WorldWideScience

Sample records for attack registry rationale

  1. The International Takotsubo Registry: Rationale, Design, Objectives, and First Results.

    Science.gov (United States)

    Ghadri, Jelena-R; Cammann, Victoria L; Templin, Christian

    2016-10-01

    Takotsubo syndrome (TTS) was first described in Japan in 1990. The clinical presentation is similar to that of acute coronary syndrome (ACS). Cardiac enzymes are commonly elevated. A global initiative was launched and the InterTAK Registry was established to provide a systematic database. The major goals of the International Takotsubo Registry (InterTAK Registry) are to provide a comprehensive clinical characterization on natural history, treatment, and outcomes. We linked a biorepository to identify biomarkers for the diagnosis and prognosis and to investigate the genetic basis as well as disease-related factors. We focus on the rationale, objectives, design, and first results of the InterTAK Registry. PMID:27638029

  2. Rationale, design, methodology and hospital characteristics of the first gulf acute heart failure registry (gulf care

    Directory of Open Access Journals (Sweden)

    Kadhim J Sulaiman

    2014-01-01

    Full Text Available Background: There is paucity of data on heart failure (HF in the Gulf Middle East. The present paper describes the rationale, design, methodology and hospital characteristics of the first Gulf acute heart failure registry (Gulf CARE. Materials and Methods: Gulf CARE is a prospective, multicenter, multinational registry of patients >18 year of age admitted with diagnosis of acute HF (AHF. The data collected included demographics, clinical characteristics, etiology, precipitating factors, management and outcomes of patients admitted with AHF. In addition, data about hospital readmission rates, procedures and mortality at 3 months and 1-year follow-up were recorded. Hospital characteristics and care provider details were collected. Data were entered in a dedicated website using an electronic case record form. Results: A total of 5005 consecutive patients were enrolled from February 14, 2012 to November 13, 2012. Forty-seven hospitals in 7 Gulf States (Oman, Saudi Arabia, Yemen, Kuwait, United Gulf Emirates, Qatar and Bahrain participated in the project. The majority of hospitals were community hospitals (46%; 22/47 followed by non-University teaching (32%; 15/47 and University hospitals (17%. Most of the hospitals had intensive or coronary care unit facilities (93%; 44/47 with 59% (28/47 having catheterization laboratory facilities. However, only 29% (14/47 had a dedicated HF clinic facility. Most patients (71% were cared for by a cardiologist. Conclusions: Gulf CARE is the first prospective registry of AHF in the Middle East, intending to provide a unique insight into the demographics, etiology, management and outcomes of AHF in the Middle East. HF management in the Middle East is predominantly provided by cardiologists. The data obtained from this registry will help the local clinicians to identify the deficiencies in HF management as well as provide a platform to implement evidence based preventive and treatment strategies to reduce the burden

  3. The Vermont oxford neonatal encephalopathy registry: rationale, methods, and initial results

    Directory of Open Access Journals (Sweden)

    Pfister Robert H

    2012-06-01

    Full Text Available Abstract Background In 2006, the Vermont Oxford Network (VON established the Neonatal Encephalopathy Registry (NER to characterize infants born with neonatal encephalopathy, describe evaluations and medical treatments, monitor hypothermic therapy (HT dissemination, define clinical research questions, and identify opportunities for improved care. Methods Eligible infants were ≥ 36 weeks with seizures, altered consciousness (stupor, coma during the first 72 hours of life, a 5 minute Apgar score of ≤ 3, or receiving HT. Infants with central nervous system birth defects were excluded. Results From 2006–2010, 95 centers registered 4232 infants. Of those, 59% suffered a seizure, 50% had a 5 minute Apgar score of ≤ 3, 38% received HT, and 18% had stupor/coma documented on neurologic exam. Some infants experienced more than one eligibility criterion. Only 53% had a cord gas obtained and only 63% had a blood gas obtained within 24 hours of birth, important components for determining HT eligibility. Sixty-four percent received ventilator support, 65% received anticonvulsants, 66% had a head MRI, 23% had a cranial CT, 67% had a full channel encephalogram (EEG and 33% amplitude integrated EEG. Of all infants, 87% survived. Conclusions The VON NER describes the heterogeneous population of infants with NE, the subset that received HT, their patterns of care, and outcomes. The optimal routine care of infants with neonatal encephalopathy is unknown. The registry method is well suited to identify opportunities for improvement in the care of infants affected by NE and study interventions such as HT as they are implemented in clinical practice.

  4. Dutch Chronic Pancreatitis Registry (CARE) : Design and rationale of a nationwide prospective evaluation and follow-up

    NARCIS (Netherlands)

    Ali, U. Ahmed; Issa, Y.; van Goor, H.; van Eijck, C. H.; Nieuwenhuijs, V. B.; Keulemans, Y.; Fockens, P.; Busch, O. R.; Drenth, J. P.; Dejong, C. H.; van Dullemen, H. M.; van Hooft, J. E.; Siersema, P. D.; Spanier, B. W. M.; Poley, J. W.; Poen, A. C.; Timmer, R.; Seerden, T.; Tan, A. C.; Thijs, W. J.; Witteman, B. J. M.; Romkens, T. E. H.; Roeterdink, A. J.; Gooszen, H. G.; Van Santvoort, H. C.; Bruno, M. J.; Boermeester, M. A.

    2015-01-01

    Background: Chronic pancreatitis is a complex disease with many unanswered questions regarding the natural history and therapy. Prospective longitudinal studies with long-term follow-up are warranted. Methods: The Dutch Chronic Pancreatitis Registry (CARE) is a nationwide registry aimed at prospecti

  5. Predictive value of stroke and transient ischemic attack discharge diagnoses in the Danish National Registry of Patients

    DEFF Research Database (Denmark)

    Johnsen, Søren P; Overvad, Kim; Sørensen, Henrik Toft;

    2002-01-01

    We examined the predictive value of the discharge diagnoses of stroke and transient ischemic attack (TIA) in The National Registry of Patients (NRP) for participants in the Danish cohort study “Diet, Cancer, and Health.” We retrieved all probable incident registered cases of stroke and TIA, i...... and intracerebral hemorrhage were confirmed in 14 of 29 cases (48.3%, 95% CI: 29.4–67.5%), and 23 of 35 cases (65.7%, 95% CI: 47.8–80.9%), respectively. By contrast, ischemic stroke and unspecified stroke were confirmed in 99 of 113 cases (87.6%, 95% CI: 80.1–93.1%) and 152 of 200 cases (76.0%, 95% CI: 69...

  6. Evaluation oF FactORs ImpacTing CLinical Outcome and Cost EffectiveneSS of the S-ICD: Design and Rationale of the EFFORTLESS S-ICD Registry

    DEFF Research Database (Denmark)

    Pedersen, Susanne S; Lambiase, Pier; Boersma, Lucas V A;

    2012-01-01

    or in the vasculature. We present the rationale and study design of the Evaluation oF FactORs ImpacTing CLinical Outcome and Cost EffectiveneSS of the S-ICD (EFFORTLESS S-ICD) Registry which was designed to evaluate the long-term performance of the S-ICD including patient quality of life and long-term resource...

  7. Trends in the Attack Rates, Incidence, and Mortality of Stroke during 1986–2012: Data of Kaunas (Lithuania) Stroke Registry

    Science.gov (United States)

    Radisauskas, Ricardas; Malinauskiene, Vilija; Milinaviciene, Egle; Kranciukaite-Butylkiniene, Daina; Tamosiunas, Abdonas; Bernotiene, Gailute; Luksiene, Dalia; Milasauskiene, Zemyna; Sopagiene, Diana; Rastenyte, Daiva

    2016-01-01

    Background There is a lack of reliable epidemiological data on longitudinal trends in stroke attack rates, incidence, and mortality in the countries of the Baltic region. Aims The aim of the present study was to explore the longitudinal trends of stroke in middle-aged urban population of Lithuania during the period of 1986 through 2012. Methods All stroke events in the studied population were ascertained and validated according to the standardized criteria outlined by the WHO MONICA Project. The study included all patients in Kaunas (Lithuania) city aged 25 to 64 years who experienced a stroke between 1986 and 2012. Estimates of time-trends of the annual percentage change in stroke attack rates, incidence of stroke, and mortality from this condition were made by applying the Joinpoint regression analysis. Results During the study period, 9,992 stroke events were registered. The overall proportion of recurrent events was 25.7%. Overall, 18.9% of the events (20.0% in men, and 17.4% in women) were fatal within 28 days. During the period of 1986 to 2012, a flat trend in the incidence of stroke was observed among both male and female middle-aged inhabitants of Kaunas city, while attack rates were increasing due to the increase in recurrent strokes. Both mortality and 28-day case fatality of stroke declined significantly over the study period in both sexes. Conclusions An increase both in the incidence and recurrence of stroke among middle-aged men residing in Kaunas city and in the recurrence of stroke among women denotes the inefficiency of measures applied both for primary and secondary prevention of stroke in Lithuania. The revision of current prevention strategies and the introduction of new ones are of paramount importance in order to fight the epidemic of stroke. PMID:27124412

  8. The management of acute venous thromboembolism in clinical practice – study rationale and protocol of the European PREFER in VTE Registry

    OpenAIRE

    Agnelli, Giancarlo; Gitt, Anselm K; Bauersachs, Rupert; Fronk, Eva-Maria; Laeis, Petra; Mismetti, Patrick; Monreal, Manuel; Willich, Stefan N.; Wolf, Wolf-Peter; Cohen, Alexander T.; ,

    2015-01-01

    Background Venous thromboembolism (VTE) is a major health problem, with over one million events every year in Europe. However, there is a paucity of data on the current management in real life, including factors influencing treatment pathways, patient satisfaction, quality of life (QoL), and utilization of health care resources and the corresponding costs. The PREFER in VTE registry has been designed to address this and to understand medical care and needs as well as potential gaps for improv...

  9. Safety and efficacy of intensive vs. guideline antiplatelet therapy in high‐risk patients with recent ischemic stroke or transient ischemic attack: rationale and design of the Triple Antiplatelets for Reducing Dependency after Ischaemic Stroke (TARDIS) trial (ISRCTN47823388)

    OpenAIRE

    ,

    2015-01-01

    Rationale The risk of recurrence following a stroke or transient ischemic attack is high, especially immediately after the event. Hypothesis Because two antiplatelet agents are superior to one in patients with non‐cardioembolic events, more intensive treatment might be even more effective. Sample size estimates The sample size of 4100 patients will allow a shift to less recurrence, and less severe recurrence, to be detected (odds ratio 0·68) with 90% power at 5% significance. Methods and desi...

  10. Nanomaterial Registry

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Nanomaterial Registry compiles data from multiple databases into a single resource. The goal of this resource is to establish a curated nanomaterial registry,...

  11. Clinical Case Registries (CCR)

    Data.gov (United States)

    Department of Veterans Affairs — The Clinical Case Registries (CCR) replaced the former Immunology Case Registry and the Hepatitis C Case Registry with local and national databases. The CCR:HIV and...

  12. Stroke Trials Registry

    Science.gov (United States)

    ... News About Neurology Image Library Search The Internet Stroke Center Trials Registry Clinical Trials Interventions Conditions Sponsors ... a clinical trial near you Welcome to the Stroke Trials Registry Our registry of clinical trials in ...

  13. Impact of Frailty and Other Geriatric Syndromes on Clinical Management and Outcomes in Elderly Patients With Non-ST-Segment Elevation Acute Coronary Syndromes: Rationale and Design of the LONGEVO-SCA Registry.

    Science.gov (United States)

    Alegre, Oriol; Ariza-Solé, Albert; Vidán, María T; Formiga, Francesc; Martínez-Sellés, Manuel; Bueno, Héctor; Sanchís, Juan; López-Palop, Ramón; Abu-Assi, Emad; Cequier, Àngel

    2016-07-01

    The incidence of acute coronary syndromes (ACS) is high in the elderly. Despite a high prevalence of frailty and other aging-related variables, little information exists about the optimal clinical management in patients with coexisting geriatric syndromes. The aim of the LONGEVO-SCA registry (Impacto de la Fragilidad y Otros Síndromes Geriátricos en el Manejo y Pronóstico Vital del Anciano con Síndrome Coronario Agudo sin Elevación de Segmento ST) is to assess the impact of aging-related variables on clinical management, prognosis, and functional status in elderly patients with ACS. A series of 500 consecutive octogenarian patients with non-ST-segment elevation ACS from 57 centers in Spain will be included. A comprehensive geriatric assessment will be performed during the admission, assessing functional status (Barthel Index, Lawton-Brody Index), frailty (FRAIL scale, Short Physical Performance Battery), comorbidity (Charlson Index), nutritional status (Mini Nutritional Assessment-Short Form), and quality of life (Seattle Angina Questionnaire). Patients will be managed according to current recommendations. The primary outcome will be the description of mortality and its causes at 6 months. Secondary outcomes will be changes in functional status and quality of life. Results from this study might significantly improve the knowledge about the impact of aging-related variables on management and outcomes of elderly patients with ACS. Clinical management of these patients has become a major health care problem due to the growing incidence of ACS in the elderly and its particularities. PMID:27362592

  14. Panic Attack or Heart Attack?

    Science.gov (United States)

    Panic Attack or Heart Attack? Diagnosing heart disease in women A Healthy Hearts Guide ® Heart disease in women is often mistaken for panic attack with shortness of breath, anxiety, palpitations and indigestion. ...

  15. The Virtual Observatory Registry

    CERN Document Server

    Demleitner, Markus; Sidaner, Pierre Le; Plante, Raymond L

    2014-01-01

    In the Virtual Observatory (VO), the Registry provides the mechanism with which users and applications discover and select resources -- typically, data and services -- that are relevant for a particular scientific problem. Even though the VO adopted technologies in particular from the bibliographic community where available, building the Registry system involved a major standardisation effort, involving about a dozen interdependent standard texts. This paper discusses the server-side aspects of the standards and their application, as regards the functional components (registries), the resource records in both format and content, the exchange of resource records between registries (harvesting), as well as the creation and management of the identifiers used in the system based on the notion of authorities. Registry record authors, registry operators or even advanced users thus receive a big picture serving as a guideline through the body of relevant standard texts. To complete this picture, we also mention comm...

  16. Facility Registry Service (FRS)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Facility Registry Service (FRS) provides an integrated source of comprehensive (air, water, and waste) environmental information about facilities across EPA,...

  17. What are cancer registries

    Directory of Open Access Journals (Sweden)

    Miladinov-Mikov Marica

    2004-01-01

    Full Text Available Introduction Population-based cancer registries attempt to collect, process, analyze, store and interpret data on persons with cancer in a certain population (most frequently a geographical area. Hospital-based cancer registries register all cases in a given hospital, usually without knowledge of the background population; the emphasis is to serve the needs of the hospital administration, the hospital cancer program, and, above all, the individual patient. History of Cancer Registries Registration of persons suffering from cancer is a slow process. Around the year 1900, England and Germany demanded improvement of statistical investigation on spread of cancer in population in order to undertake etiological researches. The oldest example of a modern cancer registry is that in Hamburg. Today there are more than 200 population-based cancer registries, but they cover only 5% of the world population, mainly in developed countries of the world. Cancer registry of Vojvodina Cancer registry of Vojvodina was established in 1966; it is a member of International Agency for Research on Cancer (IARC and it is still the only cancer registry from our country whose data are cited in scientific monographs of IARC. The main purpose of cancer registries is to produce statistics on the occurrence of cancer in a defined populatin and to provide a framework for assessing and controlling the impact of cancer on the community. Cancer registries are essential parts of any rational program of cancer control. Their data can be used in a wide variety of areas of cancer control, ranging from etiological research in epidemiology, through primary and secondary prevention to health-care planning and patient care, so benefiting both the individual and society.

