidence is uncertain but the technology itself is promising, funders may recommend funding on an interim basis. It is unknown whether evidence from clinical registries is used to resolve uncertainties identified in interim-funded decisions made by Australian HTA bodies. Therefore, the present study evaluated the role of evidence from clinical registries in resolving evidence uncertainties identified by the Medical Services Advisory Committee (MSAC).Methods All HTAs considered by MSAC between 1998 and 2015 were reviewed and assessments that recommended interim funding were identified. The MSAC website was searched to identify reassessments of these recommendations and sources of evidence used to resolve the uncertainties were identified.Results Of 173 HTA reports considered by MSAC, 17 (10%) contained an interim funding recommendation. Eight recommendations cited uncertainty around safety, 15 cited uncertainty around clinical effectiveness and 13 cited uncertainty around economics (cost-effectiveness and/or budget impact). Of the 17 interim funding recommendations, 11 (65%) have been reassessed. Only two reassessments relied on clinical registry evidence to resolve evidence gaps identified at the time of the interim funding recommendation.Conclusions Clinical registries are underused as a source of evidence for resolving uncertainties around promising new health technologies in Australia. An open dialogue between stakeholders on the role of registries in this context is needed.What is known about the topic? HTA is a process of assessing the evidence to inform policy decisions about public subsidy of new health technologies (e.g. pharmaceuticals, diagnostic tests, medical procedures). Where evidence is uncertain but the technology under evaluation is promising, funders may recommend the funding of

  14. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  15. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  16. Minimization and Reliability Analyses of Attack Graphs

    Science.gov (United States)

    2002-02-01

    they model only attacks. Since we have a generic state machine model , we can simultaneously model not just attacks, but also seemingly benign system...Finite State Machine Model The Network We model the network as a set of facts, each represented as a relational predicate. The state of the network

  17. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  18. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  19. Attack tree generation by policy invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified th

  20. When Regional Innovation Policies Meet Policy Rationales and Evidence

    DEFF Research Database (Denmark)

    Borrás, Susana; Jordana, Jacint

    2016-01-01

    In spite of recent advancements regarding regional innovation policy rationales and evidence, there are few analyses about the actual features of existing regional innovation policies. Nevertheless, a policy analysis perspective is important in order to recognize their distinctive patterns across...... regions, and to understand how rationales and evidence can be translated into policy-making. To this purpose, this paper develops a framework to study the extent to which regional innovation policies have changed during the past few years. Since the mid-2000s, there has been an important development...

  1. Ensuring quality in studies linking cancer registries and biobanks.

    Science.gov (United States)

    Langseth, Hilde; Luostarinen, Tapio; Bray, Freddie; Dillner, Joakim

    2010-04-01

    The Nordic countries have a long tradition of providing comparable and high quality cancer data through the national population-based cancer registries and the capability to link the diverse large-scale biobanks currently in operation. The joining of these two infrastructural resources can provide a study base for large-scale studies of etiology, treatment and early detection of cancer. Research projects based on combined data from cancer registries and biobanks provides great opportunities, but also presents major challenges. Biorepositories have become an important resource in molecular epidemiology, and the increased interest in performing etiological, clinical and gene-environment-interaction studies, involving information from biological samples linked to population-based cancer registries, warrants a joint evaluation of the quality aspects of the two resources, as well as an assessment of whether the resources can be successfully combined into a high quality study. While the quality of biospecimen handling and analysis is commonly considered in different studies, the logistics of data handling including the linkage of the biobank with the cancer registry is an overlooked aspect of a biobank-based study. It is thus the aim of this paper to describe recommendations on data handling, in particular the linkage of biobank material to cancer registry data and the quality aspects thereof, based on the experience of Nordic collaborative projects combining data from cancer registries and biobanks. We propose a standard documentation with respect to the following topics: the quality control aspects of cancer registration, the identification of cases and controls, the identification and use of data confounders, the stability of serum components, historical storage conditions, aliquoting history, the number of freeze/thaw cycles and available volumes.

  2. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  3. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  4. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  5. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash......In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... function Skein, a finalist of the SHA-3 competition. Our attack penetrates more than two thirds of the Skein core—the cipher Threefish, and made the designers to change the submission in order to prevent it. The rebound part of our attack has been significantly enhanced to deliver results on the largest...

  6. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  7. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  8. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  9. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  10. Creating an effective clinical registry for rare diseases.

    Science.gov (United States)

    D'Agnolo, Hedwig Ma; Kievit, Wietske; Andrade, Raul J; Karlsen, Tom Hemming; Wedemeyer, Heiner; Drenth, Joost Ph

    2016-06-01

    The exposure of clinicians to patients with rare gastrointestinal diseases is limited. This hurts clinical studies, which impedes accumulation of scientific knowledge on the natural disease course, treatment outcomes and prognosis in these patients. An excellent method to detect patterns on an aggregate level that would not be possible to discover in individual cases, is a registry study. This paper aims to describe a template to create a successful international registry for rare diseases. We focus mainly on rare hepatic diseases, but lessons from this paper serve other fields in medicine, as well.

  11. Using registries to identify type 2 diabetes patients

    Directory of Open Access Journals (Sweden)

    Thomsen RW

    2014-12-01

    Full Text Available Reimar W Thomsen, Henrik Toft Sørensen Department of Clinical Epidemiology, Aarhus University Hospital, DenmarkValidation studies of health care registries are considered boring by some. An epidemiologist recently conducted a validation study based on the Danish National Registry of Patients and received the following unflattering comment from a reviewer: “A good example of a paper of limited scope that probably would only be published electronically where space is unlimited”. We do not subscribe to this point of view. See Original Research article

  12. Creating an effective clinical registry for rare diseases

    Science.gov (United States)

    D’Agnolo, Hedwig MA; Kievit, Wietske; Andrade, Raul J; Karlsen, Tom Hemming; Wedemeyer, Heiner

    2015-01-01

    The exposure of clinicians to patients with rare gastrointestinal diseases is limited. This hurts clinical studies, which impedes accumulation of scientific knowledge on the natural disease course, treatment outcomes and prognosis in these patients. An excellent method to detect patterns on an aggregate level that would not be possible to discover in individual cases, is a registry study. This paper aims to describe a template to create a successful international registry for rare diseases. We focus mainly on rare hepatic diseases, but lessons from this paper serve other fields in medicine, as well. PMID:27403298

  13. IVOA Recommendation: Registry Relational Schema Version 1.0

    CERN Document Server

    Demleitner, Markus; Molinaro, Marco; Greene, Gretchen; Dower, Theresa; Perdikeas, Menelaos

    2015-01-01

    Registries provide a mechanism with which VO applications can discover and select resources - first and foremost data and services - that are relevant for a particular scientific problem. This specification defines an interface for searching this resource metadata based on the IVOA's TAP protocol. It specifies a set of tables that comprise a useful subset of the information contained in the registry records, as well as the table's data content in terms of the XML VOResource data model. The general design of the system is geared towards allowing easy authoring of queries.

  14. Secondary prevention in cognitive frailty: the Treviso Dementia Registry

    Directory of Open Access Journals (Sweden)

    Maurizio Gallucci

    2016-09-01

    Full Text Available Dementia is one of the most disabling health conditions for older people. Increasing attention is paid to the preclinical phase such as cognitive frailty and mild cognitive impairment, and to the prevention programs designed to reduce the number of patients in the future. The aims of this brief report are therefore: i to illustrate an action plan currently active in Treviso and that is aimed at secondary prevention in cognitive frailty subjects on the Treviso Dementia (TREDEM Registry; ii to highlight the results achieved by the TREDEM Registry up to now and how these can be used in future research.

  15. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  16. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  17. An Intrusion Detection System Against UDP Flood Attack and Ping of Death Attack (DDOS in MANET

    Directory of Open Access Journals (Sweden)

    Ankur Ashok Acharya

    2016-04-01

    Full Text Available DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death attack are considered to be important as these two attacks may cause severe damage to the network. To provide better security to the network, efficient intrusion detection (IDS system is required to monitor the network continuously, keeping track of malicious activities and policy violations and produce report to the network administrator. UDP flood attack and ping of death attack are given importance in this paper as they are not well addressed in the existing research works. Packet capture and packet decoder is used to identify the packets and retrieve the packet details. A threshold is set for each node that is connected to the network. If the packet flow into the node exceeds the threshold that is set then the administrator is notified about the same.

  18. 78 FR 44625 - Proposed Information Collection (Open Burn Pit Registry Airborne Hazard Self-Assessment...

    Science.gov (United States)

    2013-07-24

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF VETERANS AFFAIRS Proposed Information Collection (Open Burn Pit Registry Airborne Hazard Self-Assessment.... 2900--NEW, Open Burn Pit Registry Airborne Hazard Self-Assessment Questionnaire,'' in...

  19. 78 FR 1825 - Notice of Establishment of an Animal and Plant Health Inspection Service Stakeholder Registry

    Science.gov (United States)

    2013-01-09

    ... Inspection Service Stakeholder Registry AGENCY: Animal and Plant Health Inspection Service, USDA. ACTION... Service stakeholder registry. FOR FURTHER INFORMATION CONTACT: Ms. Hallie Zimmers, Advisor for State and Stakeholder Relations, Legislative and Public Affairs, APHIS, room 1147, 1400 Independence Avenue...

  20. 77 FR 2126 - Pipeline Safety: Implementation of the National Registry of Pipeline and Liquefied Natural Gas...

    Science.gov (United States)

    2012-01-13

    ... Registry of Pipeline and Liquefied Natural Gas Operators AGENCY: Pipeline and Hazardous Materials Safety... registry of pipeline and liquefied natural gas operators. FOR FURTHER INFORMATION CONTACT: Jamerson Pender... 72878), titled: ``Pipeline Safety: Updates to Pipeline and Liquefied Natural Gas Reporting...

  1. The National Registry of Evidence-based Programs and Practices (NREPP)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The National Registry of Evidence-based Programs and Practices (NREPP) is a searchable online registry of mental health and substance abuse interventions that have...

  2. Rationale of Early Adopters of Fossil Fuel Divestment

    Science.gov (United States)

    Beer, Christopher Todd

    2016-01-01

    Purpose: This research uses the social science perspectives of institutions, ecological modernization and social movements to analyze the rationale used by the early-adopting universities of fossil fuel divestment in the USA. Design/methodology/approach: Through analysis of qualitative data from interviews with key actors at the universities that…

  3. Building "Applied Linguistic Historiography": Rationale, Scope, and Methods

    Science.gov (United States)

    Smith, Richard

    2016-01-01

    In this article I argue for the establishment of "Applied Linguistic Historiography" (ALH), that is, a new domain of enquiry within applied linguistics involving a rigorous, scholarly, and self-reflexive approach to historical research. Considering issues of rationale, scope, and methods in turn, I provide reasons why ALH is needed and…

  4. "ComPost": A Writing Program Newsletter and Its Rationale.

    Science.gov (United States)

    Hall, Dennis R.

    1993-01-01

    Discusses the development and rationale of "ComPost," a weekly newsletter of the Composition Program at the University of Louisville. Suggests that a vehicle like ComPost can promote the communications that contribute to accomplishing collegiality and genuine program consensus. (RS)

  5. Introducing ICT in Schools in England: Rationale and Consequences

    Science.gov (United States)

    Hammond, Michael

    2014-01-01

    This paper provides a critical perspective on the attempts to promote the use of information and communication technology (ICT) in teaching and learning in England. It describes the rationale given for the introduction of ICT in terms of its potential to impact on educational standards to contribute to developing a curriculum which has more…

  6. Karl Popper and Jean Piaget: A Rationale for Constructivism

    Science.gov (United States)

    Harlow, Steve; Cummings, Rhoda; Aberasturi, Suzanne M.

    2006-01-01

    The current faddish use of the term constructivism has taken on as many different definitions as the number of people attempting to define it. This essay clarifies the meaning of constructivism through an examination of Karl Popper's and Jean Piaget's theories. The authors provide a rationale for the use of Popper's paradigm of "Three Worlds" and…

  7. Hermeneutics framework: integration of design rationale and optimizing software modules

    NARCIS (Netherlands)

    Aksit, Mehmet; Malakuti, Somayeh

    2015-01-01

    To tackle the evolution challenges of adaptive systems, this paper argues on the necessity of hermeneutic approaches that help to avoid too early elimination of design alternatives. This visionary paper proposes the Hermeneutics Framework, which computationally integrates a design rationale manageme

  8. Stanton's "The Solitude of Self": A Rationale for Feminism.

    Science.gov (United States)

    Campbell, Karlyn Kohrs

    1980-01-01

    Examines Elizabeth Cady Stanton's speech, "The Solitude of Self," as a philosophical statement of the principles underlying the nineteenth century struggle for woman's rights in the United States. Analyzes the lyric structure and tone of the speech and its tragic, existential rationale for feminism. (JMF)

  9. A Rationale for Mixed Methods (Integrative) Research Programmes in Education

    Science.gov (United States)

    Niaz, Mansoor

    2008-01-01

    Recent research shows that research programmes (quantitative, qualitative and mixed) in education are not displaced (as suggested by Kuhn) but rather lead to integration. The objective of this study is to present a rationale for mixed methods (integrative) research programs based on contemporary philosophy of science (Lakatos, Giere, Cartwright,…

  10. Oral Health Promotion in Schools: Rationale and Evaluation

    Science.gov (United States)

    Kizito, Alex; Caitlin, Meredith; Wang, Yili; Kasangaki, Arabat; Macnab, Andrew J.