  18. The Norwegian Twin Registry.

    Science.gov (United States)

    Nilsen, Thomas S; Brandt, Ingunn; Magnus, Per; Harris, Jennifer R

    2012-12-01

    Norway has a long-standing tradition in twin research, but the data collected in several population-based twin studies were not coordinated centrally or easily accessible to the scientific community. In 2009, the Norwegian Twin Registry was established at the Norwegian Institute of Public Health (NIPH) in Oslo with the purpose of creating a single research resource for Norwegian twin data. As of today, the Norwegian Twin Registry contains 47,989 twins covering birth years 1895-1960 and 1967-1979; 31,440 of these twins consented to participate in health-related research. In addition, DNA from approximately 4,800 of the twins is banked at the NIPH biobank and new studies are continually adding new data to the registry. The value of the Norwegian twin data is greatly enhanced by the linkage opportunities offered by Norway's many nationwide registries, spanning a broad array of medical, demographic, and socioeconomic information.

  19. Data Element Registry Services

    Data.gov (United States)

    U.S. Environmental Protection Agency — Data Element Registry Services (DERS) is a resource for information about value lists (aka code sets / pick lists), data dictionaries, data elements, and EPA data...

  20. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  1. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  2. Trauma registry reengineered.

    Science.gov (United States)

    Wargo, Christina; Bolig, Nicole; Hixson, Heather; McWilliams, Nate; Rummerfield, Heather; Stratton, Elaine; Woodruff, Tracy

    2014-01-01

    A successful trauma registry balances accuracy of abstraction and timeliness of case submissions to achieve quality performance. Staffing to achieve quality performance is a challenge at times based on competitive institutional need. The aim of this performance improvement timing study was to identify trauma registry job responsibilities and redesign the responsibilities to create increased abstraction time and maintain accuracy of data abstraction. The outcome is measured by case submission rates with existing staffing and interrater reliability outcomes. PMID:25397337

  3. Heart Attack

    Science.gov (United States)

    ... having another heart attack. These medicines include: aspirin, beta blockers, statins, ACE inhibitors and fish oil. Your doctor ... have had a stent placed in your heart. Beta blockers are a group of drugs that lower the ...

  4. Panic Attack

    OpenAIRE

    Scantamburlo, Gabrielle; Ansseau, Marc

    2004-01-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. Peer reviewed

  5. [Panic attack].

    Science.gov (United States)

    Scantamburlo, G; Ansseau, M

    2004-05-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. PMID:15264579

  6. International practice of rheumatoid arthritis registries. Foreign registries

    OpenAIRE

    Azamat Makhmudovich Satybaldyev; D E Karateev

    2014-01-01

    Review of the USA, Argentina, Australia, Japan, and European Union registries is presented. The similarities and differences between the registries in terms of populations of rheumatoid arthritis patients and the target goals are studied

  7. Psoriatic Arthritis Registries.

    Science.gov (United States)

    Sarzi-Puttini, Piercarlo; Varisco, Valentina; Ditto, Maria Chiara; Benucci, Maurizio; Atzeni, Fabiola

    2015-11-01

    The introduction of new biological drugs for the treatment of rheumatoid arthritis and spondyloarthritis has led to the creation of a number of registries in Europe and the United States. Most of them are sponsored by national rheumatology societies, and provide information that is useful in clinical practice concerning the clinical characteristics, efficacy, and safety of all licensed biological drugs. Their findings also help to improve our understanding of the quality of life and working ability of patients receiving biological drugs, and suggest methods for allocating resources. However, there are only a few registries for psoriatic arthritis, and efforts should be made to increase their number to obtain further reliable and useful data.

  8. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  9. Malaysian Twin Registry.

    Science.gov (United States)

    Jahanfar, Shayesteh; Jaffar, Sharifah Halimah

    2013-02-01

    The National Malaysian Twin Registry was established in Royal College of Medicine, Perak, University Kuala Lumpur (UniKL) in June 2008 through a grant provided by UniKL. The general objective is to facilitate scientific research involving participation of twins and their family members in order to answer questions of health and wellbeing relevant to Malaysians. Recruitment is done via mass media, poster, and pamphlets. We now have 266 adult and 204 children twins registered. Several research projects including reproductive health study of twins and the role of co-bedding on growth and development of children are carried out. Registry holds annual activities for twins and seeks to provide health-related information for twins. We seek international collaboration.

  10. Mars attacks.

    Science.gov (United States)

    Cohain, Judy Slome

    2008-01-01

    "Mars Attacks" is a new term coined to describe unjustified violation of women by care providers at the time of birth, as well as the purposeful abandonment of the peer review system by major obstetric journals and the abandonment of the use of research evidence by ACOG in their latest protocols, in order to justify continued use of this form of violence against women. PMID:19244777

  11. Does Design Rationale Enhance Creativity?

    OpenAIRE

    Jing Wang; Umer Farooq; John M. Carroll

    2010-01-01

    Creativity and rationale are often viewed as two contrasting facets in software design. A lack in recognizing the facilitative relationship between creativity and rationale not only underestimates the benefits designers can obtain from rationale practices, but also confines the approaches that support creativity in software design. Our exploratory study provides empirical evidence of the positive correlation between rationale and creativity. Furthermore, we found that the feasibility of desig...

  12. Does Design Rationale Enhance Creativity?

    Directory of Open Access Journals (Sweden)

    Jing Wang

    2010-01-01

    Full Text Available Creativity and rationale are often viewed as two contrasting facets in software design. A lack in recognizing the facilitative relationship between creativity and rationale not only underestimates the benefits designers can obtain from rationale practices, but also confines the approaches that support creativity in software design. Our exploratory study provides empirical evidence of the positive correlation between rationale and creativity. Furthermore, we found that the feasibility of design alternatives and the comprehensiveness of tradeoff evaluation are critical to enhancing novelty, persuasiveness, and insightfulness. We also discuss future directions to further understand how these properties, or rationale quality in general, affects design creativity.

  13. National registry of myocardial infarction

    OpenAIRE

    Amin Daemi; Mehdi Jafari

    2016-01-01

    The Registry of Myocardial Infarctions (MI Registry) is a national registry in Iran that collects and reports the data on myocardial infarctions. Its main advantage is that it covers the whole country and is mandatory for hospitals to register the MI cases in it. Then, the qualified individuals at the provincial and national levels can get intended reports and make appropriate decisions. Such reports, further to the policy makers and managers, can be very valuable for researchers. The regi...

  14. Heart Attack Risk Assessment

    Science.gov (United States)

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  15. Worldwide variability in deceased organ donation registries

    OpenAIRE

    Rosenblum, Amanda M.; Li, Alvin Ho-Ting; Roels, Leo; Stewart, Bryan; Prakash, Versha; Beitel, Janice; Young, Kimberly; Shemie, Sam; Nickerson, Peter; Garg, Amit X

    2012-01-01

    The variability in deceased organ donation registries worldwide has received little attention. We considered all operating registries, where individual wishes about organ donation were recorded in a computerized database. We included registries which recorded an individual's decision to be a donor (donor registry), and registries which only recorded an individual's objection (non-donor registry). We collected information on 15 characteristics including history, design, use and number of regis...

  16. Agoraphobic behavior and panic attack: a study of male twins.

    Science.gov (United States)

    Tsuang, Ming; Domschke, Katharina; Jerskey, Beth A; Lyons, Michael J

    2004-01-01

    We used data from 3372 pairs of male twins from the Vietnam Era Twin Registry to examine comorbidity and familial influences on the frequently observed association between agoraphobic behavior and panic. Due to low prevalence of DSM-III-R-defined panic disorder, we also examined subjects who had experienced at least one panic attack during their lives. Agoraphobic behavior among individuals with a history of panic attacks showed familial aggregation (odds ratio = 5.7; P = .018 ). Probands with panic attacks and agoraphobic behavior and their co-twins had higher risk of major depression than probands without agoraphobic avoidance and their co-twins (P = .01). Groups did not differ for alcohol dependence or antisocial personality. Agoraphobic behavior associated with panic attack is familial and associated with comorbid major depression. Agoraphobia following panic attack does not seem to reflect severity as agoraphobic behavior in the proband was unrelated to risk of panic attacks in the co-twin. PMID:15474853

  17. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  18. Rationale Management Challenges in Requirements Engineering

    NARCIS (Netherlands)

    Liang, Peng; Avgeriou, Paris; He, Keqing

    2010-01-01

    Rationale and rationale management have been playing an increasingly prominent role in software system development mainly due to the knowledge demand during system evaluation, maintenance, and evolution, especially for large and complex systems. The rationale management for requirements engineering,

  19. Worldwide variability in deceased organ donation registries.

    Science.gov (United States)

    Rosenblum, Amanda M; Li, Alvin Ho-Ting; Roels, Leo; Stewart, Bryan; Prakash, Versha; Beitel, Janice; Young, Kimberly; Shemie, Sam; Nickerson, Peter; Garg, Amit X

    2012-08-01

    The variability in deceased organ donation registries worldwide has received little attention. We considered all operating registries, where individual wishes about organ donation were recorded in a computerized database. We included registries which recorded an individual's decision to be a donor (donor registry), and registries which only recorded an individual's objection (non-donor registry). We collected information on 15 characteristics including history, design, use and number of registrants for 27 registries (68%). Most registries are nationally operated and government-owned. Registrations in five nations expire and require renewal. Some registries provide the option to make specific organ selections in the donation decision. Just over half of donor registries provide legally binding authorization to donation. In all national donor registries, except one, the proportion of adults (15+) registered is modest (donation decision mandatory to obtain a driver's license. Registered objections in non-donor registries are rare (organ donor registries worldwide necessitates public discourse and quality improvement initiatives, to identify and support leading practices in registry use. PMID:22507140

  20. Environmental Agents Service (EAS) Registry System of Records

    Data.gov (United States)

    Department of Veterans Affairs — The Environmental Agent Service (EAS) Registries is the information system encompassing the Ionizing Radiation Registry (IRR), the Agent Orange Registry (AOR), and...

  1. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio......-technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  2. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  3. Breast and Colon Cancer Family Registries

    Science.gov (United States)

    The Breast Cancer Family Registry and the Colon Cancer Family Registry were established by the National Cancer Institute as a resource for investigators to use in conducting studies on the genetics and molecular epidemiology of breast and colon cancer.

  4. Essential Hypotension and Adaptability Registry

    Science.gov (United States)

    2016-05-30

    Blood Pressure; Depression; Panic Attack; Fibromyalgia; POTS; Inappropriate Sinus Tachycardia; Coronary Heart Disease; Acute Coronary Syndrome (ACS); Acute Myocardial Infarction (AMI); Cerebrovascular Disease (CVD); Transient Ischemic Attack (TIA); Atrial Fibrillation; Diabetes Mellitus; Cancer; Systolic Heart Failure; Diastolic Heart Failure; Chronic Fatigue Syndrome; Syncope; Vasovagal Syncope

  5. The danish multiple sclerosis registry

    DEFF Research Database (Denmark)

    Brønnum-Hansen, Henrik; Koch-Henriksen, Nils; Stenager, Egon

    2011-01-01

    Introduction: The Danish Multiple Sclerosis (MS) Registry was established in 1956. Content: The register comprises data on all Danes who had MS in 1949 or who have been diagnosed since. Data on new cases and updated information on persons with an MS diagnosis already notified are continuously...

  6. The Danish Shoulder Arthroplasty Registry

    DEFF Research Database (Denmark)

    Rasmussen, Jeppe; Jakobsen, John; Brorson, Stig;

    2012-01-01

    (70% women) were reported to the registry between January 2006 and December 2008. Mean age at surgery was 69 years (SD 12). The most common indications were a displaced proximal humeral fracture (54%) or osteoarthritis (30%). 61% were stemmed hemiarthroplasties, 28% resurfacing hemiarthroplasties, 8...

  7. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  8. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  9. 27 CFR 24.115 - Registry number.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Registry number. 24.115... OF THE TREASURY LIQUORS WINE Establishment and Operations Application § 24.115 Registry number. Upon approval of the application, the appropriate TTB officer will assign a registry number to the bonded...

  10. A renal registry for Africa: first steps.

    Science.gov (United States)

    Davids, M Razeen; Eastwood, John B; Selwood, Neville H; Arogundade, Fatiu A; Ashuntantang, Gloria; Benghanem Gharbi, Mohammed; Jarraya, Faiçal; MacPhee, Iain A M; McCulloch, Mignon; Plange-Rhule, Jacob; Swanepoel, Charles R; Adu, Dwomoa

    2016-02-01

    There is a dearth of data on end-stage renal disease (ESRD) in Africa. Several national renal registries have been established but have not been sustainable because of resource limitations. The African Association of Nephrology (AFRAN) and the African Paediatric Nephrology Association (AFPNA) recognize the importance of good registry data and plan to establish an African Renal Registry. This article reviews the elements needed for a successful renal registry and gives an overview of renal registries in developed and developing countries, with the emphasis on Africa. It then discusses the proposed African Renal Registry and the first steps towards its implementation. A registry requires a clear purpose, and agreement on inclusion and exclusion criteria, the dataset and the data dictionary. Ethical issues, data ownership and access, the dissemination of findings and funding must all be considered. Well-documented processes should guide data collection and ensure data quality. The ERA-EDTA Registry is the world's oldest renal registry. In Africa, registry data have been published mainly by North African countries, starting with Egypt and Tunisia in 1975. However, in recent years no African country has regularly reported national registry data. A shared renal registry would provide participating countries with a reliable technology platform and a common data dictionary to facilitate joint analyses and comparisons. In March 2015, AFRAN organized a registry workshop for African nephrologists and then took the decision to establish, for the first time, an African Renal Registry. In conclusion, African nephrologists have decided to establish a continental renal registry. This initiative could make a substantial impact on the practice of nephrology and the provision of services for adults and children with ESRD in many African countries.

  11. New registry: National Cancer Patient Registry--Colorectal Cancer.

    Science.gov (United States)

    Wendy, L; Radzi, M

    2008-09-01

    Colorectal cancer is emerging as one of the commonest cancers in Malaysia. Data on colorectal cancer from the National Cancer Registry is very limited. Comprehensive information on all aspects of colorectal cancer, including demographic details, pathology and treatment outcome are needed as the management of colorectal cancer has evolved rapidly over the years involving several disciplines including gastroenterology, surgery, radiology, pathology and oncology. This registry will be an important source of information that can help the development of guidelines to improve colorectal cancer care relevant to this country. The database will initially recruit all colorectal cancer cases from eight hospitals. The data will be stored on a customized web-based case report form. The database has begun collecting data from 1 October 2007 and will report on its first year findings at the end of 2008.

  12. Forensic Analysis of Windows Registry Against Intrusion

    Directory of Open Access Journals (Sweden)

    Haoyang Xie

    2012-03-01

    Full Text Available Windows Registry forensics is an important branch of computer and network forensics. Windows Registry is often considered as the heart of Windows Operating Systems because it contains allof the configuration setting of specific users, groups, hardware, software, and networks. Therefore, Windows Registry can be viewed as a gold mine of forensic evidences which could be used in courts. This paper introduces the basics of Windows Registry, describes its structure and its keys and subkeys thathave forensic values. This paper also discusses how the Windows Registry forensic keys can be applied in intrusion detection.

  13. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  14. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  15. Humanities Program: Critique and Rationale.

    Science.gov (United States)

    Pinar, William Frederick

    The psychological impact of schooling is examined within the context of a new school of British psychoanalytic thought. It is concluded that schooling is maddening, in the sense used by Laing, Cooper, and others. A rationale for a sane humanities program is established consisting of two components: the nuclear and the cortical. The nuclear is the…

  16. On the Cooperation of Independent Registries

    CERN Document Server

    Miraz, Matteo

    2010-01-01

    Registries play a key role in service-oriented applications. Originally, they were neutral players between service providers and clients. The UDDI Business Registry (UBR) was meant to foster these concepts and provide a common reference for companies interested in Web services. The more Web services were used, the more companies started create their own local registries: more efficient discovery processes, better control over the quality of published information, and also more sophisticated publication policies motivated the creation of private repositories. The number and heterogeneity of the different registries - besides the decision to close the UBR are pushing for new and sophisticated means to make different registries cooperate. This paper proposes DIRE (DIstributed REgistry), a novel approach based on a publish and subscribe (P/S) infrastructure to federate different heterogeneous registries and make them exchange information about published services. The paper discusses the main motivations for the P...

  17. What Is a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  18. What Causes a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Causes a Heart Attack? Coronary Heart Disease A heart attack happens if ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  19. Life After a Heart Attack

    Science.gov (United States)

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  20. The Danish National Prescription Registry

    DEFF Research Database (Denmark)

    Kildemoes, Helle Wallach; Toft Sørensen, Henrik; Hallas, Jesper

    2011-01-01

    Introduction: Individual-level data on all prescription drugs sold in Danish community pharmacies has since 1994 been recorded in the Register of Medicinal Products Statistics of the Danish Medicines Agency. Content: The register subset, termed the Danish National Prescription Registry (DNPR...... on the dispensed drug. Conclusion: The possibility of linkage with many other nationwide individual-level data sources renders the DNPR a very powerful pharmacoepidemiological tool...

  1. Building Computer Network Attacks

    CERN Document Server

    Futoransky, Ariel; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities of his network.

  2. Building Computer Network Attacks

    OpenAIRE

    Futoransky, Ariel; Notarfrancesco, Luciano; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities o...

  3. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  4. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  5. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  6. Evaluation of institutional cancer registries in Colombia.

    Science.gov (United States)

    Cuervo, L G; Roca, S; Rodríguez, M N; Stein, J; Izquierdo, J; Trujillo, A; Mora, M

    1999-09-01

    The four primary objectives of this descriptive study were to: 1) design a quality-measurement instrument for institutional cancer registries (ICRs), 2) evaluate the existing ICRs in Colombia with the designed instrument, 3) categorize the different registries according to their quality and prioritize efforts that will efficiently promote better registries with the limited resources available, and 4) determine the institution with the greatest likelihood of successfully establishing Colombia's second population-based cancer registry. In 1990 the National Cancer Institute of Colombia developed 13 institution-based cancer registries in different Colombian cities in order to promote the collection of data from a large group of cancer diagnostic and treatment centers. During the first half of 1997, this evaluation reviewed 12 registries; one of the original 13 no longer existed. All of the Colombian institutions (hospitals) that maintain institution-based cancer registries were included in the study. At each institution, a brief survey was administered to the hospital director, the registry coordinator, and the registrar (data manager). Researchers investigated the institutions by looking at six domains that are in standard use internationally. Within each domain, questions were developed and selected through the Delphi method. Each domain and each question were assigned weights through a consensus process. In most cases, two interviewers went to each site to collect the information. The university hospitals in Cali, Pereira, and Medellín had substantially higher scores, reflecting a good level of performance. Four of the 12 institutions had almost no cancer registry work going on. Five of the 12 hospital directors considered that the information provided by the cancer registries influenced their administrative decisions. Three of the registries had patient survival data. Four of the institutions allocated specific resources to operate their cancer registries; in the

  7. [Current registry studies of acute ischemic stroke].

    Science.gov (United States)

    Veltkamp, R; Jüttler, E; Pfefferkorn, T; Purrucker, J; Ringleb, P

    2012-10-01

    Study registries offer the opportunity to evaluate the effects of new therapies or to observe the consequences of new treatments in clinical practice. The SITS-MOST registry confirmed the validity of findings from randomized trials on intravenous thrombolysis concerning safety and efficacy in the clinical routine. Current study registries concerning new interventional thrombectomy techniques suggest a high recanalization rate; however, the clinical benefit can only be evaluated in randomized, controlled trials. Similarly, the experiences of the BASICS registry on basilar artery occlusion have led to the initiation of a controlled trial. The benefit of hemicraniectomy in malignant middle cerebral artery infarction has been demonstrated by the pooled analysis of three randomized trials. Numerous relevant aspects are currently documented in the DESTINY-R registry. Finally, the recently started RASUNOA registry examines diagnostic and therapeutic aspects of ischemic and hemorrhagic stroke occurring during therapy with new oral anticoagulants.

  8. Tools and data services registry

    DEFF Research Database (Denmark)

    Ison, Jon; Rapacki, Kristoffer; Ménager, Hervé;

    2016-01-01

    a spectrum of scientific disciplines. The corpus of documentation of these resources is fragmented across the Web, with much redundancy, and has lacked a common standard of information. The outcome is that scientists must often struggle to find, understand, compare and use the best resources for the task...... is assured by a curation effort driven by and tailored to local needs, and shared amongst a network of engaged partners.As of September 2015, the registry includes 1633 resources, with depositions from 91 individual registrations including 40 institutional providers and 51 individuals. With community support...

  9. The gulf implantable cardioverter-defibrillator registry: Rationale, methodology, and implementation

    Directory of Open Access Journals (Sweden)

    Alawi A Alsheikh-Ali

    2015-01-01

    Conclusions: Gulf ICD is the first prospective, observational, multi-center, and multinational study of the characteristics and, the outcomes of patients receiving ICDs in the Arab Gulf region. The study will provide valuable insights into the utilization of and outcomes related to ICD therapy in the Gulf region.

  10. Private provider participation in statewide immunization registries

    Directory of Open Access Journals (Sweden)

    Cowan Anne E

    2006-02-01

    Full Text Available Abstract Background Population-based registries have been promoted as an effective method to improve childhood immunization rates, yet rates of registry participation in the private sector are low. We sought to describe, through a national overview, the perspectives of childhood immunization providers in private practice regarding factors associated with participation or non-participation in immunization registries. Methods Two mailed surveys, one for 264 private practices identified as registry non-participants and the other for 971 identified as registry participants, from 15 of the 31 states with population-based statewide immunization registries. Frequency distributions were calculated separately for non-participants and participants regarding the physician-reported factors that influenced decisions related to registry participation. Pearson chi-square tests of independence were used to assess associations among categorical variables. Results Overall response rate was 62% (N = 756. Among non-participants, easy access to records of vaccines provided at other sites (N = 101, 68% and printable immunization records (N = 82, 55% were most often cited as "very important" potential benefits of a registry, while the most commonly cited barriers to participation were too much cost/staff time (N = 36, 38% and that the practice has its own system for recording and monitoring immunizations (N = 35, 37%. Among registry participants, most reported using the registry to input data on vaccines administered (N = 326, 87% and to review immunization records of individual patients (N = 302, 81%. A minority reported using it to assess their practice's immunization coverage (N = 110, 29% or generate reminder/recall notices (N = 54, 14%. Few participants reported experiencing "significant" problems with the registry; the most often cited was cost/staff time to use the registry (N = 71, 20%. Conclusion Most registry participants report active participation with few

  11. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  12. Windows registry forensics advanced digital forensic analysis of the Windows registry

    CERN Document Server

    Carvey, Harlan

    2011-01-01

    Harlan Carvey brings readers an advanced book on Windows Registry - the most difficult part of Windows to analyze in forensics! Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. This book also has a DVD containing tools, instructions and videos.

  13. Service registry design: an information service approach

    NARCIS (Netherlands)

    Ferreira Pires, Luis; Oostrum, van Arjen; Wijnhoven, Fons; Wang, J.

    2010-01-01

    A service registry is a Service-Oriented Architecture (SOA) component that keeps a ‘catalogue’ of available services. It stores service specifications so that these specifications can be found by potential users. Discussions on the design of service registries currently focus on technical issues, wh

  14. 50 CFR 600.1410 - Registry process.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Registry process. 600.1410 Section 600.1410 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC... United States § 600.1410 Registry process. (a) A person may register through the NMFS web site at...

  15. The Western Denmark Cardiac Computed Tomography Registry

    DEFF Research Database (Denmark)

    Nielsen, Lene Hüche; Nørgaard, Bjarne Linde; Tilsted, Hans Henrik;

    2015-01-01

    BACKGROUND: As a subregistry to the Western Denmark Heart Registry (WDHR), the Western Denmark Cardiac Computed Tomography Registry (WDHR-CCTR) is a clinical database established in 2008 to monitor and improve the quality of cardiac computed tomography (CT) in Western Denmark. OBJECTIVE: We...

  16. Closure of varicella-zoster virus-containing vaccines pregnancy registry - United States, 2013.

    Science.gov (United States)

    Marin, Mona; Willis, English D; Marko, Ann; Rasmussen, Sonja A; Bialek, Stephanie R; Dana, Adrian

    2014-08-22

    Vaccines that contain live attenuated varicella-zoster virus (VZV) (Varivax, ProQuad, and Zostavax [all products of Merck & Co., Inc.]) are contraindicated during pregnancy. To monitor the pregnancy outcomes of women inadvertently vaccinated with VZV-containing vaccines immediately before or during pregnancy, Merck and CDC established the Merck/CDC Pregnancy Registry for VZV-Containing Vaccines in 1995. This report updates previously published summaries of registry data, provides the rationale for the closure of the registry, and describes plans for continued monitoring of the safety of these vaccines when inadvertently administered to pregnant women or immediately before pregnancy. From inception of the registry in 1995 through March 2012, no cases of congenital varicella syndrome and no increased prevalence of other birth defects have been detected among women vaccinated within 3 months before or during pregnancy. Although a small risk for congenital varicella syndrome cannot be ruled out, the number of exposures being registered each year (approximately two varicella-susceptible women exposed during the high-risk period for congenital varicella syndrome) is now too low to improve on the current estimate of the risk.

  17. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  18. Signs of a Heart Attack

    Science.gov (United States)

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  19. Central registry in psychiatry: A structured review

    Directory of Open Access Journals (Sweden)

    Jyoti Prakash

    2014-01-01

    Full Text Available Background: Central registry in psychiatry is being practiced in few countries and has been found useful in research and clinical management. Role of central registry has also expanded over the years. Materials and Methods: All accessible internet database Medline, Scopus, Embase were accessed from 1990 till date. Available data were systematically reviewed in structured manner and analyzed. Results: Central registry was found useful in epidemiological analysis, association studies, outcome studies, comorbidity studies, forensic issue, effective of medication, qualitative analysis etc., Conclusion: Central registry proves to be effective tool in quantitative and qualitative understanding of psychiatry practice. Findings of studies from central registry can be useful in modifying best practice and evidence based treatment in psychiatry.

  20. Firms' Rationales for Interaction with Research Universities

    OpenAIRE

    Broström, Anders

    2008-01-01

    R&D managers at 50 firms randomly selected from all firms who have formal relations with two research universities in Stockholm are being interviewed about their rationales for collaboration. Drawing on this material, a distinctive typology of rationales and the therewith associated effects from cooperative relations is presented. As expected, rationales related to innovation, in terms of invented or improved products or processes, are found to be the main drivers for interaction. As regards ...

  1. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  2. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  3. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for...

  4. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  5. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  6. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  7. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    OpenAIRE

    Yi-Hsun Wang; Ching-Hao Mao; Hahn-Ming Lee

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of...

  8. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  9. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  10. Substance Identification Information from EPA's Substance Registry

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Substance Registry Services (SRS) is the authoritative resource for basic information about substances of interest to the U.S. EPA and its state and tribal...

  11. EPA Facility Registry Service (FRS): RBLC

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  12. Linking Medicare, Medicaid, and Cancer Registry Data...

    Data.gov (United States)

    U.S. Department of Health & Human Services — Linking Medicare, Medicaid, and Cancer Registry Data to Study the Burden of Cancers in West Virginia In the United States, the elderly carry an unequal burden of...

  13. Veterans Affairs Central Cancer Registry (VACCR)

    Data.gov (United States)

    Department of Veterans Affairs — The Veterans Affairs Central Cancer Registry (VACCR) receives and stores information on cancer diagnosis and treatment constraints compiled and sent in by the local...

  14. EPA Facility Registry Service (FRS): SDWIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  15. EPA Facility Registry Service (FRS): RMP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  16. EPA Facility Registry Service (FRS): TRI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  17. EPA Facility Registry Service (FRS): ACRES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of sites that link...

  18. EPA Facility Registry Service (FRS): BRAC

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  19. The United States Transuranium and Uranium Registries

    International Nuclear Information System (INIS)

    The United States Transuranium and Uranium Registries are unique parallel research programs devoted to the study of the actinide elements in man. The primary mission of the Registries is to verify and ensure the adequacy and applicability of radiation protection standards for the actinides. To accomplish this task, the Registries utilize tissues obtained postmortem from informed volunteer donors with confirmed or high likelihood of exposure to plutonium, americium, or other actinides. These are collected at autopsy and radiochemically analyzed for actinide content. The results, along with relevant details of occupational and exposure history, medical history and health physics data are used to determine the distribution, biokinetics and dosimetry of the actinides in humans, and to correlate estimates of deposition and dose made during life with postmortem findings. Other important applications of the Registries' research is scaling of animal studies to man and validation or refinement of biokinetic models on which the safety standards are based

  20. EPA Facility Registry Service (FRS): OIL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link to the Oil...

  1. EPA Facility Registry Service (FRS): RADINFO

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  2. EPA Facility Registry Service (FRS): NCDB

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  3. EPA Facility Registry Service (FRS): RCRA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of hazardous waste...

  4. EPA Facility Registry Service (FRS): LANDFILL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of non-hazardous waste...

  5. EPA Facility Registry Service (FRS): CAMDBS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  6. EPA Facility Registry System (FRS): NCES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  7. The Italian registry of soft tissue tumors.