    2014-01-01

    Purpose: The purpose of this paper is to explain the rationale and potential for the WHO health promoting schools (HPS) to improve children's oral health, and describe validated quantitative methodologies and qualitative approaches to measure program impact. Design/Methodology/Approach: Critical discussion of the impact of poor oral health and…

  11. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  12. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  13. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  14. Accuracy of cryptorchidism diagnoses and corrective surgical treatment registration in the Danish National Patient Registry

    DEFF Research Database (Denmark)

    Jensen, M S; Snerum, T M Ø; Olsen, L H;

    2012-01-01

    In recent years several Danish studies of the etiology, time trends and long-term health consequences of cryptorchidism have relied on diagnoses and surgical treatments registered in the National Patient Registry. We evaluated the diagnostic accuracy of these registry data.......In recent years several Danish studies of the etiology, time trends and long-term health consequences of cryptorchidism have relied on diagnoses and surgical treatments registered in the National Patient Registry. We evaluated the diagnostic accuracy of these registry data....

  15. A report of the Malaysian dialysis registry of the National Renal Registry, Malaysia.

    Science.gov (United States)

    Lim, Y N; Lim, T O; Lee, D G; Wong, H S; Ong, L M; Shaariah, W; Rozina, G; Morad, Z

    2008-09-01

    The Malaysian National Renal Registry was set up in 1992 to collect data for patients on renal replacement therapy (RRT). We present here the report of the Malaysian dialysis registry. The objectives of this papar are: (1) To examine the overall provision of dialysis treatment in Malaysia and its trend from 1980 to 2006. (2) To assess the treatment rate according to the states in the country. (3) To describe the method, location and funding of dialysis. (4) To characterise the patients accepted for dialysis treatment. (5) To analyze the outcomes of the dialysis treatment. Data on patients receiving dialysis treatment were collected at initiation of dialysis, at the time of any significant outcome, as well as yearly. The number of dialysis patients increased from 59 in 1980 to almost 15,000 in 2006. The dialysis acceptance rate increased from 3 per million population in 1980 to 116 per million population in 2006, and the prevalence rate from 4 to 550 per million population over the same period. The economically advantaged states of Malaysia had much higher dialysis treatment rates compared to the less economically advanced states. Eighty to 90% of new dialysis patients were accepted into centre haemodialysis (HD), and the rest into the chronic ambulatory peritoneal dialysis (CAPD) programme. The government provided about half of the funding for dialysis treatment. Patients older than 55 years accounted for the largest proportion of new patients on dialysis since the 1990s. Diabetes mellitus has been the main cause of ESRD and accounted for more than 50% of new ESRD since 2002. Annual death rate averaged about 10% on HD and 15% on CAPD. The unadjusted 5-year patient survival on both HD and CAPD was about 80%. Fifty percent of dialysis patients reported very good median QoL index score. About 70% of dialysis patients were about to work full or part time. There has been a very rapid growth of dialysis provision in Malaysia particularly in the older age groups. ESRD

  16. Multiple Partial Attacks on Complex Networks

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We numerically investigate the effect of four kinds of partial attacks of multiple targets on the Barabási-Albert (BA) scale-free network and the Erd(o)s-Rényi (ER) random network.Comparing with the effect of single target complete knockout we find that partial attacks of multiple targets may produce an effect higher than the complete knockout of a single target on both BA scale-free network and ER random network.We also find that the BA ecale-free network seems to be more susceptible to multi-target partial attacks than the ER random network.

  17. Measuring a System’s Attack Surface

    Science.gov (United States)

    2004-01-01

    fold: • In terms of a state machine model of the system, we present formal definitions of attack, attack surface, and attack class. Our definitions are...versions. The rest of this paper is organized as follows. In Section 2, we introduce our state machine model and point out the key differences from...approach in Section 6 and compare it to related work in Section 7. We conclude in Section 8. 2 State Machine Model We use a state machine to model the

  18. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  19. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  20. Update on the NAS-NRC Twin Registry.

    Science.gov (United States)

    Page, William F

    2006-12-01

    The National Academy of Sciences-National Research Council (NAS-NRC) Twin Registry is one of the oldest, national population-based twin registries in the United States. It consists of 15,924 white male twin pairs born in the years 1917 to 1927 (inclusive), both of whom served in the armed forces, mostly during World War II. This article updates activity in this registry since the earlier 2002 article in Twin Research. The results of clinically based studies on dementia, Parkinson's disease, age-related macular degeneration, and primary osteoarthritis were published, as well as articles based on previously collected questionnaire data on chronic fatigue syndrome, functional limitations, and healthy aging. In addition, risk factor studies are being planned to merge clinical data with earlier collected risk factor data from questionnaires. Examination data from the subset of National Heart, Lung, and Blood Institute (NHLBI) twins resulted in a number of articles, including the relationship of endogenous sex hormones to coronary heart disease and morphological changes in aging brain structures. The NEO Five-Factor Personality Inventory (a paper-and-pencil self-administered questionnaire) has been fielded for the first time. A push to consolidate the various data holdings of the registry is being made.

  1. hPSCreg—the human pluripotent stem cell registry

    Science.gov (United States)

    Seltmann, Stefanie; Lekschas, Fritz; Müller, Robert; Stachelscheid, Harald; Bittner, Marie-Sophie; Zhang, Weiping; Kidane, Luam; Seriola, Anna; Veiga, Anna; Stacey, Glyn; Kurtz, Andreas

    2016-01-01

    The human pluripotent stem cell registry (hPSCreg), accessible at http://hpscreg.eu, is a public registry and data portal for human embryonic and induced pluripotent stem cell lines (hESC and hiPSC). Since their first isolation the number of hESC lines has steadily increased to over 3000 and new iPSC lines are generated in a rapidly growing number of laboratories as a result of their potentially broad applicability in biomedicine and drug testing. Many of these lines are deposited in stem cell banks, which are globally established to store tens of thousands of lines from healthy and diseased donors. The Registry provides comprehensive and standardized biological and legal information as well as tools to search and compare information from multiple hPSC sources and hence addresses a translational research need. To facilitate unambiguous identification over different resources, hPSCreg automatically creates a unique standardized name for each cell line registered. In addition to biological information, hPSCreg stores extensive data about ethical standards regarding cell sourcing and conditions for application and privacy protection. hPSCreg is the first global registry that holds both, manually validated scientific and ethical information on hPSC lines, and provides access by means of a user-friendly, mobile-ready web application. PMID:26400179

  2. hPSCreg--the human pluripotent stem cell registry.

    Science.gov (United States)

    Seltmann, Stefanie; Lekschas, Fritz; Müller, Robert; Stachelscheid, Harald; Bittner, Marie-Sophie; Zhang, Weiping; Kidane, Luam; Seriola, Anna; Veiga, Anna; Stacey, Glyn; Kurtz, Andreas

    2016-01-04

    The human pluripotent stem cell registry (hPSCreg), accessible at http://hpscreg.eu, is a public registry and data portal for human embryonic and induced pluripotent stem cell lines (hESC and hiPSC). Since their first isolation the number of hESC lines has steadily increased to over 3000 and new iPSC lines are generated in a rapidly growing number of laboratories as a result of their potentially broad applicability in biomedicine and drug testing. Many of these lines are deposited in stem cell banks, which are globally established to store tens of thousands of lines from healthy and diseased donors. The Registry provides comprehensive and standardized biological and legal information as well as tools to search and compare information from multiple hPSC sources and hence addresses a translational research need. To facilitate unambiguous identification over different resources, hPSCreg automatically creates a unique standardized name for each cell line registered. In addition to biological information, hPSCreg stores extensive data about ethical standards regarding cell sourcing and conditions for application and privacy protection. hPSCreg is the first global registry that holds both, manually validated scientific and ethical information on hPSC lines, and provides access by means of a user-friendly, mobile-ready web application.

  3. Retinoblastoma Registry report--Hospital Kuala Lumpur experience.

    Science.gov (United States)

    Jamalia, R; Sunder, R; Alagaratnam, J; Goh, P P

    2010-06-01

    Retinoblastoma is a childhood ocular cancer. The aim of this paper is to describe the clinical and epidemiological characteristics of patients with retinoblastoma in a major paediatric ophthalmology center in the country. Retrospective information was collected through the retinoblastoma registry. Late presentation with advanced staging is a major problem.

  4. Implementation and Analysis of Initial Trauma Registry in Iquitos, Peru

    Directory of Open Access Journals (Sweden)

    Vincent Duron

    2016-10-01

    Full Text Available Background: In Peru, 11% of deaths are due to trauma. Iquitos is a large underserved Peruvian city isolated from central resources by its geography. Our objective was to implement a locally driven trauma registry to sustainably improve trauma healthcare in this region. Methods: All trauma patients presenting to the main regional referral hospital were included in the trauma registry. A pilot study retrospectively analyzed data from the first two months after implementation. Results: From March to April 2013, 572 trauma patients were entered into the database. Average age was 26.9 years. Ten percent of patients presented more than 24 hours after injury. Most common mechanisms of injury were falls (25.5%, motor vehicle collisions (23.3%, and blunt assault (10.5%. Interim analysis revealed that 99% of patients were entered into the database. However, documentation of vital signs was poor: 42% of patients had temperature, 26% had oxygen saturation documented. After reporting to registry staff, a significant increase in temperature (42 to 97%, P < 0.001 and oxygen saturation (26 to 92%, P < 0.001 documentation was observed. Conclusion: A trauma registry is possible to implement in a resource-poor setting. Future efforts will focus on analysis of data to enhance prevention and treatment of injuries in Iquitos.

  5. The European Registry for Patients with Mechanical Circulatory Support (EUROMACS)

    DEFF Research Database (Denmark)

    de By, Theo M M H; Mohacsi, Paul; Gummert, Jan

    2015-01-01

    other founding international members. It aims to promote scientific research to improve care of end-stage heart failure patients with ventricular assist device or a total artificial heart as long-term mechanical circulatory support. Likewise, the organization aims to provide and maintain a registry...

  6. BioSWR--semantic web services registry for bioinformatics.

    Directory of Open Access Journals (Sweden)

    Dmitry Repchevsky

    Full Text Available Despite of the variety of available Web services registries specially aimed at Life Sciences, their scope is usually restricted to a limited set of well-defined types of services. While dedicated registries are generally tied to a particular format, general-purpose ones are more adherent to standards and usually rely on Web Service Definition Language (WSDL. Although WSDL is quite flexible to support common Web services types, its lack of semantic expressiveness led to various initiatives to describe Web services via ontology languages. Nevertheless, WSDL 2.0 descriptions gained a standard representation based on Web Ontology Language (OWL. BioSWR is a novel Web services registry that provides standard Resource Description Framework (RDF based Web services descriptions along with the traditional WSDL based ones. The registry provides Web-based interface for Web services registration, querying and annotation, and is also accessible programmatically via Representational State Transfer (REST API or using a SPARQL Protocol and RDF Query Language. BioSWR server is located at http://inb.bsc.es/BioSWR/and its code is available at https://sourceforge.net/projects/bioswr/under the LGPL license.

  7. 40 CFR 799.5025 - Testing consent orders for mixtures without Chemical Abstracts Service Registry Numbers.

    Science.gov (United States)

    2010-07-01

    ... without Chemical Abstracts Service Registry Numbers. 799.5025 Section 799.5025 Protection of Environment... orders for mixtures without Chemical Abstracts Service Registry Numbers. This section sets forth a list of mixtures (with no Chemical Abstracts Service Registry Numbers) which are the subject of...

  8. 78 FR 54956 - Agency Information Collection (Open Burn Pit Registry Airborne Hazard Self-Assessment...

    Science.gov (United States)

    2013-09-06

    ... AFFAIRS Agency Information Collection (Open Burn Pit Registry Airborne Hazard Self-Assessment....rennie@va.gov . Please refer to ``OMB Control No. 2900-NEW, Open Burn Pit Registry Airborne Hazard Self-Assessment Questionnaire.'' SUPPLEMENTARY INFORMATION: Title: Open Burn Pit Registry Airborne Hazard...

  9. 78 FR 33894 - Proposed Information Collection (Open Burn Pit Registry Airborne Hazard Self-Assessment...

    Science.gov (United States)

    2013-06-05

    ... Collection (Open Burn Pit Registry Airborne Hazard Self-Assessment Questionnaire) Activity: Comment Request... forms of information technology. Title: Open Burn Pit Registry Airborne Hazard Self-Assessment...@va.gov . Please refer to ``OMB Control No. 2900-NEW, Open Burn Pit Registry Airborne Hazard...

  10. 76 FR 72424 - Submission for OMB Review; Comment Request Information Program on the Genetic Testing Registry

    Science.gov (United States)

    2011-11-23

    ... Submission for OMB Review; Comment Request Information Program on the Genetic Testing Registry AGENCY... Genetic Testing Registry; Type of Information Collection Request: New collection; Need and Use of... tests. The Genetic Testing Registry (GTR) will provide a centralized, online location for...

  11. Limitations of drug registries to evaluate orphan medicinal products for the treatment of lysosomal storage disorders

    NARCIS (Netherlands)

    Hollak, C.E.M.; Aerts, J.M.F.G.; Aymé, S.; Manuel, J.

    2011-01-01

    Orphan drugs are often approved under exceptional circumstances, requiring submission of additional data on safety and effectiveness through registries. These registries are mainly focused on one drug only and data is frequently incomplete. Some registries also address phenotypic heterogeneity and n

  12. Improving Diabetes Outcomes Using a Web-Based Registry and Interactive Education: A Multisite Collaborative Approach

    Science.gov (United States)

    Morrow, Robert W.; Fletcher, Jason; Kelly, Kim F.; Shea, Laura A.; Spence, Maureen M.; Sullivan, Janet N.; Cerniglia, Joan R.; Yang, YoonJung

    2013-01-01

    Introduction: To support the adoption of guideline concordant care by primary care practices, the New York Diabetes Coalition (NYDC) promoted use of an electronic diabetes registry and developed an interactive educational module on using the registry and improving patient communication. The NYDC hypothesized that use of a registry with immediate…

  13. 77 FR 16471 - Pipeline Safety: Implementation of the National Registry of Pipeline and Liquefied Natural Gas...

    Science.gov (United States)

    2012-03-21

    ...: Implementation of the National Registry of Pipeline and Liquefied Natural Gas Operators AGENCY: Pipeline and... registry of pipeline and liquefied natural gas operators. This notice provides updates to the information... and liquefied natural gas (LNG) operators. New operators use the national registry to obtain...

  14. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks ... symptoms are called silent heart attacks. Most Common Symptoms The most common warning symptoms of a heart ...

  15. The Toxicology Investigators Consortium Case Registry--the 2012 experience.

    Science.gov (United States)

    Wiegand, Timothy; Wax, Paul; Smith, Eric; Hart, Katherine; Brent, Jeffrey

    2013-12-01

    In 2010, the American College of Medical Toxicology (ACMT) established its Case Registry, the Toxicology Investigators Consortium (ToxIC). All cases are entered prospectively and include only suspected and confirmed toxic exposures cared for at the bedside by board-certified or board-eligible medical toxicologists at its participating sites. The primary aims of establishing this Registry include the development of a realtime toxico-surveillance system in order to identify and describe current or evolving trends in poisoning and to develop a research tool in toxicology. ToxIC allows for extraction of data from medical records from multiple sites across a national and international network. All cases seen by medical toxicologists at participating institutions were entered into the database. Information characterizing patients entered in 2012 was tabulated and data from the previous years including 2010 and 2011 were included so that cumulative numbers and trends could be described as well. The current report includes data through December 31st, 2012. During 2012, 38 sites with 68 specific institutions contributed a total of 7,269 cases to the Registry. The total number of cases entered into the Registry at the end of 2012 was 17,681. Emergency departments remained the most common source of consultation in 2012, accounting for 61 % of cases. The most common reason for consultation was for pharmaceutical overdose, which occurred in 52 % of patients including intentional (41 %) and unintentional (11 %) exposures. The most common classes of agents were sedative-hypnotics (1,422 entries in 13 % of cases) non-opioid analgesics (1,295 entries in 12 % of cases), opioids (1,086 entries in 10 % of cases) and antidepressants (1,039 entries in 10 % of cases). N-acetylcysteine (NAC) was the most common antidote administered in 2012, as it was in previous years, followed by the opioid antagonist naloxone, sodium bicarbonate, physostigmine and flumazenil. Anti-crotalid Fab

  16. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  17. Developing a provisional and national renal disease registry for Iran

    Directory of Open Access Journals (Sweden)

    Sima Ajami

    2015-01-01

    Full Text Available Background: Disease registry is a database that includes information about people suffering a special kind of disease. The aim of this study was to first identify and compare the National Renal Disease Registry (NRDR characteristics in some countries with Iran; and second, develop a provisional and NRDR for Iran. Materials and Methods: Retrieval of data of the NRDR was performed by scholars responsible in related agencies, including the Ministry of Health and Medical Education, Renal Disease charity, and data registries in the United States, United Kingdom, Malaysia, and Iran. This research was applied, and the study was descriptive-comparative. The study population consisted of the NRDR in selected countries in which data were collected by forms that were designed according to the study objectives. Sources of data were researchers, articles, books, journals, databases, websites, related documents, and people who are active in this regard, and related agencies, including the Ministry of Health and Medical Education, and patient support charity. The researchers collected data for each country based on the study objectives and then put them in comparative tables. Data were analyzed by descriptive, comparative, and theoretical methods. Results: Most of the renal transplant teams report their own results as a single center experiences. America and Britain have a preeminent national registry of renal disease compared to other countries. Conclusion: Given that control, prevention, and treatment of chronic renal diseases incur high expenses and the disease is one of leading mortality factors in Iran and across the world and since national registry system for chronic renal diseases can provide better tools and strategies to manage and evaluate patients′ characteristics as well as risk factors which eventually leads to making better decisions.

  18. Rapid Deployment Aortic Replacement (RADAR) Registry in Spain: a protocol

    Science.gov (United States)

    Cal-Purriños, Natalia; Arribas-Leal, Jose M; Carnero-Alcazar, Manuel; Gutierrez-Diez, Jose F; Cuenca-Castillo, Jose J

    2017-01-01

    Introduction Rapid deployment valves (RDV) represent a newly introduced approach to aortic valve replacement which facilitates surgical implantation and minimally invasive techniques, shortens surgical times and shows excellent haemodynamic performance. However, evidence on their safety, efficacy and potential complications is mostly fitted with small-volume and retrospective studies. Moreover, no current guidelines exist. To improve our knowledge on this technology, The Rapid Deployment Aortic Replacement (RADAR) Registry will be established across Spain with the aim of assessing RDV outcomes in the real-world setting. Methods and analysis The RADAR Registry is designed as a product registry that would provide information on its use and outcomes in clinical practice. This multicentre, prospective, national effort will initially involve 4 centres in Spain. Any patient undergoing cardiac surgery for aortic valve replacement and receiving an RDV as an isolated operation or in combination with other cardiac procedures may be included. Participation is voluntary. Data collection is equal to information obtained during standard care and is prospectively entered by the participating physicians perioperatively and during subsequent follow-up visits. The primary outcome assessed is in-hospital and up to 5 years of follow-up, prosthetic valve functioning and clinical status. Secondary outcomes are to perform subgroup analysis, to compare outcomes with other existing approaches and to develop future clinical guidelines. The follow-up assessments are timed with routine clinical appointments. Dissociated data will be extracted and collectively analysed. Initial target sample size for the registry is 500 participants entered with complete follow-up information. Different substudies will be implemented within the registry to investigate specific populations undergoing aortic valve replacement. Ethics and dissemination The protocol is approved by all local institutional ethics

  19. Inception of a national multidisciplinary registry for stereotactic radiosurgery.

    Science.gov (United States)

    Sheehan, Jason P; Kavanagh, Brian D; Asher, Anthony; Harbaugh, Robert E

    2016-01-01

    Stereotactic radiosurgery (SRS) represents a multidisciplinary approach to the delivery of ionizing high-dose radiation to treat a wide variety of disorders. Much of the radiosurgical literature is based upon retrospective single-center studies along with a few randomized controlled clinical trials. More timely and effective evidence is needed to enhance the consistency and quality of and clinical outcomes achieved with SRS. The authors summarize the creation and implementation of a national SRS registry. The American Association of Neurological Surgeons (AANS) through NeuroPoint Alliance, Inc., started a successful registry effort with its lumbar spine initiative. Following a similar approach, the AANS and NeuroPoint Alliance collaborated with corporate partners and the American Society for Radiation Oncology to devise a data dictionary for an SRS registry. Through administrative and financial support from professional societies and corporate partners, a framework for implementation of the registry was created. Initial plans were devised for a 3-year effort encompassing 30 high-volume SRS centers across the country. Device-specific web-based data-extraction platforms were built by the corporate partners. Data uploaders were then used to port the data to a common repository managed by Quintiles, a national and international health care trials company. Audits of the data for completeness and veracity will be undertaken by Quintiles to ensure data fidelity. Data governance and analysis are overseen by an SRS board comprising equal numbers of representatives from the AANS and NeuroPoint Alliance. Over time, quality outcome assessments and post hoc research can be performed to advance the field of SRS. Stereotactic radiosurgery offers a high-technology approach to treating complex intracranial disorders. Improvements in the consistency and quality of care delivered to patients who undergo SRS should be afforded by the national registry effort that is underway.

  20. Home enteral nutrition in Spain: NADYA registry 2011-2012

    Directory of Open Access Journals (Sweden)

    Carmina Wanden-Berghe

    2014-06-01

    Full Text Available Objective: To describe the results of the home enteral nutrition (HEN registry of the NADYA-SENPE group in 2011 and 2012. Material and methods: We retrieved the data of the patients recorded from January 1st 2011 to December 31st 2012. Results: There were 3021 patients in the registry during the period from 29 hospitals, which gives 65.39 per million inhabitants. 97.95% were adults, 51.4% male. Mean age was 67.64 ± 19.1, median age was 72 years for adults and 7 months for children. Median duration with HEN was 351 days and for 97.5% was their first event with HEN. Most patients had HEN because of neurological disease (57.8%. Access route was nasogastric tube for 43.5% and gastrostomy for 33.5%. Most patients had limited activity level and, concerning autonomy, 54.8% needed total help. Nutritional formula was supplied from chemist's office to 73.8% of patients and disposables, when necessary, was supplied from hospitals to 53.8% of patients. HEN was finished for 1,031 patients (34.1% during the period of study, 56.6% due to decease and 22.2% due to recovery of oral intake. Conclusions: Data from NADYA-SENPE registry must be explained cautiously because it is a non-compulsory registry. In spite of the change in the methodology of the registry in 2010, tendencies regarding HEN have been maintained, other than oral route.

  1. Taxonomy of SSL/TLS Attacks

    Directory of Open Access Journals (Sweden)

    Keerthi Vasan K.

    2016-02-01

    Full Text Available Secure Socket Layer (SSL and Transport Layer Security (TLS protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.

  2. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  3. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  4. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  5. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  6. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  7. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  8. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... medicines also keep existing clots from getting larger. Beta blockers . Beta blockers decrease your heart’s workload. These medicines also are ... discomfort and to help prevent another heart attack. Beta blockers also are used to treat arrhythmias (irregular heartbeats). ...

  9. Preventing Coordinated Attacks Via Distributed Alert Exchange

    CERN Document Server

    Garcia-Alfaro, Joaquin; Muehl, Gero; Borrell, Joan

    2008-01-01

    Attacks on information systems followed by intrusions may cause large revenue losses. The prevention of both is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to recognize and react to the different actions of such an attack. The design and deployment of a decentralized system targeted at detecting as well as reacting to information system attacks might benefit from the loose coupling realized by publish/subscribe middleware. In this paper, we present the advantages and convenience in using this communication paradigm for a general decentralized attack prevention framework. Furthermore, we present the design and implementation of our approach based on existing publish/subscribe middleware and evaluate our approach for GNU/Linux systems.

  10. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  11. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  12. Study Shows How Zika Attacks Infant Brain

    Science.gov (United States)

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  13. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  14. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  15. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  16. Cohort Profile: The National Academy of Sciences-National Research Council Twin Registry (NAS-NRC Twin Registry).

    Science.gov (United States)

    Gatz, Margaret; Harris, Jennifer R; Kaprio, Jaakko; McGue, Matt; Smith, Nicholas L; Snieder, Harold; Spiro, Avron; Butler, David A

    2015-06-01

    The National Academy of Sciences-National Research Council Twin Registry (NAS-NRC Twin Registry) is a comprehensive registry of White male twin pairs born in the USA between 1917 and 1927, both of the twins having served in the military. The purpose was medical research and ultimately improved clinical care. The cohort was assembled in the early 1960s with identification of approximately 16,000 twin pairs, review of service records, a brief mailed questionnaire assessing zygosity, and a health survey largely comparable to questionnaires used at that time with Scandinavian twin registries. Subsequent large-scale data collection occurred in 1974, 1985 and 1998, repeating the health survey and including information on education, employment history and earnings. Self-reported data have been supplemented with mortality, disability and medical data through record linkage. Potential collaborators should access the study website [http://www.iom.edu/Activities/Veterans/TwinsStudy.aspx] or e-mail the Medical Follow-up Agency at [Twins@nas.edu]. Questionnaire data are being prepared for future archiving with the National Archive of Computerized Data on Aging (NACDA) at the Inter-University Consortium for Political and Social Research (ICPSR), University of Michigan, MI.

  17. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  18. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment...... sequences to treat four moderate-to-severe migraine attacks. Control patients received placebo for three attacks and telcagepant 140 mg for one attack. Efficacy for the first attack (Attack 1) and consistency of efficacy over multiple attacks were assessed. For an individual patient, consistent efficacy...

  19. Heart Attack Prediction System Based Neural Arbitration

    OpenAIRE

    Helwan, Abdulkader

    2015-01-01

    Heart attack is an asymptomatic and epidemic medical condition that may suddenly occur and causes “death”. Therefore, it is a life-threatening condition and it should be detected before it occurs. Heart attack is so far predicted using the conventional ways of doctor’s examination and by performing some medical tests such as stress test, ECG, and heart CTScan etc. The coronary vessels constriction, the cholesterol levels in the arteries, and other attributes can be good indicators for making ...

  20. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  1. 9/11-Related Experiences and Tasks of Landfill and Barge Workers: Qualitative Analysis from the World Trade Center Health Registry

    Directory of Open Access Journals (Sweden)

    Cone James E

    2011-05-01

    Full Text Available Abstract Background Few studies have documented the experiences of individuals who participated in the recovery and cleanup efforts at the World Trade Center Recovery Operation at Fresh Kills Landfill, on debris loading piers, and on transport barges after the September 11, 2001 terrorist attack. Methods Semi-structured telephone interviews were conducted with a purposive sample of workers and volunteers from the World Trade Center Health Registry. Qualitative methods were used to analyze the narratives. Results Twenty workers and volunteers were interviewed. They described the transport of debris to the Landfill via barges, the tasks and responsibilities associated with their post-9/11 work at the Landfill, and their reflections on their post-9/11 experiences. Tasks included sorting through debris, recovering human remains, searching for evidence from the terrorist attacks, and providing food and counseling services. Exposures mentioned included dust, fumes, and odors. Eight years after the World Trade Center disaster, workers expressed frustration about poor risk communication during recovery and cleanup work. Though proud of their contributions in the months after 9/11, some participants were concerned about long-term health outcomes. Conclusions This qualitative study provided unique insight into the experiences, exposures, and concerns of understudied groups of 9/11 recovery and cleanup workers. The findings are being used to inform the development of subsequent World Trade Center Health Registry exposure and health assessments.