    Science.gov (United States)

    Clemente, C; Orazi, A; Rilke, F

    1988-01-01

    After a review of the incidence data on malignant soft-tissue tumors in Italy (Registro dei Tumori della Regione Lombardia, provincia di Varese), Europe (nine European Cancer Registries considered representative of various geographical areas) and extra-European countries (data of ten World Cancer Registries), the aim and the organization of the Italian Malignant Soft-Tissue Tumor Registry are described. The collection system is based on dedicated forms prepared for the computerization of all data. From 1.1.1985 to 31.3.1987, 207 cases of malignant and potentially malignant soft-tissue tumors entered the Registry, with exclusion of those sarcomas arising in viscera. The distribution, categorized by histologic type, sex and site, and the preliminary results on relapses and metastases are reported.

  8. EPA Facility Registry Service (FRS): NEI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  9. EPA Facility Registry Service (FRS): BIA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  10. EPA Facility Registry System (FRS): NEPT

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  11. EPA Facility Registry Service (FRS): ICIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  12. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  13. PCCR: Pancreatic Cancer Collaborative Registry.

    Science.gov (United States)

    Sherman, Simon; Shats, Oleg; Ketcham, Marsha A; Anderson, Michelle A; Whitcomb, David C; Lynch, Henry T; Ghiorzo, Paola; Rubinstein, Wendy S; Sasson, Aaron R; Grizzle, William E; Haynatzki, Gleb; Feng, Jianmin; Sherman, Alexander; Kinarsky, Leo; Brand, Randall E

    2011-01-01

    The Pancreatic Cancer Collaborative Registry (PCCR) is a multi-institutional web-based system aimed to collect a variety of data on pancreatic cancer patients and high-risk subjects in a standard and efficient way. The PCCR was initiated by a group of experts in medical oncology, gastroenterology, genetics, pathology, epidemiology, nutrition, and computer science with the goal of facilitating rapid and uniform collection of critical information and biological samples to be used in developing diagnostic, prevention and treatment strategies against pancreatic cancer. The PCCR is a multi-tier web application that utilizes Java/JSP technology and has Oracle 10 g database as a back-end. The PCCR uses a "confederation model" that encourages participation of any interested center, irrespective of its size or location. The PCCR utilizes a standardized approach to data collection and reporting, and uses extensive validation procedures to prevent entering erroneous data. The PCCR controlled vocabulary is harmonized with the NCI Thesaurus (NCIt) or Systematized Nomenclature of Medicine-Clinical Terms (SNOMED-CT). The PCCR questionnaire has accommodated standards accepted in cancer research and healthcare. Currently, seven cancer centers in the USA, as well as one center in Italy are participating in the PCCR. At present, the PCCR database contains data on more than 2,700 subjects (PC patients and individuals at high risk of getting this disease). The PCCR has been certified by the NCI Center for Biomedical Informatics and Information Technology as a cancer Biomedical Informatics Grid (caBIG(®)) Bronze Compatible product. The PCCR provides a foundation for collaborative PC research. It has all the necessary prerequisites for subsequent evolution of the developed infrastructure from simply gathering PC-related data into a biomedical computing platform vital for successful PC studies, care and treatment. Studies utilizing data collected in the PCCR may engender new approaches

  14. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  15. The Egyptian clinical trials’ registry profile: Analysis of three trial registries (International Clinical Trials Registry Platform, Pan-African Clinical Trials Registry and clinicaltrials.gov

    Directory of Open Access Journals (Sweden)

    Ahmed A. Zeeneldin

    2016-01-01

    Full Text Available Registering clinical trials (CTs in public domains enhances transparency, increases trust in research, improves participation and safeguards against publication bias. This work was done to study the profile of clinical research in Egypt in three CT registries with different scopes: the WHO International CT Registry Platform (ICTRP, the continental Pan-African CT Registry (PACTR and the US clinicaltrials.gov (CTGR. In March 2014, ICTRP, PACTR and CTGR were searched for clinical studies conducted in Egypt. It was found that the number of studies conducted in Egypt (percentage was 686 (0.30% in ICTRP, 56 (11.3% in PACTR and 548 (0.34% in CTGR. Most studies were performed in universities and sponsored by university/organization, industry or individual researchers. Inclusion of adults from both genders predominated. The median number of participants per study in the three registries ranged between 63 and 155. The conditions researched differed among the three registries and study purpose was mostly treatment followed by prevention. Endpoints were mostly efficacy followed by safety. Observational:Interventional studies (i.e. clinical trials represented 15.5%:84.5% in ICTRP, 0%:100% in PACTR and 16.4%:83.6% in CTGR. Most interventions were drugs or procedures. Observational studies were mostly prospective and cohort studies. Most CTs were phase 3 and tested drugs or procedures. Parallel group assignment and random allocation predominated. Blinding was implemented in many of trials and was mostly double-blind. We conclude that CTs from Egypt in trial registries are apparently low and do not accurately reflect clinical research conducted in Egypt or its potential. Development of an Egyptian CT registry is eagerly needed. Registering all Egyptian CTs in public domains is highly recommended.

  16. The Danish Cerebral Palsy Registry. A registry on a specific impairment

    DEFF Research Database (Denmark)

    Uldall, P; Michelsen, S I; Topp, M;

    2001-01-01

    Cerebral palsy (CP) is the commonest disabling impairment in childhood, with a prevalence of 2-3 per 1000 live births. The Danish Cerebral Palsy Registry is a research registry that contains cases of CP from birth year 1925 and has estimated the birth prevalence since 1950. Data on children with CP...

  17. ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

    Directory of Open Access Journals (Sweden)

    A.MADHURI,

    2010-09-01

    Full Text Available In this paper, we discuss the methods for detecting and preventing the DDoS Attacks and Replay Attacks, which have been posing the problems for the Internet. We explained a scheme AMFDR (AttackPatterns for Marking Filtering DoS and Replay attacks that identifies the attack packets from the packets that are sent by legitimate users and filters the attack packets. A Denial of service attack is generally launched to make a service unavailable even to an unauthorized user. If this attack uses many computers across the world, it is called Distributed Denial of service attack. Replay attack is retransmission of a data transmission which used to gain authentication in a fraudulent manner. These replayed packets or attack packets are identified. This scheme is less expensive and the implementation of this scheme needs minimal interaction with routers. The scheme is like firewall system, so that the occurrence of an attack is recognized quickly and a punitive action is taken without any loss genuine packets.

  18. Simultaneous Attacks by Terrorist Organisations

    Directory of Open Access Journals (Sweden)

    Kathleen Deloughery

    2013-12-01

    Full Text Available While terror attacks that are a part of a coordinated effort receive attention in the popular media, they have not received much attention in the academic literature. The decision to carry out simultaneous attacks should be examined as one of the choices a terrorist organisation makes about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single attack can explain why groups would use this method. Up to one quarter of all attacks coded in two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical analysis shows simultaneous attacks are more likely to be successful and cause more fatalities, though not in a one-to-one fashion. These results underline the importance of considering simultaneous attacks in empirical analysis.

  19. The National Mental Health Registry (NMHR).

    Science.gov (United States)

    Aziz, A A; Salina, A A; Abdul Kadir, A B; Badiah, Y; Cheah, Y C; Nor Hayati, A; Ruzanna, Z Z; Sharifah Suziah, S M; Chee, K Y

    2008-09-01

    The National Mental Health Registry (NMHR) collects information about patients with mental disorder in Malaysia. This information allows us to estimate the incidence of selected mental disorders, and to evaluate risk factors and treatment in the country. The National Mental Health Registry (NMHR) presented its first report in 2004, a year after its establishment. The report focused on schizophrenia as a pioneer project for the National Mental Health Registry. The development of the registry has progressed with data collected from government-based facilities, the academia and the private sector. The 2003-2005 report was recently published and distributed. Since then the registry has progressed to include suicides and other mental illnesses such as depression. The NMHR Report 2003-2005 provides detailed information about the profile of persons with Schizophrenia who presented for the first time to various psychiatry and mental health providers throughout Malaysia. More detailed description regarding pharmacotherapy is reported and few cross tabulations done in an effort to provide better understanding and more clinically meaningful reports.

  20. The National Mental Health Registry (NMHR).

    Science.gov (United States)

    Aziz, A A; Salina, A A; Abdul Kadir, A B; Badiah, Y; Cheah, Y C; Nor Hayati, A; Ruzanna, Z Z; Sharifah Suziah, S M; Chee, K Y

    2008-09-01

    The National Mental Health Registry (NMHR) collects information about patients with mental disorder in Malaysia. This information allows us to estimate the incidence of selected mental disorders, and to evaluate risk factors and treatment in the country. The National Mental Health Registry (NMHR) presented its first report in 2004, a year after its establishment. The report focused on schizophrenia as a pioneer project for the National Mental Health Registry. The development of the registry has progressed with data collected from government-based facilities, the academia and the private sector. The 2003-2005 report was recently published and distributed. Since then the registry has progressed to include suicides and other mental illnesses such as depression. The NMHR Report 2003-2005 provides detailed information about the profile of persons with Schizophrenia who presented for the first time to various psychiatry and mental health providers throughout Malaysia. More detailed description regarding pharmacotherapy is reported and few cross tabulations done in an effort to provide better understanding and more clinically meaningful reports. PMID:19227671

  1. LITERATURE SURVEY ON WORMHOLE ATTACK

    OpenAIRE

    Avinash S. Bundela

    2015-01-01

    Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been identified & corresponding solutions have been proposed. These attacks are caused by the malicious node hence ad hoc wireless network is unprotected from the attacks of the malicious node. Between all these attacks the wormhole att ...

  2. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  3. Systematic Review of Cerebral Palsy Registries/Surveillance Groups: Relationships between Registry Characteristics and Knowledge Dissemination

    Science.gov (United States)

    Hurley, Donna S; Sukal-Moulton, Theresa; Gaebler-Spira, Deborah; Krosschell, Kristin J; Pavone, Larissa; Mutlu, Akmer; Dewald, Julius PA; Msall, Michael E

    2016-01-01

    The aims of this study were to provide a comprehensive summary of the body of research disseminated by Cerebral Palsy (CP) registries and surveillance programs from January 2009 through May 2014 in order to describe the influence their results have on our overall understanding of CP. Secondly, registries/surveillance programs and the work they produced were evaluated and grouped using standardized definitions and classification systems. Method A systematic review search in PubMed, CINAH and Embase for original articles published from 1 January 2009 to 20 May 2014 originating from or supported by population based CP registries and surveillance programs or population based national registries including CP were included. Articles were grouped by 2009 World CP Registry Congress aim, registry/surveillance program classification, geographical region, and the International Classification of Function, Disability and Health (ICF) domain. Registry variables were assessed using the ICF-CY classification. Results Literature searches returned 177 articles meeting inclusion criteria. The majority (69%) of registry/surveillance program productivity was related to contributions as a Resource for CP Research. Prevention (23%) and Surveillance (22%) articles were other areas of achievement, but fewer articles were published in the areas of Planning (17%) and Raising the Profile of CP (2%). There was a range of registry/surveillance program classifications contributing to this productivity, and representation from multiple areas of the globe, although most of the articles originated in Europe, Australia, and Canada. The domains of the ICF that were primarily covered included body structures and function at the early stages of life. Encouragingly, a variety of CP registry/surveillance program initiatives included additional ICF domains of participation and environmental and personal factors. Interpretation CP registries and surveillance programs, including novel non-traditional ones

  4. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  5. The Danish Neuro-Oncology Registry

    DEFF Research Database (Denmark)

    Hansen, Steinbjørn; Nielsen, Jan; Laursen, René J;

    2016-01-01

    BACKGROUND: The Danish Neuro-Oncology Registry (DNOR) is a nationwide clinical cancer database that has prospectively registered data on patients with gliomas since January 2009. The purpose of this study was to describe the establishment of the DNOR and further to evaluate the database completen......BACKGROUND: The Danish Neuro-Oncology Registry (DNOR) is a nationwide clinical cancer database that has prospectively registered data on patients with gliomas since January 2009. The purpose of this study was to describe the establishment of the DNOR and further to evaluate the database...

  6. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  7. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  8. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  9. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  10. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  11. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  12. The Savant Syndrome Registry: A Preliminary Report.

    Science.gov (United States)

    Treffert, Darold A; Rebedew, David L

    2015-08-01

    A registry has been established to document certain characteristics on a sizeable worldwide sample of individuals with savant syndrome, a rare but remarkable condition in which persons with developmental disabilities, brain injury, or brain disease have some spectacular "islands" of skill or ability that stand in jarring, marked contrast to overall handicap. Of the 319 savants included in the registry, 90% are congenital savants, while 10% are acquired savants. The registry includes individuals from 33 countries, with 70% from the United States or Canada. Sex distribution was 79% male vs. 21% female (4:1). This report summarizes the findings in the congenital savant syndrome category of the registry. Among the individuals with congenital savant syndrome, the most common underlying disability was Autistic Spectrum Disorder (75%); various other central nervous system (CNS) disorders were present in the other 25%. Fifty-five percent possessed a single special skill, while 45% had multiple skills. Music was the most frequent principal skill followed by art, memory, mathematics, calendar calculating, language, visual-spatial/mechanical, athletic, computer, extrasensory perception, and other skills. PMID:26436185

  13. International Clinical Trials Registry Platform (ICTRP)

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ Introduction The mission of the WHO Intemational Clinical Trials Registry Platform is to ensure that a complete view of research is accessible to all those involved in health care decision making.This will improve research transparency and will ultimately strengthen tha validity and value of the scientific evidence base.The registration of all interventional trials is a scientific, ethical and moral responsibility.

  14. An active registry for bioinformatics web services.

    NARCIS (Netherlands)

    Pettifer, S.; Thorne, D.; McDermott, P.; Attwood, T.; Baran, J.; Bryne, J.C.; Hupponen, T.; Mowbray, D.; Vriend, G.

    2009-01-01

    SUMMARY: The EMBRACE Registry is a web portal that collects and monitors web services according to test scripts provided by the their administrators. Users are able to search for, rank and annotate services, enabling them to select the most appropriate working service for inclusion in their bioinfor

  15. Targeted development of registries of biological parts.

    Directory of Open Access Journals (Sweden)

    Jean Peccoud

    Full Text Available BACKGROUND: The design and construction of novel biological systems by combining basic building blocks represents a dominant paradigm in synthetic biology. Creating and maintaining a database of these building blocks is a way to streamline the fabrication of complex constructs. The Registry of Standard Biological Parts (Registry is the most advanced implementation of this idea. METHODS/PRINCIPAL FINDINGS: By analyzing inclusion relationships between the sequences of the Registry entries, we build a network that can be related to the Registry abstraction hierarchy. The distribution of entry reuse and complexity was extracted from this network. The collection of clones associated with the database entries was also analyzed. The plasmid inserts were amplified and sequenced. The sequences of 162 inserts could be confirmed experimentally but unexpected discrepancies have also been identified. CONCLUSIONS/SIGNIFICANCE: Organizational guidelines are proposed to help design and manage this new type of scientific resources. In particular, it appears necessary to compare the cost of ensuring the integrity of database entries and associated biological samples with their value to the users. The initial strategy that permits including any combination of parts irrespective of its potential value leads to an exponential and economically unsustainable growth that may be detrimental to the quality and long-term value of the resource to its users.