  2. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  3. Diagnostic Yield and Complications of Bronchoscopy for Peripheral Lung Lesions. Results of the AQuIRE Registry

    Science.gov (United States)

    Ernst, Armin; Lei, Xiudong; Kovitz, Kevin L.; Benzaquen, Sadia; Diaz-Mendoza, Javier; Greenhill, Sara; Toth, Jennifer; Feller-Kopman, David; Puchalski, Jonathan; Baram, Daniel; Karunakara, Raj; Jimenez, Carlos A.; Filner, Joshua J.; Morice, Rodolfo C.; Eapen, George A.; Michaud, Gaetane C.; Estrada-Y-Martin, Rosa M.; Rafeq, Samaan; Grosu, Horiana B.; Ray, Cynthia; Gilbert, Christopher R.; Yarmus, Lonny B.; Simoff, Michael

    2016-01-01

    Rationale: Advanced bronchoscopy techniques such as electromagnetic navigation (EMN) have been studied in clinical trials, but there are no randomized studies comparing EMN with standard bronchoscopy. Objectives: To measure and identify the determinants of diagnostic yield for bronchoscopy in patients with peripheral lung lesions. Secondary outcomes included diagnostic yield of different sampling techniques, complications, and practice pattern variations. Methods: We used the AQuIRE (ACCP Quality Improvement Registry, Evaluation, and Education) registry to conduct a multicenter study of consecutive patients who underwent transbronchial biopsy (TBBx) for evaluation of peripheral lesions. Measurements and Main Results: Fifteen centers with 22 physicians enrolled 581 patients. Of the 581 patients, 312 (53.7%) had a diagnostic bronchoscopy. Unadjusted for other factors, the diagnostic yield was 63.7% when no radial endobronchial ultrasound (r-EBUS) and no EMN were used, 57.0% with r-EBUS alone, 38.5% with EMN alone, and 47.1% with EMN combined with r-EBUS. In multivariate analysis, peripheral transbronchial needle aspiration (TBNA), larger lesion size, nonupper lobe location, and tobacco use were associated with increased diagnostic yield, whereas EMN was associated with lower diagnostic yield. Peripheral TBNA was used in 16.4% of cases. TBNA was diagnostic, whereas TBBx was nondiagnostic in 9.5% of cases in which both were performed. Complications occurred in 13 (2.2%) patients, and pneumothorax occurred in 10 (1.7%) patients. There were significant differences between centers and physicians in terms of case selection, sampling methods, and anesthesia. Medical center diagnostic yields ranged from 33 to 73% (P = 0.16). Conclusions: Peripheral TBNA improved diagnostic yield for peripheral lesions but was underused. The diagnostic yields of EMN and r-EBUS were lower than expected, even after adjustment. PMID:26367186

  4. Medical complications in patients with stroke: data validity in a stroke registry and a hospital discharge registry

    Directory of Open Access Journals (Sweden)

    Annette Ingeman

    2010-03-01

    Full Text Available Annette Ingeman1, Grethe Andersen2, Heidi H Hundborg1, Søren P Johnsen11Department of Clinical Epidemiology, 2Department of Neurology, Aarhus University Hospital, DenmarkBackground: Stroke patients frequently experience medical complications; yet, data on incidence, causes, and consequences are sparse.Objective: To examine the data validity of medical complications among patients with stroke in a population-based clinical registry and a hospital discharge registry.Methods: We examined the predictive values, sensitivity and specificity of medical complications among patients admitted to specialized stroke units and registered in the Danish National Indicator Project (DNIP and the Danish National Registry of Patients (NRP between January 2003 and December 2006 (n = 8,024. We retrieved and reviewed medical records from a random sample of patients (n = 589, 7.3%.Results: We found substantial variation in the data quality of stroke-related medical complication diagnoses both within the specific complications and between the registries. The positive predictive values ranged from 39.0%–87.1% in the DNIP, and from 0.0%–92.9% in the NRP. The negative predictive values ranged from 71.6%–98.9% in the DNIP and from 63.3% to 97.4% in the NRP. In both registries the specificity of the diagnoses was high. The sensitivity ranged from 23.5% (95% confidence interval [CI]: 14.9–35.4 for falls to 62.9% (95% CI: 54.9–70.4 for urinary infection in the DNIP, and from 0.0 (95% CI: 0.0–4.99 for falls to 18.1% (95% CI: 2.3–51.8 for pressure ulcer in the NRP.Conclusion: The DNIP may be useful for studying medical complications among patients with stroke.Keywords: stroke, medical complications, data validity, clinical database

  5. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the

  6. Use of Data from Multiple Registries in Studying Biologic Discontinuation: Challenges and Opportunities

    Science.gov (United States)

    Yoshida, Kazuki; Radner, Helga; Kavanaugh, Arthur; Sung, Yoon-Kyoung; Bae, Sang-Cheol; Kishimoto, Mitsumasa; Matsui, Kazuo; Okada, Masato; Tohma, Shigeto; Weinblatt, Michael E.; Solomon, Daniel H.

    2016-01-01

    Many biologic disease-modifying antirheumatic drug (DMARD) discontinuation studies have been conducted, but mainly in trial settings which result in limited generalizability. Registry studies can complement the current literature of biologic DMARD discontinuation by providing more generalizable information. However, registries may need to be combined to increase power and provide a more diverse patient population. This increased power could provide us information about risk and benefits of discontinuing biologic DMARD in typical clinical practice. However, use of multiple registries is not without challenges. In this review, we discuss the challenges to combining data across multiple registries, focusing on biologic discontinuation as an example. Challenges include: 1) generalizability of each registry; 2) new versus prevalent users designs; 3) outcome definitions; 4) different health care systems; 5) different follow up intervals; and 6) data harmonization. The first three apply to each registry, and the last three apply to combining multiple registries. This review describes these challenges, corresponding solutions, and potential future opportunities. PMID:24129133

  7. Supporting awareness in creative group work by exposing design rationale

    Directory of Open Access Journals (Sweden)

    Umer Farooq

    2011-01-01

    Full Text Available When creativity is taken as a long-term, complex, and collaborative activity, support for awareness is required for group members to monitor the development of ideas, track how these ideas became narrowed, and understand how alternatives are being implemented and integrated by colleagues. In this paper, we investigate the effects of exposing design rationale to convey awareness, specifically activity awareness, in group creativity. Through evaluating a prototype, we investigate status updates that convey design rationale, and to what consequences, in small groups in fully distributed collaboration. We found that status updates are used for a variety of purposes and that participants’ comments on their collaborators’ status updates provided feedback. Overall, results suggest that participants’ awareness about their collaborators’ future plans increased over time. Majority of participants found the status updates useful, particularly those with higher metacognitive knowledge. Based on our results, two design strategies for activity awareness are proposed.

  8. Defense Acquistion: Rationale for Imposing Domestic Source Restrictions.

    Science.gov (United States)

    2007-11-02

    retained the restriction for polyacrylonitrile-based carbon fiber, periscope tube forgings, bull gear ring forgings, and ship propulsion shaft...forgings 1984 Protect sensitive data Ship propulsion shaft forgings 1984 Unsettled conditions among suppliers In its reviews of industrial base... Ship Propulsion Shafts 14 14 15 16 17 Appendix III Rationale for 10 U.S.C. 2534-Imposed Restrictions Buses Chemical Weapons Antidote

  9. Who Should Benefit from REDD+? Rationales and Realities

    Directory of Open Access Journals (Sweden)

    Cecilia Luttrell

    2013-12-01

    Full Text Available Benefit-sharing mechanisms are a central design aspect of REDD+ because they help to create the necessary incentives to reduce carbon emissions. However, if stakeholders do not perceive the benefit sharing as fair, the legitimacy of REDD+, and support for the mechanism, will be weakened. In this paper, drawing on data from CIFOR's Global Comparative Study on REDD+, we analyze national policy processes in 6 countries and incipient benefit-sharing arrangements in 21 REDD+ project sites. Through our analysis of current practices and debates, we identify six rationales that have been put forward to justify how benefits should be distributed and to whom. These rationales encompass a range of perspectives. Some hold that benefit sharing should be related to actual carbon emission reductions or to costs incurred in achieving the reduction of emissions; others emphasize the importance of a legal right to benefit, the need to consider aspects such as poverty reduction or the appropriateness of rewarding those with a history of protecting the forest. Each rationale has implications for the design of benefit-sharing mechanisms and the equity of their outcomes. We point out that, given the wide range of rationales and interests at play, the objectives of REDD+ and benefit sharing must be clearly established and the term "benefit" defined before effective benefit-sharing mechanisms can be designed. For stakeholders to support REDD+, the legitimacy of decision-making institutions, consideration of context, and attention to process are critical. Building legitimacy requires attention not only to fair distributional outcomes but also to consensus on relevant institutions' authority to make decisions and to procedural equity.

  10. Safety and efficacy of intensive vs. guideline antiplatelet therapy in high-risk patients with recent ischemic stroke or transient ischemic attack

    DEFF Research Database (Denmark)

    Christensen, Hanne Krarup

    2015-01-01

    ischemic stroke or transient ischemic attack. Randomization and data collection are performed over a secure Internet site with real-time data validation and concealment of allocation. Outcomes, serious adverse events, and neuroimaging are adjudicated centrally with blinding to treatment allocation. STUDY......RATIONALE: The risk of recurrence following a stroke or transient ischemic attack is high, especially immediately after the event. HYPOTHESIS: Because two antiplatelet agents are superior to one in patients with non-cardioembolic events, more intensive treatment might be even more effective. SAMPLE...... (bleeding, death, serious adverse events). DISCUSSION: The trial has recruited more than 50% of its target sample size (latest number: 2399) and is running in 104 sites in 4 countries. One-third of patients presented with a transient ischemic attack....

  11. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  12. Piezoelectric hydrogen bonding: computational screening for a design rationale.

    Science.gov (United States)

    Werling, Keith A; Griffin, Maryanne; Hutchison, Geoffrey R; Lambrecht, Daniel S

    2014-09-01

    Organic piezoelectric materials are promising targets in applications such as energy harvesting or mechanical sensors and actuators. In a recent paper (Werling, K. A.; et al. J. Phys. Chem. Lett. 2013, 4, 1365-1370), we have shown that hydrogen bonding gives rise to a significant piezoelectric response. In this article, we aim to find organic hydrogen bonded systems with increased piezo-response by investigating different hydrogen bonding motifs and by tailoring the hydrogen bond strength via functionalization. The largest piezo-coefficient of 23 pm/V is found for the nitrobenzene-aniline dimer. We develop a simple, yet surprisingly accurate rationale to predict piezo-coefficients based on the zero-field compliance matrix and dipole derivatives. This rationale increases the speed of first-principles piezo-coefficient calculations by an order of magnitude. At the same time, it suggests how to understand and further increase the piezo-response. Our rationale also explains the remarkably large piezo-response of 150 pm/V and more for another class of systems, the "molecular springs" (Marvin, C.; et al. J. Phys. Chem. C 2013, 117, 16783-16790.).

  13. Patient and Provider Assessment of Lipid Management Registry

    Science.gov (United States)

    2016-02-15

    Hyperlipidemia; Hypercholesterolemia; Cardiovascular Disease; Diabetes; Chronic Kidney Disease (CKD); Hypertension; Smoking; Myocardial Infarction (MI); Unstable Angina; Angina; Coronary Artery Disease (CAD); Stroke; Transient Ischemic Attack (TIA); Carotid Stenosis; Peripheral Arterial Disease; Atherosclerosis; Claudication

  14. The use of databases and registries to enhance colonoscopy quality.

    Science.gov (United States)

    Logan, Judith R; Lieberman, David A

    2010-10-01

    Administrative databases, registries, and clinical databases are designed for different purposes and therefore have different advantages and disadvantages in providing data for enhancing quality. Administrative databases provide the advantages of size, availability, and generalizability, but are subject to constraints inherent in the coding systems used and from data collection methods optimized for billing. Registries are designed for research and quality reporting but require significant investment from participants for secondary data collection and quality control. Electronic health records contain all of the data needed for quality research and measurement, but that data is too often locked in narrative text and unavailable for analysis. National mandates for electronic health record implementation and functionality will likely change this landscape in the near future.

  15. Heredity In Sarcoidosis - A Registry-Based Twin Study

    DEFF Research Database (Denmark)

    Sverrild, Asger; Backer, Vibeke; Kyvik, Kirsten Ohm

    2008-01-01

    of sarcoidosis in order to assess the overall contribution of genetic factors to the disease susceptibility. METHODS: Monozygotic and dizygotic twins enrolled in either the Danish or the Finnish population-based, national Twin Cohorts (61,662 pairs in total) were linked to diagnostic information on sarcoidosis...... obtained from the Danish National Patient Registry or the Social Insurance Institution, Finland, registry of re-imbursed medication using the 8th and 10th editions of the International Classification of Diseases. Fisher's exact test was used to compare probandwise concordance rates in different zygosity.......45-0.80). CONCLUSIONS: This study suggests that genetic factors play an important role in the susceptibility to sarcoidosis. This result should encourage the search for molecular genetic markers of the susceptibility to disease....