  16. The Savant Syndrome Registry: A Preliminary Report.

    Science.gov (United States)

    Treffert, Darold A; Rebedew, David L

    2015-08-01

    A registry has been established to document certain characteristics on a sizeable worldwide sample of individuals with savant syndrome, a rare but remarkable condition in which persons with developmental disabilities, brain injury, or brain disease have some spectacular "islands" of skill or ability that stand in jarring, marked contrast to overall handicap. Of the 319 savants included in the registry, 90% are congenital savants, while 10% are acquired savants. The registry includes individuals from 33 countries, with 70% from the United States or Canada. Sex distribution was 79% male vs. 21% female (4:1). This report summarizes the findings in the congenital savant syndrome category of the registry. Among the individuals with congenital savant syndrome, the most common underlying disability was Autistic Spectrum Disorder (75%); various other central nervous system (CNS) disorders were present in the other 25%. Fifty-five percent possessed a single special skill, while 45% had multiple skills. Music was the most frequent principal skill followed by art, memory, mathematics, calendar calculating, language, visual-spatial/mechanical, athletic, computer, extrasensory perception, and other skills.

  17. Correlating Orphaned Windows Registry Data Structures

    Directory of Open Access Journals (Sweden)

    Damir Kahved

    2009-06-01

    Full Text Available Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys may still reside in the system files once the entries have been deleted from the active database. Investigating the complete keys in context may be extremely important from both a Forensic Investigation point of view and a legal point of view where a lack of context can bring doubt to an argument. In this paper we formalise the registry behaviour and show how a retrieved value may not maintain a relation to the part of the registry it belonged to and hence lose that context. We define registry orphans and elaborate on how they can be created inadvertently during software uninstallation and other system processes. We analyse the orphans and attempt to reconstruct them automatically. We adopt a data mining approach and introduce a set of attributes that can be applied by the forensic investigator to match values to their parents. The heuristics are encoded in a Decision Tree that can discriminate between keys and select those which most likely owned a particular orphan value.

  18. Registries in systemic sclerosis: a worldwide experience.

    Science.gov (United States)

    Galluccio, Felice; Walker, Ulrich A; Nihtyanova, Svetlana; Moinzadeh, Pia; Hunzelmann, Nicholas; Krieg, Thomas; Steen, Virginia; Baron, Murray; Sampaio-Barros, Percival; Kayser, Cristiane; Nash, Peter; Denton, Chris P; Tyndall, Alan; Müller-Ladner, Ulf; Matucci-Cerinic, Marco

    2011-01-01

    SSc is a multisystem disease characterized by an unpredictable course, high mortality and resistance to therapy. The complexity and severity of SSc is a growing burden on the health-care systems. As a result, researchers are seeking new therapeutic strategies for effectively managing these patients. Disease registries are used to support care management efforts for groups of patients with chronic diseases and are meaningful to capture and track key patient information to assist the physicians in managing patients. For these reasons, SSc surveys, research associations and consortiums are pivotal to conduct ongoing research and data collection to enhance disease knowledge and support research projects. Currently, there are several national SSc registries in the UK, Germany, USA, Canada, Brazil and Australia. There is also an international registry established by the European League Against Rheumatism scleroderma trial and research (EUSTAR) called minimal essential data set (MEDS) Online, which collects data from over 8000 patients from 92 centres worldwide, including 21 European centres and 9 centres outside Europe. By collecting, analysing and disseminating data on disease progression and patient responses to long-term disease management strategies, registries help to improve understanding of the disease and keep medical professionals up to date on the latest advances. PMID:21148153

  19. Validation of the Netherlands pacemaker patient registry

    NARCIS (Netherlands)

    Dijk, WA; Kingma, T; Hooijschuur, CAM; Dassen, WRM; Hoorntje, JCA; van Gelder, LM

    1997-01-01

    This paper deals with the validation of the information stored in the Netherlands central pacemaker patient database. At this moment the registry database contains information on more than 70500 patients, 85000 pacemakers and 90000 leads. The validation procedures consisted of an internal consistenc

  20. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  1. 20 CFR 655.144 - Electronic job registry.

    Science.gov (United States)

    2010-04-01

    ... order posted on the Electronic Job Registry until the end of 50 percent of the contract period as set... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Electronic job registry. 655.144 Section 655... Certification § 655.144 Electronic job registry. (a) Location of and placement in the electronic job...

  2. 37 CFR 201.25 - Visual Arts Registry.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Visual Arts Registry. 201.25... AND PROCEDURES GENERAL PROVISIONS § 201.25 Visual Arts Registry. (a) General. This section prescribes the procedures relating to the submission of Visual Arts Registry Statements by visual artists...

  3. Plasma Exchange in Severe Attacks of Neuromyelitis Optica

    Directory of Open Access Journals (Sweden)

    Mickael Bonnan

    2012-01-01

    Full Text Available Background. Neuromyelitis optica (NMO attacks are poorly controlled by steroids and evolve in stepwise neurological impairments. Assuming the strong humoral response underlying NMO attacks, plasma exchange (PLEX is an appropriate technique in severe NMO attacks. Objective. Presenting an up-to-date review of the literature of PLEX in NMO. Methods. We summarize the rationale of PLEX in relation with the physiology of NMO, the main technical aspects, and the available studies. Results. PLEX in severe attacks from myelitis or optic neuritis are associated with a better outcome, depending on PLEX delay (“time is cord and eyes”. NMO-IgG status has no influence. Finally, we build up an original concept linking the inner dynamic of the lesion, the timing of PLEX onset and the expected clinical results. Conclusion. PLEX is a safe and efficient add-on therapy in NMO, in synergy with steroids. Large therapeutic trials are required to definitely assess the procedure and define the time opportunity window.

  4. Towards a national trauma registry for the United Arab Emirates

    Directory of Open Access Journals (Sweden)

    Barka Ezedin

    2010-07-01

    Full Text Available Abstract Background Trauma is a major health problem in the United Arab Emirates (UAE as well as worldwide. Trauma registries provide large longitudinal databases for analysis and policy improvement. We aim in this paper to report on the development and evolution of a national trauma registry using a staged approach by developing a single-center registry, a two-center registry, and then a multi-center registry. The three registries were established by developing suitable data collection forms, databases, and interfaces to these databases. The first two registries collected data for a finite period of time and the third is underway. The steps taken to establish these registries depend on whether the registry is intended as a single-center or multi-center registry. Findings Several issues arose and were resolved during the development of these registries such as the relational design of the database, whether to use a standalone database management system or a web-based system, and the usability and security of the system. The inclusion of preventive medicine data elements is important in a trauma registry and the focus on road traffic collision data elements is essential in a country such as the UAE. The first two registries provided valuable data which has been analyzed and published. Conclusions The main factors leading to the successful establishment of a multi-center trauma registry are the development of a concise data entry form, development of a user-friendly secure web-based database system, the availability of a computer and Internet connection in each data collection center, funded data entry personnel well trained in extracting medical data from the medical record and entering it into the computer, and experienced personnel in trauma injuries and data analysis to continuously maintain and analyze the registry.

  5. FLOODING ATTACK AWARE SECURE AODV

    OpenAIRE

    Madhavi, S; K. Duraiswamy

    2013-01-01

    Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the ...

  6. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  7. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  8. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  9. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  10. METADATA REGISTRY, ISO/IEC 11179

    Energy Technology Data Exchange (ETDEWEB)

    Pon, R K; Buttler, D J

    2008-01-03

    ISO/IEC-11179 is an international standard that documents the standardization and registration of metadata to make data understandable and shareable. This standardization and registration allows for easier locating, retrieving, and transmitting data from disparate databases. The standard defines the how metadata are conceptually modeled and how they are shared among parties, but does not define how data is physically represented as bits and bytes. The standard consists of six parts. Part 1 provides a high-level overview of the standard and defines the basic element of a metadata registry - a data element. Part 2 defines the procedures for registering classification schemes and classifying administered items in a metadata registry (MDR). Part 3 specifies the structure of an MDR. Part 4 specifies requirements and recommendations for constructing definitions for data and metadata. Part 5 defines how administered items are named and identified. Part 6 defines how administered items are registered and assigned an identifier.

  11. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  12. Forensic Analysis of the Windows 7 Registry

    Directory of Open Access Journals (Sweden)

    Khawla Abdulla Alghafli

    2010-12-01

    Full Text Available The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic analysis process and the recovery of digital evidence may take less time than would otherwise be required. In this paper, the Registry structure of Windows 7 is discussed together with several elements of information within the Registry of Windows 7 that may be valuable to a forensic investigator. These elements were categorized into five groups which are system, application, networks, attached devices and the history lists. We have discussed the values of identified elements to a forensic investigator. Also, a tool was implemented to perform the function of extracting these elements and presents them in usable form to a forensics investigator.

  13. Registry of Mineral and Petroleum Titles

    Energy Technology Data Exchange (ETDEWEB)

    Maclellan, I. M.; Kaizer, J. L.; McCulloch, P. D.; Ratcliffe, R.; Wenning, A. S. [Nova Scotia Dept. of Natural Resources, Halifax, NS (Canada)

    2000-07-01

    Activities of the Nova Scotia Registry of Mineral and Petroleum Titles are described, including statistical information about staking and mining activity in the province during 1999. In terms of activities, the Registry receives applications and issues licenses and leases for mineral and petroleum rights, receives statements of exploration expenditures and assessment reports that pertain to renewal of licenses and leases, maintains maps showing the disposition of lands under license or lease, and maintains a system of prospector registration. In addition, the Registry processes applications for underground gas storage rights and treasure trove rights and maintains a database of information concerning production and employment in Nova Scotia mines and quarries. At the end 1999 there were 230,660 hectares under exploration licence. Exploration expenditures, including engineering, economic and feasibility studies during 1999 totalled $4.2 million, mostly by junior mining companies searching for industrial mineral commodities. Mining activity during 1999 generated revenues of $340 million. Coal production dropped by 25 per cent, due mainly to the closure of the Phalen Mine. Gypsum production was up to 7.9 million tonnes; shipments of cement, barite and clay products also increased during 1999; salt production remained unchanged from 1998 with 842,000 tonnes. Production of construction aggregates totalled 10.6 million tonnes, down slightly from the year before. Mineral industry employment was roughly 2,500 persons, down by 24 per cent from 1998 levels, due primarily to the closure of the Phalen Mine.

  14. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  15. Registries as Tools for Clinical Excellence and the Development of the Pelvic Floor Disorders Registry.

    Science.gov (United States)

    Weber LeBrun, Emily E

    2016-03-01

    Surgical device innovation has been less regulated than drug development, allowing integration of unproven techniques and materials into standard practice. Successful device registries gather information on patient outcomes and can provide postmarket surveillance of new technologies and allow comparison with currently established treatments or devices. The Pelvic Floor Disorders Registry was developed in collaboration with the Food and Drug Administration, device manufacturers, and other stakeholders to serve as a platform for industry-sponsored postmarket device surveillance, investigator-initiated research, and quality and effectiveness benchmarking, all designed to improve the care of women with pelvic floor disorders. PMID:26880512

  16. The Danish Cerebral Palsy Registry. A registry on a specific impairment

    DEFF Research Database (Denmark)

    Uldall, P; Michelsen, Susan Ishøy; Topp, M;

    2001-01-01

    Cerebral palsy (CP) is the commonest disabling impairment in childhood, with a prevalence of 2-3 per 1000 live births. The Danish Cerebral Palsy Registry is a research registry that contains cases of CP from birth year 1925 and has estimated the birth prevalence since 1950. Data on children with CP...... are collected from paediatric departments and one special institution for disabled children. The children are included by a child neurologist and an obstetrician, and information on pregnancy, birth, neonatal period, impairments and demographic data on the child and mother are registered in a standard form...

  17. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  18. Suicide Attacks on the Rise

    OpenAIRE

    CCS Research Staff

    2008-01-01

    This article was published in Culture and Conflict Review (March 2008), v.2 no.2 "The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star ...

  19. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  20. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  1. Attributing heart attack and stroke to "Old Age": Implications for subsequent health outcomes among older adults.

    Science.gov (United States)

    Stewart, Tara L; Chipperfield, Judith G; Perry, Raymond P; Hamm, Jeremy M

    2016-01-01

    This study assessed the extent to which older adults attribute a recent heart attack/stroke to "old age," and examined consequences for subsequent lifestyle behavior and health-care service utilization. Community-dwelling adults (N = 57, ages 73-98 years) were interviewed about their heart attack/stroke, and an objective health registry provided data on health-care utilization over a 3-year period. Endorsement of "old age" as a cause of heart attack/stroke negatively predicted lifestyle behavior change, and positively predicted frequency of physician visits and likelihood of hospitalization over the subsequent 3 years. Findings suggest the importance of considering "old age" attributions in the context of cardiovascular health events.

  2. [Influence of registries on the quality of care].

    Science.gov (United States)

    Stengel, D; Dreinhöfer, K; Kostuj, T

    2016-06-01

    Registries are a topic of lively debate amongst all stakeholders in healthcare, politics and economics. In general, registries are national or international (prospective) databases documenting the current state of diagnostic, therapeutic and long-term outcome variables of subjects with a distinct condition or health problem. The access to and handling of registry information is subject to strict legal, methodological and ethical principles and regulations before these data can be scientifically utilized and reentered into the routine daily practice. Because of the representativeness and reality of data, registries are widely regarded as the backbone of health systems and budgets.Currently there is only indirect evidence that registries influence outcomes and the quality of care. Recent statistical techniques may allow quasi-experimental modelling of observational information. In orthopedic and trauma surgery, current and upcoming registries should be wisely utilized to develop and evaluate innovations and to make informed decisions relevant to care. PMID:27164976

  3. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  4. Prostate Cancer Registries: Current Status and Future Directions

    OpenAIRE

    Gandaglia, G; Bray, F.; Cooperberg, MR; Karnes, RJ; Leveridge, MJ; Moretti, K; Murphy, DG; Penson, DF; Miller, DC

    2016-01-01

    © 2015 European Association of Urology. Context: Disease-specific registries that enroll a considerable number of patients play a major role in prostate cancer (PCa) research. Objective: To evaluate available registries, describe their strengths and limitations, and discuss the potential future role of PCa registries in outcomes research. Evidence acquisition: We performed a literature review of the Medline, Embase, and Web of Science databases. The search strategy included the terms prostate...

  5. The Danish Multiple Sclerosis Registry. History, data collection and validity

    DEFF Research Database (Denmark)

    Koch-Henriksen, N; Rasmussen, S; Stenager, E;

    2001-01-01

    The Danish Multiple Sclerosis Registry was formally established in 1956 but started operating in 1949 with a nationwide prevalence survey. Since then, the Registry has continued collecting data on new and old cases of multiple sclerosis (MS) or suspected MS from multiple sources. The Registry...... instrument for monitoring incidence and prevalence, analysing survival, performing genetic analysis, providing unselected patient samples for clinical analyses, performing case-control studies and prospective studies and estimating the need for treatment and care....

  6. Australia and New Zealand Dialysis and Transplant Registry

    OpenAIRE

    McDonald, Stephen P

    2015-01-01

    The ANZDATA Registry includes all patients treated with renal replacement therapy (RRT) throughout Australia and New Zealand. Funding is predominantly from government sources, together with the non-government organization Kidney Health Australia. Registry operations are overseen by an Executive committee, and a Steering Committee with wide representation. Data is collected from renal units throughout Australia and New Zealand on a regular basis, and forwarded to the Registry. Areas covered in...

  7. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  8. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  9. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  10. Sertraline-induced panic attack.

    Science.gov (United States)

    González-Berríos, Nereida

    2009-01-01

    Selective Serotonin Reuptake Inhibitors are the treatment of choice for depression and anxiety disorders due to its tolerability, safety and side effects profile. However, with the current and frequent use of these medications in patients with these disorders, new side effects have been reported. This case report describes the development of panic attacks in a 24-year-old-female patient with depressive and anxiety symptoms, and no previous predisposing history for panic attacks. PMID:19954091

  11. Microarchitectural Side-Channel Attacks

    OpenAIRE

    Gallais, Jean-Francois

    2013-01-01

    Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weaknesses and flaws. Initially confined to the black-box model, where only the input and output data were considered, cryptanalysis is now broadened to the security evaluation of the physical implementation of a cryptosystem. The implementation attacks which compose physical cryptanalysis are divided into fault attacks, exploiting the effect of disruption of the normal functioning of the device, and s...

  12. Acute ischemic cerebral attack

    Directory of Open Access Journals (Sweden)

    Franco-Garcia Samir

    2010-12-01

    Full Text Available The decrease of the cerebral blood flow below the threshold of autoregulation led to changes of cerebral ischemia and necrosis that traduce in signs and symtoms of focal neurologic dysfunction called acute cerebrovascular symdrome (ACS or stroke. Two big groups according to its etiology are included in this category the hemorragic that constitue a 20% and the ischemic a 80% of cases. Great interest has wom the ischemic ACS because of its high social burden, being the third cause of no violent death in the world and the first of disability. Many risk factors favor the presentation of these events and some of them are susceptible of modification and therfore are objetives of primary prevention just as the control of diabetes, hypertension and the practice of healthy habits of life. The advances in the knowledge of the physiopatology, had taken to sustantial change in the nomenclature and management of ischemic ACS. Within these changes it was substituted the term cerebrovascular accident fo acute stroke, making emphasis in the key rol of a timely management with goals of time similiar to the acute coronary syndrome. It was redefined the time of acute ischemic attack to a one hour. Once stablished the cerebrovascular attack the semiology of symtoms with frecuency will led us make a topographic diagnosis of the in injury that joined to the cerebral TAC will allow us to exclude an hemorragic event and to start the treatment. In the management of these patients its essential the coordination of the differents teams of work, from the early recognition of symtoms on the part of patients andthe family, the rapid activation and response of emergency systems and the gearing of health care institutions. Are pillars of treatment: the abcde of reanimatiion, to avoid the hiperpirexis, the seizures, the hipoglicemy, the hiperglicemy, to achieve the thrombolysis in the first three hours of the begining of symtoms, to use antiplatelets, antithrombotic profilaxis

  13. Thyroid Cancer and Tumor Collaborative Registry (TCCR).

    Science.gov (United States)

    Shats, Oleg; Goldner, Whitney; Feng, Jianmin; Sherman, Alexander; Smith, Russell B; Sherman, Simon

    2016-01-01

    A multicenter, web-based Thyroid Cancer and Tumor Collaborative Registry (TCCR, http://tccr.unmc.edu) allows for the collection and management of various data on thyroid cancer (TC) and thyroid nodule (TN) patients. The TCCR is coupled with OpenSpecimen, an open-source biobank management system, to annotate biospecimens obtained from the TCCR subjects. The demographic, lifestyle, physical activity, dietary habits, family history, medical history, and quality of life data are provided and may be entered into the registry by subjects. Information on diagnosis, treatment, and outcome is entered by the clinical personnel. The TCCR uses advanced technical and organizational practices, such as (i) metadata-driven software architecture (design); (ii) modern standards and best practices for data sharing and interoperability (standardization); (iii) Agile methodology (project management); (iv) Software as a Service (SaaS) as a software distribution model (operation); and (v) the confederation principle as a business model (governance). This allowed us to create a secure, reliable, user-friendly, and self-sustainable system for TC and TN data collection and management that is compatible with various end-user devices and easily adaptable to a rapidly changing environment. Currently, the TCCR contains data on 2,261 subjects and data on more than 28,000 biospecimens. Data and biological samples collected by the TCCR are used in developing diagnostic, prevention, treatment, and survivorship strategies against TC. PMID:27168721

  14. Thyroid Cancer and Tumor Collaborative Registry (TCCR).

    Science.gov (United States)

    Shats, Oleg; Goldner, Whitney; Feng, Jianmin; Sherman, Alexander; Smith, Russell B; Sherman, Simon

    2016-01-01

    A multicenter, web-based Thyroid Cancer and Tumor Collaborative Registry (TCCR, http://tccr.unmc.edu) allows for the collection and management of various data on thyroid cancer (TC) and thyroid nodule (TN) patients. The TCCR is coupled with OpenSpecimen, an open-source biobank management system, to annotate biospecimens obtained from the TCCR subjects. The demographic, lifestyle, physical activity, dietary habits, family history, medical history, and quality of life data are provided and may be entered into the registry by subjects. Information on diagnosis, treatment, and outcome is entered by the clinical personnel. The TCCR uses advanced technical and organizational practices, such as (i) metadata-driven software architecture (design); (ii) modern standards and best practices for data sharing and interoperability (standardization); (iii) Agile methodology (project management); (iv) Software as a Service (SaaS) as a software distribution model (operation); and (v) the confederation principle as a business model (governance). This allowed us to create a secure, reliable, user-friendly, and self-sustainable system for TC and TN data collection and management that is compatible with various end-user devices and easily adaptable to a rapidly changing environment. Currently, the TCCR contains data on 2,261 subjects and data on more than 28,000 biospecimens. Data and biological samples collected by the TCCR are used in developing diagnostic, prevention, treatment, and survivorship strategies against TC.

  15. Encouraging Health Information Management Graduates to Pursue Cancer Registry Careers.

    Science.gov (United States)

    Peterson, Jennifer

    2016-01-01

    The cancer registry profession has grown dramatically since its inception in 1926. Certified tumor registrars (CTRs) have become an integral part of the cancer care team by providing quality cancer data for research, statistical purposes, public health, and cancer control. In addition, CTRs have been found to be valuable in other cancer and health-related fields. Based on the need for high-quality, accurate data, the National Cancer Registrars Association (NCRA), the certification body for CTRs, has increased the educational requirement for eligibility for the CTR certification exam. This has resulted in fewer individuals who are able to meet the requirements for CTR certification. In addition, the existing cancer registry workforce is, on average, older than other allied health professions, and therefore will face an increasing number of retirements in the next few years. The high demand for CTRs, the decreased pool of CTR-eligible applicants, and the aging cancer registry workforce has resulted in an existing shortage that will only get worse as the population ages and the incidence of cancer increases. Health information management (HIM) students are well suited to pursuing further training in the cancer registry field and gaining the CTR credential. HIM students or new graduates have the needed skill set and education to pursue a cancer registry career. There are many avenues HIM educational programs can take to encourage students to pursue CTR certification and a cancer registry career. Including cancer registry functions in courses throughout the HIM curriculum, bringing in cancer registry speakers, encouraging networking, and promoting the cancer registry field and profession in general are just a few of the methods that HIM programs can use to raise awareness of and promote a cancer registry career to their students. Illinois State University has used these methods and has found them to be successful in encouraging a percentage of their graduates to pursue

  16. Rationale for reduced tornado design bases

    International Nuclear Information System (INIS)

    This paper provides a rationale for relaxing the present NRC tornado design requirements, which are based on a design basis tornado (DBT) whose frequency of exceedance is 10-7 per year. It is proposed that a reduced DBT frequency of 10-5 to 10-6 per year is acceptable. This change in the tornado design bases for LMFBRs (and possibly all types of nuclear plants) is justified based on (1) existing NRC regulations and guidelines, (2) probabilistic arguments, (3) consistency with NRC trial safety goals, and (4) cost-benefit analysis

  17. 76 FR 36896 - Notice of Establishment of a New Plant Protection and Quarantine Stakeholder Registry

    Science.gov (United States)

    2011-06-23

    ... Protection and Quarantine Stakeholder Registry AGENCY: Animal and Plant Health Inspection Service, USDA... of interest. FOR FURTHER INFORMATION CONTACT: For information on the PPQ Stakeholder Registry... Protection and Quarantine (PPQ) stakeholder registry is an email subscription service that allows...

  18. The growing number of hemophilia registries : Quantity vs. quality

    NARCIS (Netherlands)

    Keipert, C; Hesse, J; Haschberger, B; Heiden, M; Seitz, R; van den Berg, H M; Hilger, A

    2015-01-01

    Registries for rare diseases provide a tool for obtaining an overview of the clinical situation and can be used to discover points of improvement and to monitor long-term safety. Registries could also become a powerful tool to provide supporting information for marketing authorization. There is an u

  19. Heredity In Sarcoidosis - A Registry-Based Twin Study

    DEFF Research Database (Denmark)

    Sverrild, Asger; Backer, Vibeke; Kyvik, Kirsten Ohm;

    2008-01-01

    obtained from the Danish National Patient Registry or the Social Insurance Institution, Finland, registry of re-imbursed medication using the 8th and 10th editions of the International Classification of Diseases. Fisher's exact test was used to compare probandwise concordance rates in different zygosity...

  20. The 2006 ERA-EDTA Registry annual report: a precis

    NARCIS (Netherlands)

    V.S. Stel; A. Kramer; C. Zoccali; K.J. Jager

    2009-01-01

    Introduction: This paper provides a summary of the 2006 European Renal Association-European Dialysis and Transplant Association (ERA-EDTA) Registry report. Methods: Data on renal replacement therapy (RRT) were available from 50 national and regional registries in 28 countries in Europe and bordering

  1. Data quality in the Danish National Acute Leukemia Registry

    DEFF Research Database (Denmark)

    Ostgård, Lene Sofie Granfeldt; Nørgaard, Jan Maxwell; Severinsen, Marianne Tang;

    2013-01-01

    The Danish National Acute Leukemia Registry (DNLR) has documented coverage of above 98.5%. Less is known about the quality of the recorded data.......The Danish National Acute Leukemia Registry (DNLR) has documented coverage of above 98.5%. Less is known about the quality of the recorded data....

  2. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  3. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  4. Description and Rationale for the Planning, Monitoring, and Implementation (PMI) Model: Rationale.

    Science.gov (United States)

    Cort, H. Russell

    The rationale for the Planning, Monitoring, and Implementation Model (PMI) is the subject of this paper. The Superintendent of the District of Columbia Public Schools requested a model for systematic evaluation of educational programs to determine their effectiveness. The school system's emphasis on objective-referenced instruction and testing,…

  5. How Suitable Are Registry Data for Recurrence Risk Calculations?

    DEFF Research Database (Denmark)

    Ellesøe, Sabrina Gade; Jensen, Anders Boeck; Ängquist, Lars Henrik;

    2016-01-01

    BACKGROUND: Congenital heart disease (CHD) occurs in approximately 1% of all live births, and 3% to 8% of these have until now been considered familial cases, defined as the occurrence of two or more affected individuals in a family. The validity of CHD diagnoses in Danish administrative registry...... identifier in the Danish registries, thus enabling connection of information from several registries. Utilizing the CPR number, we identified Danish patients with familial CHD and reviewed each patient's file. We compared diagnoses from the registries with those manually assigned, which enabled calculation...... of nine of all cases with CHD are familial, and we also found that 36% of individuals with CHD in administrative medical registries are misclassified, which distort the RRR in simulated scenarios....

  6. Rationale and Roadmap for Moon Exploration

    Science.gov (United States)

    Foing, B. H.; ILEWG Team

    We discuss the different rationale for Moon exploration. This starts with areas of scientific investigations: clues on the formation and evolution of rocky planets, accretion and bombardment in the inner solar system, comparative planetology processes (tectonic, volcanic, impact cratering, volatile delivery), records astrobiology, survival of organics; past, present and future life. The rationale includes also the advancement of instrumentation: Remote sensing miniaturised instruments; Surface geophysical and geochemistry package; Instrument deployment and robotic arm, nano-rover, sampling, drilling; Sample finder and collector. There are technologies in robotic and human exploration that are a drive for the creativity and economical competitivity of our industries: Mecha-electronics-sensors; Tele control, telepresence, virtual reality; Regional mobility rover; Autonomy and Navigation; Artificially intelligent robots, Complex systems, Man-Machine interface and performances. Moon-Mars Exploration can inspire solutions to global Earth sustained development: In-Situ Utilisation of resources; Establishment of permanent robotic infrastructures, Environmental protection aspects; Life sciences laboratories; Support to human exploration. We also report on the IAA Cosmic Study on Next Steps In Exploring Deep Space, and ongoing IAA Cosmic Studies, ILEWG/IMEWG ongoing activities, and we finally discuss possible roadmaps for robotic and human exploration, starting with the Moon-Mars missions for the coming decade, and building effectively on joint technology developments.