  16. Nanotubes Motion on Layered Materials: A Registry Perspective

    CERN Document Server

    Oz, Inbal; Itkin, Yaron; Buchwalter, Asaf; Akulov, Katherine; Hod, Oded

    2015-01-01

    At dry and clean material junctions of rigid materials the corrugation of the sliding energy landscape is dominated by variations of Pauli repulsions. These occur when electron clouds centered around atoms in adjacent layers overlap as they slide across each other. In such cases there exists a direct relation between interfacial surface (in)commensurability and superlubricity, a frictionless and wearless tribological state. The Registry Index is a purely geometrical parameter that quanti?es the degree of interlayer commensurability, thus providing a simple and intuitive method for the prediction of sliding energy landscapes at rigid material interfaces. In the present study, we extend the applicability of the Registry Index to non-parallel surfaces, using a model system of nanotubes motion on ?at hexagonal materials. Our method successfully reproduces sliding energy landscapes of carbon nanotubes on Graphene calculated using a Lennard-Jones type and the Kolmogorov-Crespi interlayer potentials. Furthermore, it...

  17. Need for Renal Biopsy Registry in Saudi Arabia

    Directory of Open Access Journals (Sweden)

    Al-Homrany Mohammad

    2008-01-01

    Full Text Available Many renal lesions may result in chronic kidney disease if not detected early or treated properly. Glomerulonephritis is considered one of the leading causes of end-stage renal disease. The prevalence of different renal lesions were identified by inconsistent studies. The causes of inconsistencies include lack of unified methods in diagnosing and processing renal biopsies by different pathologists, patients selection′s bias for renal biopsy, and the variable policies and protocols adopted by different nephrologists. Establishment of renal biopsy registry may help to surmount these differences. In addition, combined data obtained from renal biopsy renal and replacement therapy registries can help study the long-term outcome of patients with renal diseases.

  18. Registry Evaluation of Digital Ulcers in Systemic Sclerosis

    Directory of Open Access Journals (Sweden)

    Felice Galluccio

    2010-01-01

    Full Text Available Digital ulcers are a very frequent complication of systemic sclerosis affecting about half of the SSc patients, and about 75% of the affected patients have their first DU episode within 5 years from their first non-Raynaud symptom. The lack of adequate classification criteria as well as the lack of knowledge of the development of DU have contributed to the opening of specific registries to better understand the natural history of these lesions. For these reason, specific disease registries play a fundamental role in this field of research. Thanks to the systematic collection of data and their subsequent analysis and comparison between different cohorts, it is possible to improve understanding of the underlying trigger mechanisms of DU development and to determine temporal trends. In the future, the development of recommendations for the management of DU remains of pivotal importance to prevent DU development and obtain rapid healing as well as reduction of pain and disability.

  19. Results from a multicentre international registry of familial Mediterranean fever

    DEFF Research Database (Denmark)

    Ozen, Seza; Demirkaya, Erkan; Amaryan, Gayane

    2014-01-01

    BACKGROUND AND AIM: Familial Mediterranean fever (FMF) is an autoinflammatory disease caused by mutations of the MEFV gene. We analyse the impact of ethnic, environmental and genetic factors on the severity of disease presentation in a large international registry. METHODS: Demographic, genetic...... Mediterranean patients whether they lived in their countries or western European countries. European patients had a lower frequency of the high penetrance M694V mutation and a significant delay of diagnosis (pfever episodes...

  20. Pleural Mesothelioma Surveillance: Validity of Cases from a Tumour Registry

    Directory of Open Access Journals (Sweden)

    France Labrèche

    2012-01-01

    Full Text Available BACKGROUND: Pleural mesothelioma is a rare tumour associated with exposure to asbestos fibres. Fewer than than one-quarter of cases registered in the Quebec Tumour Registry (QTR have been compensated as work-related. While establishing a surveillance system, this led to questioning as to whether there has been over-registration of cases that are not authentic pleural mesotheliomas in the QTR.

  1. Online Registries for Researchers: Using ORCID and SciENcv.

    Science.gov (United States)

    Vrabel, Mark

    2016-12-01

    The Open Researcher and Contributor ID (ORCID) registry helps resolve name ambiguity by assigning persistent unique identifiers that automatically link to a researcher's publications, grants, and other activities. This article provides an overview of ORCID and its benefits, citing several examples of its use in cancer and nursing journals. The article also briefly describes My NCBI and the Science Experts Network Curriculum Vitae (SciENcv) and its connection to ORCID.

  2. Modelling social-technical attacks with timed automata

    NARCIS (Netherlands)

    David, Nicolas; David, Alexandre; Hansen, René Rydhof; Larsen, Kim G.; Legay, Axel; Olesen, Mads Chr.; Probst, Christian W.

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In th

  3. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  4. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  5. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  6. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  7. VTE Registry: What Can Be Learned from RIETE?

    Directory of Open Access Journals (Sweden)

    Inna Tzoran

    2014-10-01

    Full Text Available The Registro Informatizado de Enfermedad TromboEmbólica (RIETE Registry is an ongoing, international, prospective registry of consecutive patients with acute venous thromboembolism (VTE designed to gather and analyze data on treatment patterns and outcomes in patients with acute VTE. It started in Spain in 2001, and 6 years later the database was translated into English with the aim to expand the Registry to other countries. In contrast to randomized controlled trials, there is no imposed experimental intervention: the management is determined solely by physicians. Thus, it provides data on patients with VTE in a real-world situation with an unselected patient population. Data from RIETE are hypothesis-generating and provide feedback from real-world clinical situations. So far, we learned about the natural history of VTE in patients with relative or absolute contraindications to anticoagulant therapy. We also learned interesting aspects on the natural history of VTE, and we built a number of prognostic scores to identify VTE patients at low, moderate, or high risk for adverse outcome.

  8. Implementation and analysis of initial trauma registry in Iquitos, Peru

    Science.gov (United States)

    Duron, Vincent; DeUgarte, Daniel; Bliss, David; Salazar, Ernesto; Casapia, Martin; Ford, Henri; Upperman, Jeffrey

    2016-01-01

    Background: In Peru, 11% of deaths are due to trauma. Iquitos is a large underserved Peruvian city isolated from central resources by its geography. Our objective was to implement a locally driven trauma registry to sustainably improve trauma healthcare in this region. Methods: All trauma patients presenting to the main regional referral hospital were included in the trauma registry. A pilot study retrospectively analyzed data from the first two months after implementation. Results: From March to April 2013, 572 trauma patients were entered into the database. Average age was 26.9 years. Ten percent of patients presented more than 24 hours after injury. Most common mechanisms of injury were falls (25.5%), motor vehicle collisions (23.3%), and blunt assault (10.5%). Interim analysis revealed that 99% of patients were entered into the database. However, documentation of vital signs was poor: 42% of patients had temperature, 26% had oxygen saturation documented. After reporting to registry staff, a significant increase in temperature (42 to 97%, P analysis of data to enhance prevention and treatment of injuries in Iquitos.

  9. Positive and negative effects of IT on cancer registries.

    Science.gov (United States)

    Mohammadzadeh, Niloofar; Safdari, Reza; Rahimi, Azin

    2013-01-01

    In the new millennium people are facing serious challenges in health care, especially with increasing non- communicable diseases (NCD). One of the most common NCDs is cancer which is the leading cause of death in developed countries and in developing countries is the second cause of death after heart diseases. Cancer registry can make possible the analysis, comparison and development of national and international cancer strategies and planning. Information technology has a vital role in quality improvement and facility of cancer registries. With the use of IT, in addition to gaining general benefits such as monitoring rates of cancer incidence and identifying planning priorities we can also gain specific advantages such as collecting information for a lifetime, creating tele medical records, possibility of access to information by patient, patient empowerment, and decreasing medical errors. In spite of the powerful role of IT, we confront various challenges such as general problems, like privacy of the patient, and specific problems, including possibility of violating patients rights through misrepresentation, omission of human relationships, and decrease in face to face communication between doctors and patients. By implementing appropriate strategies, such as identifying authentication levels, controlling approaches, coding data, and considering technical and content standards, we can optimize the use of IT. The aim of this paper is to emphasize the need for identifying positive and negative effects of modern IT on cancer registry in general and specific aspects as an approach to cancer care management.

  10. The importance of rheumatology biologic registries in Latin America.

    Science.gov (United States)

    de la Vega, Maria; da Silveira de Carvalho, Hellen M; Ventura Ríos, Lucio; Goycochea Robles, Maria V; Casado, Gustavo C

    2013-04-01

    Rheumatoid arthritis is a systemic inflammatory disorder characterized by joint articular pain and disability. Although there is scarcity of data available on the incidence and prevalence of RA in Latin America, there is a growing recognition of this disease where chronic diseases are on the rise and infectious disease on the decline. RA is a substantial burden to patients, society, and the healthcare system. The heterogeneity identified within RA presents an opportunity for personalized medicine, especially in regions with such demographic diversity as that of Latin America. To understand the long-term effects of treatment for RA especially on safety, registries have been established, a number of which have been created in Latin America. Despite their weaknesses (e.g., lack of controls and randomization), registries have provided additional and complementary information on the use of biologics in clinical practice in Latin America and other regions. Although certain challenges remain in the implementation and maintenance of registries, they continue to provide real-life data to clinical practice contributing to improved patient care.

  11. Proposal for a Prospective Registry for Moyamoya Disease in Japan

    Science.gov (United States)

    KAZUMATA, Ken; ITO, Masaki; UCHINO, Haruto; NISHIHARA, Hiroshi; HOUKIN, Kiyohiro

    2017-01-01

    The number of clinical research papers published worldwide on moyamoya disease (MMD) has increased recently. However, the majority of the literature comprises retrospective single-center studies collecting data on small numbers of patients. Several multi-center studies are ongoing in Japan; however, the current data are insufficient for comprehensively outlining the various characteristics of MMD. To enhance our knowledge on epidemiologic, vascular, and genetic aspects of MMD, a prospective multicenter registry will be established in Japan that will help to streamline clinical research as well as improve clinical treatments and long-term outcomes. Patients with MMD or secondary moyamoya syndrome referred to the participating centers will be invited to the registry. Demographic and physiological parameters, along with neuroimaging data will be collected chronologically. Clinical events, including neurological, medical, and surgical interventions will be recorded. Whole blood samples will be collected. Extra- and intracranial vascular tissue, and/or cerebrospinal fluid will also be collected from patients who undergo surgical revascularization. These biospecimens will be stored at the repositories and utilized for genome-wide association studies for identifying genetic variants, as well as tissue-specific proteomic, and/or molecular analyses. Ethics approval will be obtained at all facilities collecting biospecimens. The registry will provide descriptive statistics on functional outcomes, surgical techniques used, medications, and neurological events stratified according to patients’ clinical characteristics. We expect this study to provide novel insights in the management of MMD patients and design better therapies. PMID:28070115

  12. The German IVF-Registry – D·I·R

    Directory of Open Access Journals (Sweden)

    Bühler K

    2013-01-01

    Full Text Available Systematic data collection in the field of assisted reproductive techniques is performed in Germany since 30 years. Since 1997, data collection is performed electronically and in a prospective way. In 1998, by a code of the German Medical Association participation at the registry has become mandatory for all IVF centres in Germany. Different software solutions can be used in the centres for data collection. All of them have to cooperate with a special “DIRmod-DLL”, controlling online plausibility and prospectivity of the collected data. More than one million treatment cycles have been reported in the annuals published since 1996 up to 2010. All in all 1.2 millions cycles are included in the registry. Clinical pregnancy rate increased continuously and miscarriage rate decreased. By reduction of the mean number of transferred embryos of about 20% the percentage of born triplets in relationship to all children born after ART decreased of about 80%. It can be shown with the huge number of documented cycles that political decisions exert a dominating influence on treatment and drug choice. The German IVF registry has been established over the last 30 years as an instrument of quality assurance and has experienced highest regard by colleagues and by the international scientific world.

  13. [The quality of cancer registry. From a methodology approach].

    Science.gov (United States)

    Fajardo-Gutiérrez, Arturo; González-Miranda, Guadalupe

    2011-01-01

    Since 1996 at the unit of epidemiological research of the "Hospital de Pediatría en Centro Medico Nacional Siglo XXI" a cancer registry in children has been done. This registry has been a pioneer with special features like be only in child population attended in Mexico City. The following paper describes the main characteristics of the registry, the strategy used to obtain the data, the quality criterion applied for selecting data like timeliness, validated and complete. A longitudinal and prolective data was obtained. There was a training period for obtaining and register the data. The data was obtained from children with neoplasm attended at the mentioned hospital above. The diagnosis of a solid neoplasm was established by histology and marrow aspirated studies. The population studied was children (0-14 years). It was calculated the incidence (per 1000 000 children/year) by age, sex, diagnosis and place of residence. The trend was evaluated by estimating the average annual percent of change.

  14. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  15. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes...... on a new and general formalism for attack-defence trees....

  16. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  17. Reliability of patient-reported functional outcome in a joint replacement registry. A comparison of primary responders and non-responders in the Danish Shoulder Arthroplasty Registry

    DEFF Research Database (Denmark)

    Polk, Anne; Rasmussen, Jeppe V; Brorson, Stig;

    2013-01-01

    Patient-reported outcome measures (PROMs) are used by some arthroplasty registries to evaluate results after surgery, but non-response may bias the results. The aim was to identify a potential bias in the outcome scores of subgroups in a cohort of patients from the Danish Shoulder Arthroplasty...... Registry (DSR) and to characterize non-responders....

  18. The role of registries in rare genetic lipid disorders: Review and introduction of the first global registry in lipoprotein lipase deficiency.