  7. Symptom Patterns Among Gulf War Registry Veterans

    Science.gov (United States)

    Hallman, William K.; Kipen, Howard M.; Diefenbach, Michael; Boyd, Kendal; Kang, Han; Leventhal, Howard; Wartenberg, Daniel

    2003-01-01

    Objectives. We identify symptom patterns among veterans who believe they suffer from Gulf War–related illnesses and characterize groups of individuals with similar patterns. Methods. A mail survey was completed by 1161 veterans drawn from the Gulf War Health Registry. Results. An exploratory factor analysis revealed 4 symptom factors. A K-means cluster analysis revealed 2 groups: (1) veterans reporting good health and few moderate/severe symptoms, and (2) veterans reporting fair/poor health and endorsing an average of 37 symptoms, 75% as moderate/severe. Those in Cluster 2 were more likely to report having 1 or more of 24 medical conditions. Conclusions. These findings are consistent with previous investigations of symptom patterns in Gulf War veterans. This multisymptom illness may be more fully characterized by the extent, breadth, and severity of symptoms reported. PMID:12660208

  8. I RBH - First Brazilian Hypertension Registry

    Science.gov (United States)

    Jardim, Paulo César Brandão Veiga; de Souza, Weimar Kunz Sebba Barroso; Lopes, Renato Delascio; Brandão, Andréa Araújo; Malachias, Marcus V. Bolívar; Gomes, Marco Mota; Moreno Júnior, Heitor; Barbosa, Eduardo Costa Duarte; Póvoa, Rui Manoel dos Santos

    2016-01-01

    Background: A registry assessing the care of hypertensive patients in daily clinical practice in public and private centers in various Brazilian regions has not been conducted to date. Such analysis is important to elucidate the effectiveness of this care. Objective: To document the current clinical practice for the treatment of hypertension with identification of the profile of requested tests, type of administered treatment, level of blood pressure (BP) control, and adherence to treatment. Methods: National, observational, prospective, and multicenter study that will include patients older than 18 years with hypertension for at least 4 weeks, following up in public and private centers and after signing a consent form. The study will exclude patients undergoing dialysis, hospitalized in the previous 30 days, with class III or IV heart failure, pregnant or nursing, with severe liver disease, stroke or acute myocardial infarction in the past 30 days, or with diseases with a survival prognosis < 1 year. Evaluations will be performed at baseline and after 1 year of follow-up. The parameters that will be evaluated include anthropometric data, lifestyle habits, BP levels, lipid profile, metabolic syndrome, and adherence to treatment. The primary outcomes will be hospitalization due to hypertensive crisis, cardiocirculatory events, and cardiovascular death, while secondary outcomes will be hospitalization for heart failure and requirement of dialysis. A subgroup analysis of 15% of the sample will include noninvasive central pressure evaluation at baseline and study end. The estimated sample size is 3,000 individuals for a prevalence of 5%, sample error of 2%, and 95% confidence interval. Results: The results will be presented after the final evaluation, which will occur at the end of a 1-year follow-up. Conclusion: The analysis of this registry will improve the knowledge and optimize the treatment of hypertension in Brazil, as a way of modifying the prognosis of

  9. The Twin Research Registry at SRI International.

    Science.gov (United States)

    Krasnow, Ruth E; Jack, Lisa M; Lessov-Schlaggar, Christina N; Bergen, Andrew W; Swan, Gary E

    2013-02-01

    The Twin Research Registry (TRR) at SRI International is a community-based registry of twins established in 1995 by advertising in local media, mainly on radio stations and in newspapers. As of August 2012, there are 3,120 same- and opposite-sex twins enrolled; 86% are 18 years of age or older (mean age 44.9 years, SD 16.9 years) and 14% less than 18 years of age (mean age 8.9 years, SD 4.5); 67% are female, and 62% are self-reported monozygotic (MZ). More than 1,375 twins have participated in studies over the last 15 years in collaboration with the University of California Medical Center in San Francisco, the University of Texas MD Anderson Cancer Center, and the Stanford University School of Medicine. Each twin completes a registration form with basic demographic information either online at the TRR Web site or during a telephone interview. Contact is maintained with members by means of annual newsletters and birthday cards. The managers of the TRR protect the confidentiality of twin data with established policies; no information is given to other researchers without prior permission from the twins; and all methods and procedures are reviewed by an Institutional Review Board. Phenotypes studied thus far include those related to nicotine metabolism, mutagen sensitivity, pain response before and after administration of an opioid, and a variety of immunological responses to environmental exposures, including second-hand smoke and vaccination for seasonal influenza virus and Varicella zoster virus. Twins in the TRR have participated in studies of complex, clinically relevant phenotypes that would not be feasible to measure in larger samples. PMID:23084148

  10. Glocal clinical registries: pacemaker registry design and implementation for global and local integration--methodology and case study.

    Directory of Open Access Journals (Sweden)

    Kátia Regina da Silva

    Full Text Available BACKGROUND: The ability to apply standard and interoperable solutions for implementing and managing medical registries as well as aggregate, reproduce, and access data sets from legacy formats and platforms to advanced standard formats and operating systems are crucial for both clinical healthcare and biomedical research settings. PURPOSE: Our study describes a reproducible, highly scalable, standard framework for a device registry implementation addressing both local data quality components and global linking problems. METHODS AND RESULTS: We developed a device registry framework involving the following steps: (1 Data standards definition and representation of the research workflow, (2 Development of electronic case report forms using REDCap (Research Electronic Data Capture, (3 Data collection according to the clinical research workflow and, (4 Data augmentation by enriching the registry database with local electronic health records, governmental database and linked open data collections, (5 Data quality control and (6 Data dissemination through the registry Web site. Our registry adopted all applicable standardized data elements proposed by American College Cardiology / American Heart Association Clinical Data Standards, as well as variables derived from cardiac devices randomized trials and Clinical Data Interchange Standards Consortium. Local interoperability was performed between REDCap and data derived from Electronic Health Record system. The original data set was also augmented by incorporating the reimbursed values paid by the Brazilian government during a hospitalization for pacemaker implantation. By linking our registry to the open data collection repository Linked Clinical Trials (LinkedCT we found 130 clinical trials which are potentially correlated with our pacemaker registry. CONCLUSION: This study demonstrates how standard and reproducible solutions can be applied in the implementation of medical registries to constitute a re

  11. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  12. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    reflected in the journalistic practices. The described norms form a coherent pattern if safeguarding the existing democracy and the general public is considered to be the main purpose. A coverage based on this pattern of norms can be compared to other forms of crisis management following attacks because...

  13. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  14. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  15. [Polygraphy of a panic attack].

    Science.gov (United States)

    Noffke, H U; Roser, M

    2001-09-01

    We studied a 24-year old female patient with Type 1 diabetes mellitus suffering for 4 weeks from a major depressive episode combined with panic disorder without agoraphobia. A spontaneous panic attack was serendipitously recorded by polygraph while the subject was at rest. Electrocardiogram, finger blood-flow, respiratory rhythm and muscle tone (forearm, forehead) were recorded. A triphasic course consisting of a "dynamic phase" (appr. 80 s) preceded by a discrete "initial phase" (appr. 140 s) and a "declining phase" (appr. 180 s) was observed. The dynamic phase is characterized by an acute increase of fingertip vasoconstriction and heart rate. The patient was not aware of the panic attack before the dynamic phase. The recognisable central regulation confirms previously published findings indicating a sympathetic-norepinephrine activation at the beginning of the panic attack without activating the musculoskeletal system. Furthermore, a paradoxical phenomenon involving heart and respiratory rate was observed before the onset of anxiety, i.e. an increase of the heart rate and a simultaneous decline of the respiratory rate, suggesting a non-antagonistic regulation of the ergotropic-trophotropic system. The autonomic state of the patient points to a lability in homeostasis from which panic attacks as a form of CNS response could develop. PMID:11572106

  16. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  17. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  18. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  19. Paper 6: EUROCAT member registries: organization and activities

    DEFF Research Database (Denmark)

    Greenlees, Ruth; Neville, Amanda; Addor, Marie-Claude;

    2011-01-01

    EUROCAT is a network of population-based congenital anomaly registries providing standardized epidemiologic information on congenital anomalies in Europe. There are three types of EUROCAT membership: full, associate, or affiliate. Full member registries send individual records of all congenital...... anomalies covered by their region. Associate members transmit aggregate case counts for each EUROCAT anomaly subgroup by year and by type of birth. This article describes the organization and activities of each of the current 29 full member and 6 associate member registries of EUROCAT....

  20. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  1. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  2. "Socialized Music": Historical Formations of Community Music through Social Rationales

    Science.gov (United States)

    Yerichuk, Deanna

    2014-01-01

    This article traces the formation of community music through professional and scholarly articles over the last century in North America, and argues that community music has been discursively formed through social rationales, although the specific rationales have shifted. The author employs an archaeological framework inspired by Michel Foucault to…

  3. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  4. Exploring the association between severe respiratory syncytial virus infection and asthma: a registry-based twin study

    DEFF Research Database (Denmark)

    Thomsen, Simon Francis; van der Sluis, Sophie; Stensballe, Lone G;

    2009-01-01

    " RSV hospitalization fitted the data significantly better (P = 0.39 for deterioration in model fit) than a model in which RSV hospitalization "causes" asthma (P pregnancy were accounted for. CONCLUSIONS......RATIONALE: Severe respiratory syncytial virus (RSV) infection is associated with asthma but the nature of this association is imperfectly understood. OBJECTIVES: To examine the nature of the association between severe RSV infection and asthma in a population-based sample of twins. METHODS: Data...... on hospitalization due to RSV infection was gathered for all twins born in Denmark between 1994 and 2000 (8,280 pairs) and linked to information on asthma obtained from hospital discharge registries and parent-completed questionnaires. Genetic variance components models and direction of causation models were fitted...

  5. EPA Facility Registry Service (FRS): CERCLIS_NPL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that are...

  6. EPA Facility Registry Service (FRS): ER_TRI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  7. EPA Facility Registry Service (FRS): ER_WWTP_NPDES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of Waste Water Treatment...

  8. EPA Facility Registry Service (FRS): ER_RMP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  9. EPA Facility Registry Service (FRS): PCS_NPDES_MAJOR

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that are...

  10. EPA Facility Registry Service (FRS): Wastewater Treatment Plants

    Data.gov (United States)

    U.S. Environmental Protection Agency — This GIS dataset contains data on wastewater treatment plants, based on EPA's Facility Registry Service (FRS), EPA's Integrated Compliance Information System (ICIS)...

  11. EPA Facility Registry Service (FRS): RCRA_TRANS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  12. Clinical features of paediatric pulmonary hypertension : a registry study

    NARCIS (Netherlands)

    Berger, Rolf M. F.; Beghetti, Maurice; Humpl, Tilman; Raskob, Gary E.; Ivy, D. Dunbar; Jing, Zhi-Cheng; Bonnet, Damien; Schulze-Neick, Ingram; Barst, Robyn J.

    2012-01-01

    Background Paediatric pulmonary hypertension, is an important cause of morbidity and mortality, and is insufficiently characterised in children. The Tracking Outcomes and Practice in Pediatric Pulmonary Hypertension (TOPP) registry is a global, prospective study designed to provide information about

  13. EPA Facility Registry Service (FRS): AIRS_AQS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  14. EPA Facility Registry Service (FRS): AIRS_AFS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  15. EPA Facility Registry Service (FRS): ER_RCRATSD

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  16. EPA Facility Registry Service (FRS): PCS_NPDES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  17. EPA Facility Registry Service (FRS): ER_FRP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link to Facility...

  18. EPA Facility Registry Service (FRS): RCRA_LQG

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  19. Holt Oram syndrome: a registry-based study in Europe

    DEFF Research Database (Denmark)

    Barisic, Ingeborg; Boban, Ljubica; Greenlees, Ruth;

    2014-01-01

    BACKGROUND: Holt-Oram syndrome (HOS) is an autosomal dominant disorder characterised by upper limb anomalies and congenital heart defects. We present epidemiological and clinical aspects of HOS patients using data from EUROCAT (European Surveillance of Congenital Anomalies) registries. METHODS...

  20. EPA Facility Registry Service (FRS): Facility Interests Dataset - Intranet Download

    Data.gov (United States)

    U.S. Environmental Protection Agency — This downloadable data package consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are...

  1. EPA Facility Registry Service (FRS): Facility Interests Dataset - Intranet

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are available in...

  2. EPA Facility Registry Service (FRS): Facility Interests Dataset Download

    Data.gov (United States)

    U.S. Environmental Protection Agency — This downloadable data package consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are...

  3. EPA Facility Registry Service (FRS): Facility Interests Dataset

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for all sites that are available in...

  4. Environmental Protection Agency (EPA) Facility Registry Service (FRS) Power Plants

    Data.gov (United States)

    Department of Homeland Security — This GIS dataset contains data on wastewater treatment plants, based on EPA's Facility Registry Service (FRS) and NPDES, along with Clean Watersheds Needs Survey...

  5. EPA Facility Registry Service (FRS): ALL FRS INTERESTS LAYER

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data provides location and attribute information on all facilities in EPA's Facility Registry Service (FRS) for a internet web feature service . The FRS is an...

  6. EPA Facility Registry Service (FRS): RCRA_TSD

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of Hazardous Waste...

  7. EPA Facility Registry Service (FRS): ER_TSCA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  8. EPA Facility Registry Service (FRS): AIRS_AFS_MAJOR

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  9. EPA Facility Registry Service (FRS): ER_CERCLIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  10. EPA Facility Registry Service (FRS): ER_EPLAN

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  11. EPA Facility Registry Service (FRS): RCRA_ACTIVE

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of active hazardous...

  12. EPA Facility Registry Service (FRS): RCRA_INACTIVE

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of hazardous waste...

  13. Introduction to the 2006 UK Renal Registry report (chapter 2).

    Science.gov (United States)

    Ansell, David; Will, Es; Tomson, Charlie

    2007-08-01

    The UK Renal Registry is part of the UK Renal Association and provides independent audit and analysis of renal replacement therapy in the UK. The Registry is funded directly by participating renal units through an annual fee per patient registered. The Registry is now collecting data on incidence and prevalence from 100% of UK renal units, with the five remaining non-linked sites in England providing summary data. Maintaining and enhancing Registry functionality will be an important touchstone for the Connecting for Health initiative. Collaboration with other formal agencies also promises an exciting prospect for future development. After a long proving period, the means, methods and roles have come together to complete an effective adjunct to clinical activity, planning, research and the performance of the renal community.