    Science.gov (United States)

    Steinhagen-Thiessen, Elisabeth; Stroes, Erik; Soran, Handrean; Johnson, Colin; Moulin, Philippe; Iotti, Giorgio; Zibellini, Marco; Ossenkoppele, Bas; Dippel, Michaela; Averna, Maurizio R

    2016-08-21

    A good understanding of the natural history of rare genetic lipid disorders is a pre-requisite for successful patient management. Disease registries have been helpful in this regard. Lipoprotein Lipase Deficiency (LPLD) is a rare, autosomal-recessive lipid disorder characterized by severe hypertriglyceridemia and a very high risk for recurrent acute pancreatitis, however, only limited data are available on its natural course. Alipogene tiparvovec (Glybera(®)) is the first gene therapy to receive Marketing Authorization in the European Union; GENIALL (GENetherapy In the MAnagement of Lipoprotein Lipase Deficiency), a 15-year registry focusing on LPLD was launched in 2014 as part of its Risk Management Plan. The aim of this publication is to introduce the GENIALL Registry within a structured literature review of registries in rare genetic lipid disorders. A total of 11 relevant initiatives/registries were identified (homozygous Familial Hypercholesterolemia (hoFH) [n = 5]; LPLD [n = 1]; Lysosomal Acid Lipase Deficiency [LALD, n = 1], detection of mutations in genetic lipid disorders [n = 4]). Besides one product registry in hoFH and the LALD registry, all other initiatives are local or country-specific. GENIALL is the first global prospective registry in LPLD that will collect physician and patient generated data on the natural course of LPLD, as well as long-term outcomes of gene therapy.

  19. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  20. [Lucky National Registry (Luxembourg Acute Myocardial Infarction Registry). Are women much better taken care of than men?].

    Science.gov (United States)

    Oprea, Irina; Vaillant, Michel; Hesse, Malou; Jacobs, Loredana; Beissel, Jean; Wagner, Daniel R

    2008-01-01

    The national LUCKY registry (Luxembourg Acute Myocardial Infarction Registry) confirms for Luxembourg that transfer of patients with acute myocardial infarction for primary percutaneous coronary intervention (PCI) is very effective. However, while mortality is low after PCI, a third of the patients with acute myocardial infarction develop severe left ventricular dysfunction. This may in part be explained by relatively long time delays between onset of symptoms and opening of the infarct-related artery, despite short distances between hospitals (time is myocardium). Surprisingly, in comparison with men, women are younger, have a higher body mass index and receive less evidence-based therapies such as statins before and after myocardial infarction. In conclusion, PCI has substantially improved the treatment of acute myocardial infarction in Luxembourg, but all actors including the patient have to keep efforts high to minimize time delays.

  1. Distributed Denial of Service Attacks: A Review

    Directory of Open Access Journals (Sweden)

    Sonali Swetapadma Sahu

    2014-01-01

    Full Text Available A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

  2. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  3. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  4. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  5. Resistance of the double random phase encryption against various attacks.

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-06

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  6. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  7. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  8. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  9. Report of incidence and mortality in China cancer registries, 2009

    Institute of Scientific and Technical Information of China (English)

    Wanqing Chen; Rongshou Zheng; Siwei Zhang; Ping Zhao; Guanglin Li; Lingyou Wu; Jie He

    2013-01-01

    The National Central Cancer Registry (NCCR) collected cancer registration data in 2009 from local cancer registries in 2012,and analyzed to describe cancer incidence and mortality in China.Methods.:On basis of the criteria of data quality from NCCR,data subrnitted from 104 registries were checked and evaluated.There were 72 registries' data qualified and accepted for cancer registry annual report in 2012.Descriptive analysis included incidence and mortality stratified by area (urban/rural),sex,age group and cancer site.The top 10 common cancers in different groups,proportion and cumulative rates were also calculated.Chinese population census in 1982 and Segi's population were used for age-standardized incidence/mortality rates.Results:All 72 cancer registries covered a total of 85,470,522 population (57,489,009 in urban and 27,981,513 in rural areas).The total new cancer incident cases and cancer deaths were 244,366 and 154,310,respectively.The morphology verified cases accounted for 67.23%,and 3.14% of incident cases only had information from death certifications.The crude incidence rate in Chinese cancer registration areas was 285.91/100,000(males 317.97/100,000,females 253.09/100,000),age-standardized incidence rates by Chinese standard population (ASIRC) and by world standard population (ASIRW) were 146.87/100,000 and 191.72/100,000 with the cumulative incidence rate (0-74 age years old) of 22.08%.The cancer incidence and ASIRC were 303.39/100,000 and 150.31/100,000 in urban areas whereas in rural areas,they were 249.98/100,000 and 139.68/100,000,respectively.The cancer mortality in Chinese cancer regist-ation areas was 180.54/100,000 (224.20/100,000 in males and 135.85/100,000 in females),age-standardized umortality rates by Chinese standard population (ASMRC) and by world standard population (ASMRW) were 85.06/100,000 and 115.65/100,000,and the cumulative incidence rate (0-74 age years old) was 12.94%.The cancer mortality and ASMRC were 181

  10. Prophylaxis in congenital factor VII deficiency: indications, efficacy and safety. Results from the Seven Treatment Evaluation Registry (STER).

    Science.gov (United States)

    Napolitano, Mariasanta; Giansily-Blaizot, Muriel; Dolce, Alberto; Schved, Jean F; Auerswald, Guenter; Ingerslev, Jørgen; Bjerre, Jens; Altisent, Carmen; Charoenkwan, Pimlak; Michaels, Lisa; Chuansumrit, Ampaiwan; Di Minno, Giovanni; Caliskan, Umran; Mariani, Guglielmo

    2013-04-01

    Because of the very short half-life of factor VII, prophylaxis in factor VII deficiency is considered a difficult endeavor. The clinical efficacy and safety of prophylactic regimens, and indications for their use, were evaluated in factor VII-deficient patients in the Seven Treatment Evaluation Registry. Prophylaxis data (38 courses) were analyzed from 34 patients with severe factor VII deficiency (plasma-derived factor VII, and ten received fresh frozen plasma. Prophylactic schedules clustered into "frequent" courses (three times weekly, n=23) and "infrequent" courses (≤ 2 times weekly, n=15). Excluding courses for menorrhagia, "frequent" and "infrequent" courses produced 18/23 (78%) and 5/12 (41%) "excellent" outcomes, respectively; relative risk, 1.88; 95% confidence interval, 0.93-3.79; P=0.079. Long term prophylaxis lasted from 1 to >10 years. No thrombosis or new inhibitors occurred. In conclusion, a subset of patients with factor VII deficiency needed prophylaxis because of severe bleeding. Recombinant activated factor VII schedules based on "frequent" administrations (three times weekly) and a 90 μg/kg total weekly dose were effective. These data provide a rationale for long-term, safe prophylaxis in factor VII deficiency.

  11. Getting inside acupuncture trials - Exploring intervention theory and rationale

    Directory of Open Access Journals (Sweden)

    Godfrey Mary

    2011-03-01

    Full Text Available Abstract Background Acupuncture can be described as a complex intervention. In reports of clinical trials the mechanism of acupuncture (that is, the process by which change is effected is often left unstated or not known. This is problematic in assisting understanding of how acupuncture might work and in drawing together evidence on the potential benefits of acupuncture. Our aim was to aid the identification of the assumed mechanisms underlying the acupuncture interventions in clinical trials by developing an analytical framework to differentiate two contrasting approaches to acupuncture (traditional acupuncture and Western medical acupuncture. Methods Based on the principles of realist review, an analytical framework to differentiate these two contrasting approaches was developed. In order to see how useful the framework was in uncovering the theoretical rationale, it was applied to a set of trials of acupuncture for fatigue and vasomotor symptoms, identified from a wider literature review of acupuncture and early stage breast cancer. Results When examined for the degree to which a study demonstrated adherence to a theoretical model, two of the fourteen selected studies could be considered TA, five MA, with the remaining seven not fitting into any recognisable model. When examined by symptom, five of the nine vasomotor studies, all from one group of researchers, are arguably in the MA category, and two a TA model; in contrast, none of the five fatigue studies could be classed as either MA or TA and all studies had a weak rationale for the chosen treatment for fatigue. Conclusion Our application of the framework to the selected studies suggests that it is a useful tool to help uncover the therapeutic rationale of acupuncture interventions in clinical trials, for distinguishing between TA and MA approaches and for exploring issues of model validity. English language acupuncture trials frequently fail to report enough detail relating to the

  12. Plato's Cosmic Theology: A Rationale for a Polytheistic Astrology?

    Science.gov (United States)

    Henriques, André

    2015-05-01

    Plato's cosmology influenced classical astronomy and religion, but was in turn influenced by the polytheistic context of its time. Throughout his texts, including the cosmological treatise Timaeus, and the discussions on the soul in the Phaedrus, Plato (c.428-c.348 BC) established what can be generalised as Platonic cosmological thought. An understanding of the philosophical and mythical levels of Platonic thought can provide a rationale for polytheistic and astrological worldviews, pointing to some cosmological continuity, alongside major shifts, from ancient Greek religion to the astrological thought of ancient astronomers such as Claudius Ptolemy.

  13. The Jupitor icy moons orbiter project: The scientific rationale

    Science.gov (United States)

    Creely, Ronald; Johnson, Torrence

    The Jupiter Icy Moons Orbiter (JIMO) is proposed by NASA as the next step in the exploration of the Jovian system following the successful Galileo project. JIMO would use nuclear-electric propulsion to deliver a highly capable scientific payload to Jupiter and go into orbit around Europa, Ganymede, and Callisto, and to conduct investigations of the Jovian system. In early 2003, a NASA Science Definition Team (SDT) was appointed to develop the scientific rationale and priorities for JIMO. The SDT, co-chaired by T. Johnson and R. Greeley, consisted of 38 scientists representing the broad scientific potential afforded by JIMO.This article summarizes the principal findings of the SDT.

  14. When Regional Innovation Policies Meet Policy Rationales and Evidence:

    DEFF Research Database (Denmark)

    Borrás, Susana; Jordana, Jacint

    of innovation policy rationales, advocating for more specialisation; likewise, greater data availability at the regional level has allowed more sophisticated assessment of innovation performance. Finally, the crisis since 2008 has had ravaging effects in some regions, with job losses and severe economic...... sluggishness. Therefore, it is reasonable to expect transforming dynamics in regional innovation policies. Against this backdrop, the paper compares the institutional frameworks and budgetary priorities of four Spanish regions during the period 2001-2014: Catalonia, the Basque country, Galicia, and Andalusia...

  15. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  16. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  17. Plant defences against herbivore and insect attack

    Science.gov (United States)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  18. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  19. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  20. The diagnosis of transient ischemic attacks

    NARCIS (Netherlands)

    P.J. Koudstaal (Peter Jan)

    1989-01-01

    textabstractThe diagnosis of transient ischemic attack (TIA) is fraught with difficulty, since the diagnosis rests entirely upon the history of the patient's symptoms and the neurologist's skill in questioning the patient. The aim of this thesis is to investigate various measures to improve the reli

  1. Persistent cognitive impairment after transient ischemic attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.; Duijnhoven, D.A. van; Leeuw, F.E. de; Kessels, R.P.; Dijk, E.J. van

    2014-01-01

    BACKGROUND AND PURPOSE: By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whe

  2. Persistent Cognitive Impairment After Transient Ischemic Attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.M.M.; Duijnhoven, D.A. van; de Leeuw, F.E.; Kessels, R.P.C.; Dijk, E.J. van

    2014-01-01

    Background and Purpose—By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whet

  3. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  4. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  5. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  6. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  7. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  8. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  9. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  10. Population-based cohort study of outpatients with pneumonia: rationale, design and baseline characteristics

    Directory of Open Access Journals (Sweden)

    Eurich Dean T

    2012-06-01

    Full Text Available Abstract Background The vast majority of research in the area of community-acquired pneumonia (CAP has been based on patients admitted to hospital. And yet, the majority of patients with CAP are treated on an ambulatory basis as outpatients, either by primary care physicians or in Emergency Departments. Few studies have been conducted in outpatients with pneumonia, and there is a paucity of data on short and long term morbidity or mortality and associated clinical correlates in this group of patients. Methods From 2000–2002, all CAP patients presenting to 7 Emergency Departments in Edmonton, Alberta, Canada were prospectively enrolled in a population-based registry. Clinical data, including pneumonia severity index (PSI were collected at time of presentation. Patients discharged to the community were then followed for up to 5 years through linkage to the provincial administrative databases. The current report provides the rationale and design for the cohort, as well as describes baseline characteristics and 30-day morbidity and mortality. Results The total sample included 3874 patients. After excluding patients who were hospitalized, died or returned to the Emergency Department the same day they were initially discharged (n = 451; 12 %, and patients who could not be linked to provincial administrative databases (n = 237; 6 %, the final cohort included 3186 patients treated according to a validated clinical management pathway and discharged back to the community. Mean age was 51 (SD = 20 years, 53 % male; 4 % resided in a nursing home, 95 % were independently mobile, and 88 % had mild (PSI class I-III pneumonia. Within 30-days, return to Emergency Department was common (25 % as was hospitalization (8 % and 1 % of patients had died. Conclusions To our knowledge, this represents the largest clinically-detailed outpatient CAP cohort assembled to date and will add to our understanding of the determinants and outcomes

  11. THE RARE DISEASES CLINICAL RESEARCH NETWORK CONTACT REGISTRY UPDATE: FEATURES AND FUNCTIONALITY

    OpenAIRE

    Richesson, Rachel; Sutphen, Rebecca; Shereff, Denise; Krischer, Jeff

    2012-01-01

    The Rare Diseases Clinical Research Network (RDCRN) Contact Registry has grown in size and scope since it was first reported in this journal in 2007. In this paper, we reflect on our seven years’ experience developing and expanding the RDCRN Contact Registry to include many more rare diseases. We present the functional and data requirements that motivated this registry, and the new features and policies that have been developed since. Given the high costs and long-term commitme...

  12. A Digital Registry for Archaeological Find Spots and Excavation Documentation in IANUS

    OpenAIRE

    Kolbmann, Wibke

    2014-01-01

    Grey literature (site notebooks, reports etc.) and research data in archaeology are invaluable sources of information currently lacking a central reference registry in Germany. This paper discusses requirements and the underlying data model of a registry to be developed for find spots and archaeological excavation data within the IANUS project at the German Archaeological Institute. This registry is to collect information on archaeological investigations data for a finding aid service. The fo...

  13. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  14. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  15. Evaluation of algorithms for registry-based detection of acute myocardial infarction following percutaneous coronary intervention

    DEFF Research Database (Denmark)

    Egholm, Gro; Madsen, Morten; Thim, Troels;

    2016-01-01

    BACKGROUND: Registry-based monitoring of the safety and efficacy of interventions in patients with ischemic heart disease requires validated algorithms. OBJECTIVE: We aimed to evaluate algorithms to identify acute myocardial infarction (AMI) in the Danish National Patient Registry following...... additional information from the Danish National Patient Registry yield different sensitivities, specificities, and predictive values in registry-based detection of AMI following PCI. We were able to identify AMI following PCI with moderate-to-high validity. However, the choice of algorithm will depend...

  16. 75 FR 38683 - Federal Acquisition Regulation; FAR Case 2008-035, Registry of Disaster Response Contractors

    Science.gov (United States)

    2010-07-02

    ... officers to take advantage of commercially available market research methods to identify capabilities to..., contracting officers are required to consult the registry during market research and acquisition planning....

  17. Protecting buildings from a biological or chemical attack: Actions to take before or during a release

    Energy Technology Data Exchange (ETDEWEB)

    Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

    2003-01-29

    This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

  18. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  19. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  20. Registry of hemophilia and other bleeding disorders in Syria.

    Science.gov (United States)

    Ali, T; Schved, J F

    2012-11-01

    Creating a national registry for bleeding disorders is a major step in establishing a National Hemophilia Care Program in all countries. Creating such a registry which would contain accurate and regularly updated data, including laboratory analysis confirmed by a reference laboratory established at the Syrian Hemophilia Society. Blood samples were drawn and analysed in the Society reference laboratory for the following screening tests: prothrombin time (PT), APTT and coagulation factor assays. Inhibitor detection and VWF RiCof were performed depending on the result of the screening tests. HBs Ag, anti-HCV, anti-HIV 1+2 and syphilis tests were also performed to detect transfusion transmitted agents (TTA). Diagnosis of the bleeding disorder type was confirmed for 760 of these cases. Among the 760 confirmed patients, 82.5% had haemophilia. Among these, 89.6%were haemophilia A; 10.4% were haemophilia B; 8.3% had VWD; 9.2% had other rare bleeding disorders as follows: 1.2% FVII deficiency, 0.7% FV deficiency, 1.8% F1 deficiency, 0.4% FX deficiency, 1.4% platelets dysfunctions (mainly Glanzmann Thrombasthenia) and 3.7% had combined FVIII and FV deficiency. Eighty (21.3%) cases of 375 screened for transfusion transmitted agents were positive for at least one infection: 0.5% were HBsAg positive, 19.7% were anti-HCV positive, 0.8% had combined HBsAg and anti-HCV positivity and 0.3% was anti-Syphilis positive. All patients were negative for HIV1 and HIV2. The preliminary data presented here follow known data on haemophilia A, haemophilia B and VWD disease. This registry will certainly help in improving haemophilia care in Syria.

  1. [Twelve years of working of Brazzaville cancer registry].

    Science.gov (United States)

    Nsondé Malanda, Judith; Nkoua Mbon, Jean Bernard; Bambara, Augustin Tozoula; Ibara, Gérard; Minga, Benoît; Nkoua Epala, Brice; Gombé Mbalawa, Charles

    2013-02-01

    The Brazzaville cancer registry was created in 1996 with the support of the International Agency Research against Cancer (IARC) which is located in Lyon, France. The Brazzaville cancer registry is a registry which is based on population which records new cancer cases occurring in Brazzaville by using Canreg 4.0 Software. Its aim is to supply useful information to fight against cancer to physicians and to decision makers. We conducted this study whose target was to determine the incidence of cancer in Brazzaville during twelve years, from January 1st, 1998 to December 31, 2009. During that period 6,048 new cancer cases were recorded: 3,377 women (55.8%), 2,384 men (39.4%), and 287 children (4.8%) from 0 to 14 years old with an annual average of 504 cases. Middle age to the patient's diagnosis was 49.5 years in female sex and 505.5 years old for male sex. The incidence rate of cancers in Brazzaville was 39.8 or 100.000 inhabitants per year and by sex we observed 49 to female sex and 35.2 for male sex. The first cancers localizations observed to women were in order of frequency: breast, cervix uterine, liver ovaries, hematopoietic system, to men : liver, prostate, hematopoietic system, colon and stomach; to children : retina, kidney, hematopoietic system, liver and bones. These rates are the basis to know the burden of cancer among all pathologies of Brazzaville and the achievement of a national cancer control program.

  2. Pelvic Floor Disorders Registry: Study Design and Outcome Measures.

    Science.gov (United States)

    Weber LeBrun, Emily; Adam, Rony A; Barber, Matthew D; Boyles, Sarah Hamilton; Iglesia, Cheryl B; Lukacz, Emily S; Moalli, Pamela; Moen, Michael D; Richter, Holly E; Subak, Leslee L; Sung, Vivian W; Visco, Anthony G; Bradley, Catherine S

    2016-01-01

    Pelvic floor disorders affect up to 24% of adult women in the United States, and many patients with pelvic organ prolapse (POP) choose to undergo surgical repair to improve their quality of life. While a variety of surgical repair approaches and techniques are utilized, including mesh augmentation, there is limited comparative effectiveness and safety outcome data guiding best practice. In conjunction with device manufacturers, federal regulatory organizations, and professional societies, the American Urogynecologic Society developed the Pelvic Floor Disorders Registry (PFDR) designed to improve the quality of POP surgery by facilitating quality improvement and research on POP treatments. The PFDR will serve as a resource for surgeons interested in benchmarking and outcomes data and as a data repository for Food and Drug Administration-mandated POP surgical device studies. Provider-reported clinical data and patient-reported outcomes will be collected prospectively at baseline and for up to 3 years after treatment. All data elements including measures of success, adverse events, and surgeon characteristics were identified and defined within the context of the anticipated multifunctionality of the registry, and with collaboration from multiple stakeholders. The PFDR will provide a platform to collect high-quality, standardized patient-level data from a variety of nonsurgical (pessary) and surgical treatments of POP and other pelvic floor disorders. Data from this registry may be used to evaluate short- and longer-term treatment outcomes, patient-reported outcomes, and complications, as well as to identify factors associated with treatment success and failure with the overall goal of improving the quality of care for women with these conditions.

  3. Studies based on the Danish Multiple Sclerosis Registry

    DEFF Research Database (Denmark)

    Koch-Henriksen, Nils; Stenager, Egon; Brønnum-Hansen, Henrik

    2011-01-01

    Introduction: This paper reviews the most important articles using data from the Danish Multiple Sclerosis Registry (DMSR) published in the past 25 years. Research topics: These articles include: descriptive epidemiological studies, indicating that the female incidence of multiple sclerosis (MS......) in Denmark has increased considerably; follow-up studies on social events, showing that patients at a high rate lose their working ability and their spouses/partners; mortality studies, demonstrating a considerable excess mortality; cause-of-death studies; comorbidity studies; and, most importantly...

  4. Glucocorticoid augmentation of prolonged exposure therapy: rationale and case report

    Directory of Open Access Journals (Sweden)

    Laura Pratchett

    2010-12-01

    Full Text Available Rationale: Prolonged exposure (PE therapy has been found to reduce symptoms of posttraumatic stress disorder (PTSD; however, it is difficult for many patients to engage fully in the obligatory retelling of their traumatic experiences. This problem is compounded by the fact that habituation and cognitive restructuring – the main mechanisms through which PE is hypothesized to work – are not instantaneous processes, and often require several weeks before the distress associated with imaginal exposure abates. Case reports: Two cases are described that respectively illustrate the use of hydrocortisone and placebo, in combination with PE, for the treatment of combat-related PTSD. Based on known effects of glucocorticoids on learning and memory performance, we hypothesized that augmentation with hydrocortisone would improve the therapeutic effects of PE by hastening “new” learning and facilitating decreases in the emotional impact of fear memories during the course of treatment. The veteran receiving hydrocortisone augmentation of PE displayed an accelerated and ultimately greater decline in PTSD symptoms than the veteran receiving placebo. Conclusions: While no general conclusion can be derived from comparison of two patients, the findings are consistent with the rationale for augmentation. These case reports support the potential for an appropriately designed and powered clinical trial to examine the efficacy of glucocorticoids in augmenting the effects of psychotherapy for PTSD.

  5. New Knowledge Network Evaluation Method for Design Rationale Management

    Institute of Scientific and Technical Information of China (English)

    JING Shikai; ZHAN Hongfei; LIU Jihong; WANG Kuan; JIANG Hao; ZHOU Jingtao

    2015-01-01

    Current design rationale (DR) systems have not demonstrated the value of the approach in practice since little attention is put to the evaluation method of DR knowledge. To systematize knowledge management process for future computer-aided DR applications, a prerequisite is to provide the measure for the DR knowledge. In this paper, a new knowledge network evaluation method for DR management is presented. The method characterizes the DR knowledge value from four perspectives, namely, the design rationale structure scale, association knowledge and reasoning ability, degree of design justification support and degree of knowledge representation conciseness. The DR knowledge comprehensive value is also measured by the proposed method. To validate the proposed method, different style of DR knowledge network and the performance of the proposed measure are discussed. The evaluation method has been applied in two realistic design cases and compared with the structural measures. The research proposes the DR knowledge evaluation method which can provide object metric and selection basis for the DR knowledge reuse during the product design process. In addition, the method is proved to be more effective guidance and support for the application and management of DR knowledge.

  6. EU Registries Forum Meeting is a new step in the development of international cooperation in rheumatic diseases registries

    Directory of Open Access Journals (Sweden)

    D. E. Karateev

    2015-01-01

    Full Text Available EU Registries Forum Meeting took place 2–3 March 2015 in Chantilly, France. Leading experts in the field participated in the forum. Registersnot only of Western Europe but also of Russia, USA, Canada and Japan were presented at the meeting. The most important directions of development of modern registers of patients with rheumatic diseases are the inclusion of comprehensive data on the process of care in practice, the integration of the data of registers in different countries, the active collection of information on the application of the new anti-rheumatic drugs

  7. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed.......Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...

  8. Flooding attack and defence in Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Hou Yafei; Zhong Yiping; Zhang Shiyong; Dai Zhoulin

    2006-01-01

    Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

  9. Comparative Analysis of Routing Attacks in Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Bipul Syam Purkayastha

    2012-03-01

    Full Text Available In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.

  10. An Attack Modeling Based on Colored Petri Net

    Institute of Scientific and Technical Information of China (English)

    ZHOU Shijie; QIN Zhiguang; ZHANG Feng; LIU Jinde

    2004-01-01

    A color petri net (CPN) based attack modeling approach is addressed.Compared with graph-based modeling,CPN based attack model is fiexible enough to model Intemet intrusions,because of their static and dynamic features.The processes and rules of building CPN based attack model from attack tree are also presented.In order to evaluate the risk of intrusion,some cost elements are added to CPN based attack modeling.This extended model is useful in intrusion detection and risk evaluation.Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions,such as intrusion response and intrusion defense.A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn't.

  11. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  12. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  13. New attacks on Wi-Fi Protected Setup

    Directory of Open Access Journals (Sweden)

    Hamed Mohtadi

    2015-09-01

    Full Text Available Wi-Fi Protected Setup (WPS is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weaknesses in the implementation of WPS and provides an improved evil twin attack. This attack shows that even by completely disabling the WPS on the routers, all vulnerabilities are not covered.

  14. Understanding how components of organisations contribute to attacks

    NARCIS (Netherlands)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is difficul

  15. Aspirin to Prevent a First Heart Attack or Stroke

    Science.gov (United States)

    ... Aspirin to Prevent a First Heart Attack or Stroke Also known as aspirin primary prevention. Aspirin is ... taking aspirin to prevent another heart attack or stroke? The information discussed in Who may benefit? only ...

  16. Findings on the atopic triad from a Danish twin registry

    DEFF Research Database (Denmark)

    Thomsen, SF; Ulrik, Charlotte Suppli; Kyvik, KO;

    2006-01-01

    OBJECTIVE: To estimate to what extent the same genetic and environmental risk factors influence asthma, hay fever and eczema. DESIGN: From the nationwide Danish Twin Registry, twin cohorts born between 1953 and 1982 were contacted for a questionnaire survey, and a total of 29 183 twin individuals...... role. These results can prove informative when counselling families with atopy, and may furthermore be used to guide the search for pleiotropic genes of importance for these diseases.......OBJECTIVE: To estimate to what extent the same genetic and environmental risk factors influence asthma, hay fever and eczema. DESIGN: From the nationwide Danish Twin Registry, twin cohorts born between 1953 and 1982 were contacted for a questionnaire survey, and a total of 29 183 twin individuals...... in liability between the different diseases were 0.57 (95% CI 0.54-0.59) for asthma and hay fever, 0.40 (95% CI 0.36-0.42) for asthma and eczema, and 0.33 (95% CI 0.29-0.36) for hay fever and eczema. Decomposition of these correlations into their genetic and environmental contributions showed that shared genes...

  17. Earth Observation Data Interoperability Arrangement with Ontology Registry

    Science.gov (United States)

    Nagai, M.; Ono, M.; Shibasaki, R.

    2012-08-01

    Standardization organizations are working for syntactic and schematic level of interoperability. At the same time, semantic interoperability must be considered as a heterogeneous condition and also very diversified with a large-volume data. The ontology registry has been developed and ontological information such as technical vocabularies for earth observation has been collected for data interoperability arrangement. This is a very challenging method for earth observation data interoperability because collaboration or cooperation with scientists of different disciplines is essential for common understanding. Multiple semantic MediaWikis are applied to register and update technical vocabularies as a part of the ontology registry, which promises to be a useful tool for users. In order to invite contributions from the user community, it is necessary to provide sophisticated and easy-to-use tools and systems, such as table-like editor, reverse dictionary, and graph representation for sustainable development and usage of ontological information. Registered ontologies supply the reference information required for earth observation data retrieval. We proposed data/metadata search with ontology such as technical vocabularies and visualization of relations among dataset to very large scale and various earth observation data.

  18. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......, one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  19. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  20. Making MANET secured against malicious attack

    Science.gov (United States)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  1. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  2. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  3. Quantifying Shannon's Work Function for Cryptanalytic Attacks

    CERN Document Server

    van Son, R J J H

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on computability logic to quantify Shannon's work function and evaluate resource use in cryptanalysis. A simple cost function is defined which allows to quantify a wide range of theoretical and real computational resources. With this approach the use of custom hardware, e.g., FPGA boards, in cryptanalysis can be analyzed. Applied to real cryptanalytic problems, it raises, for instance, the expectation that the computer time needed to break some simple 90 bit strong cryptographic primitives might theoretically be less than two years.

  4. Report of Incidence and Mortality in China Cancer Registries, 2008

    Institute of Scientific and Technical Information of China (English)

    Wan-qing Chen; Rong-shou Zheng; Si-wei Zhang; Ni Li; Ping Zhao; Guang-lin Li; Liang-you Wu; Jie He

    2012-01-01

    Objective:Annual cancer incidence and mortality in 2008 were provided by National Central Cancer Registry in China,which data were collected from population-based cancer registries in 2011.Methods:There were 56 registries submitted their data in 2008.After checking and evaluating the data quality,total 41 registries' data were accepted and pooled for analysis.Incidence and mortality rates by area (urban or rural areas) were assessed,as well as the age-and sex-specific rates,age-standardized rates,proportions and cumulative rate.Results:The coverage population of the 41 registries was 66,138,784 with 52,158,495 in urban areas and 13,980,289 in rural areas.There were 197,833 new cancer cases and 122,136 deaths in cancer with mortality to incidence ratio of 0.62.The morphological verified rate was 69.33%,and 2.23% of cases were identified by death certificate only.The crude cancer incidence rate in all areas was 299.12/100,000 (330.16/100,000 in male and 267.56/100,000 in female) and the age-standardized incidence rates by Chinese standard population (ASIRC) and world standard population (ASIRW) were 148.75/100,000 and 194.99/100,000,respectively.The cumulative incidence rate (0-74 years old) was of 22.27%.The crude incidence rate in urban areas was higher than that in rural areas.However,after adjusted by age,the incidence rate in urban was lower than that in rural.The crude cancer mortality was 184.67/100,000 (228.14/100,000 in male and 140.48/100,000 in female),and the age-standardized mortality rates by Chinese standard population (ASMRC) and by world population were 84.36/100,000 and 114.32/100,000,respectively.The cumulative mortality rate (0-74 years old) was of 12.89%.Age-adjusted mortality rates in urban areas were lower than that in rural areas.The most common cancer sites were lung,stomach,colon-rectum,liver,esophagus,pancreas,brain,lymphoma,breast and cervix which accounted for 75% of all cancer incidence.Lung cancer was the leading cause of

  5. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  6. Afghanistan: Green-on-Blue Attacks

    Science.gov (United States)

    2013-05-02

    Afghanistan, December 2012, p 35 15 Yousafzai, Sami and Moreau , Ron, http://www.thedailybeast.com/newsweek/2012/08/26/ afghanistan-green-on-blue-killings...spike-insider-attacks- stress-ramadan-fasting, 24 August 2012 37 Yousafzai, Sami and Moreau , Ron, http://www.thedailybeast.com/newsweek/2012/08/26...afghanistan-green-on-blue-killings- explained.html, Afghanistan: ‘Green on Blue’ Killings Explained, 27 August 2012 38 Yousafzai, Sami and Moreau , Ron

  7. Coal Slag Attack-A Review

    Institute of Scientific and Technical Information of China (English)

    GUO Zongqi

    2004-01-01

    Although slagging coal gasifiers have served the commercial systems of electricity and chemical fertilizer productions for more than ten years, refractory service life still is a critical factor for gasifier availability. Some investigations were attracted, focusing on coal slag attack on high chromia refractories. A general introduction is made in order to have further understanding about slag corrosion in coal gasification environment. Microstructural deterioration and wear process of high chromia refractory in slagging gasifiers are discussed.

  8. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...information (in many cases real-time) among many users at a very low cost . The number of networks the DoD uses to execute its mission has increased...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the

  9. Defending Against LDoS Attacks Using Fair AQM

    Directory of Open Access Journals (Sweden)

    Bianqin Wang

    2011-12-01

    Full Text Available According to the instant high rate and high intensity of LDoS attacks, this paper explores using fair queue management mechanism to mitigate their effect. We perform simulation experiments to evaluate the performance of fair AQM FRED and CHOKe under LDoS attacks. The simulation results show that they are able to reduce the impact of the attacks in various degrees. FRED outperforms CHOKe in throttling the attacks, but it is slightly inferior to CHOKe in time performance.

  10. Optimal Attack Strategy in Random Scale-Free Networks Based on Incomplete Information

    Institute of Scientific and Technical Information of China (English)

    LI Jun; WU Jun; LI Yong; DENG Hong-Zhong; TAN Yue-Jin

    2011-01-01

    @@ We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes.We investigate the optimal attack strategy in random scale-free networks both analytically and numerically.We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies.It is found that when the attack intensity is small, the attacker should attack more nodes in the "white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the "black area" in which we can not obtain attack information.Moreover, we show that there is an inflection point in the curve of optimal attack proportion.For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.%We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes. We investigate the optimal attack strategy in random scale-free networks both analytically and numerically. We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies. It is found that when the attack intensity is small, the attacker should attack more nodes in the "white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the "black area" in which we can not obtain attack information. Moreover, we show that there is an inflection point in the curve of optimal attack proportion. For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.

  11. Research and Implementation of Three HTTPS Attacks

    Directory of Open Access Journals (Sweden)

    Kefei Cheng

    2011-05-01

    Full Text Available With the rapid development of network applications, the issues of Network transmission security become very important. Therefore, SSL protocol is more and more widely used in a variety of network services. But the SSL protocol itself is not perfect, in practice, there are also problems. For the deficiencies of endpoint authentication in the SSL handshake process, the paper analyzes two kinds of defects existing in the SSL hand-shake process. Firstly, handshake process, in the first stage of the SSL connection, using plaintexts, existing the possibility of  being monitored and tampered. Secondly, SSL deployment of the actual application. Because of considering the factors about the performance of the network connection, that usually uses the way of switch connection based on HTTP protocol. In response to these deficiencies, this thesis adopts the two ways of forged certificates and converting the data stream from HTTPS to HTTP to attack them. In addition, a new attack mode against the data stream of HTTPS is designed and implemented. Experiments show that the above three methods cause significant security risks to HTTPS communications. Therefore, taking a static ARP table, enhanced certificate mechanism and mutual authentication of three different measures are proposed to enhance network security in the paper. It is shown that three ways can relative effectively defense against attacks on HTTPS in the experiments.

  12. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  13. Attacks Prevention and Detection Techniques In MANET: A Survey

    Directory of Open Access Journals (Sweden)

    Pranjali D. Nikam,

    2014-11-01

    Full Text Available Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node which is dynamically moves from one location to another location. Both attacks Active as well as Passive attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as compare to wired networks. In last few years many security and attacks issue are face many researchers in MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks and Packet modification attacks found in MANET. At the time of data communication all the above mentioned attacks access data easily without permission. To solve the problem of attacks in MANET and secure data communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid algorithm for secure intrusion detection in MANET.

  14. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Yee Wei; Hartel, Pieter; Hartog, den Jerry; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. W

  15. Acromegaly according to the Danish National Registry of Patients: how valid are ICD diagnoses and how do patterns of registration affect the accuracy of registry data?

    OpenAIRE

    Dal J; Skou N; Nielsen EH; Jørgensen JOL; Pedersen L

    2014-01-01

    Jakob Dal,1 Nikolaj Skou,1 Eigil Husted Nielsen,2 Jens Otto Lunde Jørgensen,1 Lars Pedersen3 1Department of Endocrinology, Aarhus University Hospital, Aarhus, 2Department of Endocrinology, Aalborg University Hospital, Aalborg, 3Department of Clinical Epidemiology, Aarhus University Hospital, Aarhus, Denmark Background: The incidence of acromegaly is uncertain, since population-based studies are few. In the absence of a specific acromegaly registry, the Danish National Registry of ...

  16. Setting and registry characteristics affect the prevalence and nature of multimorbidity in the elderly.

    NARCIS (Netherlands)

    Schram, M.T.; Frijters, D.; Lisdonk, E.H. van de; Ploemacher, J.; Craen, A.J.M. de; Waal, M.W.M. de; Rooij, F.J. van; Heeringa, J.; Hofman, A.; Deeg, D.J.H.; Schellevis, F.G.

    2008-01-01

    The aim of the study was to investigate how settings and registry characteristics affect the prevalence and nature of multimorbidity in elderly individuals. We used data from three population-based studies, two general practitioner registries, one hospital discharge register, and one nursing home re

  17. Myositis registries and biorepositories: powerful tools to advance clinical, epidemiologic and pathogenic research

    Science.gov (United States)

    Rider, Lisa G.; Dankó, Katalin; Miller, Frederick W.

    2016-01-01

    Purpose of review Clinical registries and biorepositories have proven extremely useful in many studies of diseases, especially rare diseases. Given their rarity and diversity, the idiopathic inflammatory myopathies, or myositis syndromes, have benefited from individual researchers’ collections of cohorts of patients. Major efforts are being made to establish large registries and biorepositories that will allow many additional studies to be performed that were not possible before. Here we describe the registries developed by investigators and patient support groups that are currently available for collaborative research purposes. Recent findings We have identified 46 myositis research registries, including many with biorepositories, which have been developed for a wide variety of purposes and have resulted in great advances in understanding the range of phenotypes, clinical presentations, risk factors, pathogenic mechanisms, outcome assessment, therapeutic responses, and prognoses. These are now available for collaborative use to undertake additional studies. Two myositis patient registries have been developed for research, and myositis patient support groups maintain demographic registries with large numbers of patients available to be contacted for potential research participation. Summary Investigator-initiated myositis research registries and biorepositories have proven extremely useful in understanding many aspects of these rare and diverse autoimmune diseases. These registries and biorepositories, in addition to those developed by myositis patient support groups, deserve continued support to maintain the momentum in this field as they offer major opportunities to improve understanding of the pathogenesis and treatment of these diseases in cost-effective ways. PMID:25225838

  18. Medical Specialty Society Sponsored Data Registries – Opportunities in Plastic Surgery

    Science.gov (United States)

    Hume, Keith M.; Crotty, Catherine A.; Simmons, Christopher J.; Neumeister, Michael W.; Chung, Kevin C.

    2014-01-01

    Clinical data registries are commonly used worldwide and are implemented for a variety of purposes ranging from physician or facility clinic logs for tracking patients, collecting outcomes data, to measuring quality improvement or safety of medical devices. In the United States, the Food and Drug Administration has used data collected through registries to facilitate the drug and device regulatory process, ongoing surveillance during the product life-cycle, and for disease appraisals. Furthermore, the Centers for Medicare and Medicaid Services, in certain instances, base registry participation and submitting data to registries as factors for reimbursement decisions. The purpose of this article is to discuss the use of clinical data registries, the role that medical specialty societies, in particular the American Society of Plastic Surgeons and The Plastic Surgery Foundation, can have in the development and management of registries, and the opportunities for registry use in Plastic Surgery. As outcomes data are becoming essential measures of quality healthcare delivery, participating in registry development and centralized data collection has become a critical effort for Plastic Surgery to engage in to proactively participate in the national quality and performance measurement agenda. PMID:23806935

  19. Treatment of autoinflammatory diseases: results from the Eurofever Registry and a literature review

    NARCIS (Netherlands)

    Haar, N. Ter; Lachmann, H.; Ozen, S.; Woo, P.; Uziel, Y.; Modesto, C.; Kone-Paut, I.; Cantarini, L.; Insalaco, A.; Neven, B.; Hofer, M.; Rigante, D.; Al-Mayouf, S.; Touitou, I.; Gallizzi, R.; Papadopoulou-Alataki, E.; Martino, S.; Kuemmerle-Deschner, J.; Obici, L.; Iagaru, N.; Simon, A.; Nielsen, S.; Martini, A.; Ruperto, N.; Gattorno, M.; Frenkel, J.

    2013-01-01

    OBJECTIVE: To evaluate the response to treatment of autoinflammatory diseases from an international registry and an up-to-date literature review. METHODS: The response to treatment was studied in a web-based registry in which clinical information on anonymised patients with autoinflammatory diseases

  20. Validation of spontaneous abortion diagnoses in the Danish National Registry of Patients

    DEFF Research Database (Denmark)

    Lohse, Sarah Rytter; Farkas, Dóra Körmendiné; Lohse, Nicolai;

    2010-01-01

    The purpose of this study is to validate the diagnosis of spontaneous abortion (SA) recorded in the Danish National Registry of Patients (DNRP).......The purpose of this study is to validate the diagnosis of spontaneous abortion (SA) recorded in the Danish National Registry of Patients (DNRP)....