  14. The National Anesthesia Clinical Outcomes Registry.

    Science.gov (United States)

    Liau, Adrian; Havidich, Jeana E; Onega, Tracy; Dutton, Richard P

    2015-12-01

    The Anesthesia Quality Institute (AQI) was chartered in 2008 by the American Society of Anesthesiologists to develop the National Anesthesia Clinical Outcomes Registry (NACOR). In this Technical Communication, we will describe how data enter NACOR, how they are authenticated, and how they are analyzed and reported. NACOR accepts case-level administrative, clinical, and quality capture data from voluntarily participating anesthesia practices and health care facilities in the United States. All data are transmitted to the AQI in summary electronic files generated by billing, quality capture, and electronic health care record software, typically on a monthly basis. All data elements are mapped to fields in the NACOR schema in accordance with a publicly available data dictionary. Incoming data are loaded into NACOR by AQI technologists and are subject to both manual and automated review to identify systematically missing elements, miscoding, and inadvertent corruption. Data are deidentified in compliance with Health Insurance Portability and Accountability Act regulations. The database server of AQI, which houses the NACOR database, is protected by 2 firewalls within the American Society of Anesthesiologists' network infrastructure; this system has not been breached. The NACOR Participant User File, a deidentified case-level dataset of information from NACOR, is available to researchers at participating institutions. NACOR architecture and the nature of the Participant User File include both strengths and weaknesses. PMID:26579661

  15. Italian registry of cardiac magnetic resonance

    Energy Technology Data Exchange (ETDEWEB)

    Francone, Marco [Department of Radiological, Oncological and Pathological Sciences, Sapienza University of Rome (Italy); Di Cesare, Ernesto, E-mail: ernesto.dicesare@cc.univaq.it [Dipartimento di Scienze Cliniche Applicate e Biotecnologie, Università di L’Aquila (Italy); Cademartiri, Filippo [Cardio-Vascular Imaging Unit, Giovanni XXIII Hospital, Monastier di Treviso, TV (Italy); Erasmus Medical Center University, Rotterdam (Netherlands); Pontone, Gianluca [IRCCS Centro Cardiologico Monzino (Italy); Lovato, Luigi [Policlinico S. Orsola Bologna (Italy); Matta, Gildo [Azienda ospedaliera G Brotzu Cagliari (Italy); Secchi, Francesco [IRCCS Policlinico San Donato, Radiology Unit, Milan (Italy); Maffei, Erica [Cardio-Vascular Imaging Unit, Giovanni XXIII Hospital, Monastier di Treviso, TV (Italy); Erasmus Medical Center University, Rotterdam (Netherlands); Pradella, Silvia [Azienda Ospedaliera Universitaria Careggi (Italy); Carbone, Iacopo [Department of Radiological, Oncological and Pathological Sciences, Sapienza University of Rome (Italy); Marano, Riccardo [Policlinico Gemelli, Università Cattolica Roma (Italy); Bacigalupo, Lorenzo [Ospedale Galliera, Genova (Italy); Chiodi, Elisabetta [Ospedale S. Anna Ferrara (Italy); Donato, Rocco [Azienda Ospedaliera Universitaria G. Martino, Me (Italy); Sbarbati, Stefano [Ospedale Madre Giuseppina Vannini, Roma (Italy); De Cobelli, Francesco [IRCCS S. Raffaele, Università Vita Salute, Milano (Italy); Di Renzi, Paolo [Fate Bene Fratelli Isola tiberina, Roma (Italy); Ligabue, Guido; Mancini, Andrea [Azienda Ospedaliera-Universitaria Policlinico di Modena (Italy); Palmieri, Francesco [Diparimento di Diagnostica per immagini e radiologia interventistica, Ospedale S. Maria delle Grazie, Pozzuoli, Napoli (Italy); and others

    2014-01-15

    Objectives: Forty sites were involved in this multicenter and multivendor registry, which sought to evaluate indications, spectrum of protocols, impact on clinical decision making and safety profile of cardiac magnetic resonance (CMR). Materials and methods: Data were prospectively collected on a 6-month period and included 3376 patients (47.2 ± 19 years; range 1–92 years). Recruited centers were asked to complete a preliminary general report followed by a single form/patient. Referral physicians were not required to exhibit any specific certificate of competency in CMR imaging. Results: Exams were performed with 1.5 T scanners in 96% of cases followed by 3 T (3%) and 1 T (1%) magnets and contrast was administered in 84% of cases. The majority of cases were performed for the workup of inflammatory heart disease/cardiomyopathies representing overall 55.7% of exams followed by the assessment of myocardial viability and acute infarction (respectively 6.9% and 5.9% of patients). In 49% of cases the final diagnosis provided was considered relevant and with impact on patient's clinical/therapeutic management. Safety evaluation revealed 30 (0.88%) clinical events, most of which due to patient's preexisting conditions. Radiological reporting was recorded in 73% of exams. Conclusions: CMR is performed in a large number of centers in Italy with relevant impact on clinical decision making and high safety profile.

  16. The National Anesthesia Clinical Outcomes Registry.

    Science.gov (United States)

    Liau, Adrian; Havidich, Jeana E; Onega, Tracy; Dutton, Richard P

    2015-12-01

    The Anesthesia Quality Institute (AQI) was chartered in 2008 by the American Society of Anesthesiologists to develop the National Anesthesia Clinical Outcomes Registry (NACOR). In this Technical Communication, we will describe how data enter NACOR, how they are authenticated, and how they are analyzed and reported. NACOR accepts case-level administrative, clinical, and quality capture data from voluntarily participating anesthesia practices and health care facilities in the United States. All data are transmitted to the AQI in summary electronic files generated by billing, quality capture, and electronic health care record software, typically on a monthly basis. All data elements are mapped to fields in the NACOR schema in accordance with a publicly available data dictionary. Incoming data are loaded into NACOR by AQI technologists and are subject to both manual and automated review to identify systematically missing elements, miscoding, and inadvertent corruption. Data are deidentified in compliance with Health Insurance Portability and Accountability Act regulations. The database server of AQI, which houses the NACOR database, is protected by 2 firewalls within the American Society of Anesthesiologists' network infrastructure; this system has not been breached. The NACOR Participant User File, a deidentified case-level dataset of information from NACOR, is available to researchers at participating institutions. NACOR architecture and the nature of the Participant User File include both strengths and weaknesses.

  17. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  18. Heart attack - what to ask your doctor

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000231.htm Heart attack - what to ask your doctor To use the ... features on this page, please enable JavaScript. A heart attack occurs when blood flow to a part of ...

  19. Fat May Not Hike Heart Attack Risk

    Science.gov (United States)

    ... news/fullstory_160179.html Fat May Not Hike Heart Attack Risk: Study But it does raise diabetes risk, ... that obesity may not increase the risk of heart attack or premature death. Their study of identical twins ...

  20. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  1. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  2. Diabetes Ups Risk of Heart Attack Death

    Science.gov (United States)

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  3. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  4. The growing number of hemophilia registries: Quantity vs. quality.

    Science.gov (United States)

    Keipert, C; Hesse, J; Haschberger, B; Heiden, M; Seitz, R; van den Berg, H M; Hilger, A

    2015-05-01

    Registries for rare diseases provide a tool for obtaining an overview of the clinical situation and can be used to discover points of improvement and to monitor long-term safety. Registries could also become a powerful tool to provide supporting information for marketing authorization. There is an urgent need for a pan-European or global strategy that supports consistent data. Therefore, transparency in data collection, harmonization of the database structures, and the convergence of scientific approaches are required. PMID:25669198

  5. The Entity Registry System. From concept to deployment

    OpenAIRE

    Gramada, Mihai

    2016-01-01

    The entity registry system (ERS) is a decentralized entity registry that can be used to replace the Web as a platform for publishing linked data when the latter is not available. In developing countries, where off-line is the default mode of operation, centralized linked data solutions fail to address the needs of the communities. Although the features are mostly completed, the system is not yet ready for deployment. This project aims to provide extensive tests and scalability investigations ...

  6. BioSWR – Semantic Web Services Registry for Bioinformatics

    OpenAIRE

    Dmitry Repchevsky; Josep Ll Gelpi

    2014-01-01

    Article About the Authors Metrics Comments Related Content Abstract Introduction Functionality Implementation Discussion Acknowledgments Author Contributions References Reader Comments (0) Figures Abstract Despite of the variety of available Web services registries specially aimed at Life Sciences, their scope is usually restricted to a limited set of well-defined types of services. While dedicated registries are generally tied to a particular format, general-purpose ones are more adherent to...

  7. DULOXETINE-RELATED PANIC ATTACKS

    OpenAIRE

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-01-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients’ trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who respon...

  8. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  9. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  10. Coyote Attacks: An Increasing Suburban Problem

    OpenAIRE

    Timm, Robert M.; Baker, Rex O.; Bennett, Joe R.; Coolahan, Craig C.

    2004-01-01

    Coyote attacks on humans and pets have increased within the past 5 years in California. We discuss documented occurrences of coyote aggression and attacks on people, using data from USDA Wildlife Services, the California Department of Fish & Game, and other sources. Forty-eight such attacks on children and adults were verified from 1998 through 2003, compared to 41 attacks during the period 1988 through 1997; most incidents occurred in Southern California near the suburban-wildland interfac...

  11. Sybil attack in Wireless Sensor Network

    OpenAIRE

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  12. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  13. Terror attacks increases the risk of vascular injuries

    Directory of Open Access Journals (Sweden)

    Eitan eHeldenberg

    2014-05-01

    Full Text Available Objectives: Extensive literature exists about military trauma as opposed to the very limited literature regarding terror-related civilian trauma. However, terror-related vascular trauma (VT, as a unique type of injury, is yet to be addressed.Methods: A retrospective analysis of the Israeli National Trauma Registry was performed. All patients in the registry from 09/2000 to 12/2005 were included. The subgroup of patients with documented vascular trauma (VT (N=1,545 was analyzedand further subdivided into those suffering from Terror-related Vascular Trauma (TVT and Non-Terror related Vascular Trauma (NTVT. Both groups were analyzed according to mechanism of trauma, type and severity of injury and treatment.Results: Out of 2,446 terror related trauma admissions 243 sustained TVT (9.9% compared to 1302 VT patients from Non Terror trauma (1.1%. TVT injuries tend to be more complex and most patients were operated on. ICU admissions and hospitallength of stay was higher in the TVT group. Penetrating trauma was the prominent cause of injury among the TVT group. TVT group had a higher proportion of patients with severe injuries (ISS>16 and mortality. Thorax injuries were more frequent in the TVT group. Extremity injuries were the most prevalent vascular injuries in both groups; however NTVT group had more upper extremity injuries, while the TVT group had significantly more lower extremity injuries.Conclusion: Vascular injuries are remarkably more common among terror attack victims than among non-terror trauma victims and the injuries of terror casualties tend to be more complex. The presence of a vascular surgeon will ensure a comprehensive clinical care.

  14. A Novel Attack against Android Phones

    CERN Document Server

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  15. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  16. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Stroke More Understand Your Risks to Prevent a Heart Attack Updated:Aug 2,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  17. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  18. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  19. Rationale for Antioxidant Supplementation in Hemodialysis Patients

    Directory of Open Access Journals (Sweden)

    Morena Marion

    2001-01-01

    Full Text Available Oxidative stress, which results from an imbalance between reactive oxygen species (ROS production and antioxidant defense mechanisms, is now a well recognized pathogenic process in hemodialysis (HD patients that could be involved in dialysis-related pathologies such as accelerated atherosclerosis, amyloidosis and anemia. This review is aimed at evaluating the rationale for preventive intervention against oxidative damage during HD as well as the putative causal factors implicated in this imbalance. The antioxidant system is severely impaired in uremic patients and impairment increases with the degree of renal failure. HD further worsens this condition mainly by losses of hydrophilic unbound small molecular weight substances such as vitamin C, trace elements and enzyme regulatory compounds. Moreover, inflammatory state due to the hemo-incompatibility of the dialysis system plays a critical role in the production of oxidants contributing further to aggravate the pro-oxidant status of uremic patients. Prevention of ROS overproduction can be achieved by improvement of dialysis biocompatibility, a main component of adequate dialysis, and further complimented by antioxidant supplementation. This could be achieved either orally or via the extracorporeal circuit. Antioxidants such as vitamin E could be bound on dialyzer membranes. Alternatively, hemolipodialysis consisting of loading HD patients with vitamin C or E via an ancillary circuit made of vitamin E-rich liposomes may be used.

  20. Opening Minds in Canada: Background and Rationale

    Science.gov (United States)

    Stuart, Heather; Chen, Shu-Ping; Christie, Romie; Dobson, Keith; Kirsh, Bonnie; Knaak, Stephanie; Koller, Michelle; Krupa, Terry; Lauria-Horner, Bianca; Luong, Dorothy; Modgill, Geeta; Patten, Scott B; Pietrus, Mike; Szeto, Andrew; Whitley, Rob

    2014-01-01

    Objective: To summarize the background and rationale of the approach taken by the Mental Health Commission of Canada’s Opening Minds (OM) Anti-Stigma Initiative. Method: The approach taken by OM incorporates a grassroots, community development philosophy, has clearly defined target groups, uses contact-based education as the central organizing element across interventions, and has a strong evaluative component, so that best practices can be identified, replicated, and disseminated. Contact-based education occurs when people who have experienced a mental illness share their personal story of recovery and hope. Results: OM has acted as a catalyst to develop partnerships between community groups who are undertaking anti-stigma work and an interdisciplinary team of academic researchers in 5 universities who are evaluating the results of these programs. Conclusions: Building partnerships with existing community programs and promoting systematic evaluation using standardized approaches and instruments have contributed to our understanding of best practices in the field of anti-stigma programming. PMID:25565705

  1. Peritoneal Dialysis Registry With 2012 Survey Report.

    Science.gov (United States)

    Hasegawa, Takeshi; Nakai, Shigeru; Moriishi, Misaki; Ito, Yasuhiko; Itami, Noritomo; Masakane, Ikuto; Hanafusa, Norio; Taniguchi, Masatomo; Hamano, Takayuki; Shoji, Tetsuo; Yamagata, Kunihiro; Shinoda, Toshio; Kazama, Junichiro; Watanabe, Yuzo; Shigematsu, Takashi; Marubayashi, Seiji; Morita, Osamu; Wada, Atsushi; Hashimoto, Seiji; Suzuki, Kazuyuki; Kimata, Naoki; Wakai, Kenji; Fujii, Naohiko; Ogata, Satoshi; Tsuchida, Kenji; Nishi, Hiroshi; Iseki, Kunitoshi; Tsubakihara, Yoshiharu; Nakamoto, Hidetomo

    2015-12-01

    Since 2009, the peritoneal dialysis (PD) registry survey has been carried out as part of the annual nationwide survey conducted by the Statistical Survey Committee of the Japanese Society for Dialysis Therapy with the cooperation of the Japanese Society for Peritoneal Dialysis. In this report, the current status of PD patients is presented on the basis of the results of the survey conducted at the end of 2012. The subjects were PD patients who lived in Japan and participated in the 2012 survey. Descriptive analysis of various items was performed, which included the current status of the combined use of PD and another dialysis method such as hemodialysis (HD) or hemodiafiltration (HDF), the method of exchanging dialysate, the use of an automated peritoneal dialysis (APD) machine, and the rates of peritonitis and catheter exit-site infection. From the results of the facility survey in 2012, the number of PD patients was 9514, a decrease of 128 from 2011. Among the entire dialysis patient population, 3.1% were PD patients, a decrease of 0.1%. Among the studied patients, 347 had a peritoneal catheter and underwent peritoneal lavage, 175 were started on PD in 2012 but introduced to other blood purification methods in the same year, and 1932 underwent both PD and another dialysis method such as HD or HDF. The percentage of patients who underwent PD and another dialysis method increased with PD vintage: vintage of ≥2 years. The mean rate of peritonitis was 0.22 per patient per year. The mean rate of catheter exit-site infections was 0.36 per patient per year.

  2. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  3. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  4. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  5. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  6. Establishment of an Australian National Genetic Heart Disease Registry.

    Science.gov (United States)

    Ingles, Jodie; McGaughran, Julie; Vohra, Jitendra; Weintraub, Robert G; Davis, Andrew; Atherton, John; Semsarian, Christopher

    2008-12-01

    A National Genetic Heart Disease Registry has recently been established, with the aim to enroll every family in Australia with a genetically determined cardiomyopathy or primary arrhythmic disorder. The Registry seeks to further our understanding of the impact and burden of disease in this population; increase awareness and provide education to health professionals and families; and establish a large cardiac genetic cohort as a resource for approved research studies. The Registry is currently recruiting families with inherited cardiomyopathies (e.g. hypertrophic cardiomyopathy) and primary arrhythmogenic disorders (e.g. long QT syndrome), with scope to expand this in the future. Affected individuals, as well as their first-degree (at-risk) family members are eligible to enroll. Participants are currently being recruited from cardiac genetics clinics in approved recruitment sites and hope to expand to other Australian centres including general cardiology practice in the future. A significant focus of the Registry is to improve understanding and create awareness of inherited heart diseases, which includes ensuring families are aware of genetic testing options and current clinical screening recommendations for at-risk family members. A Registry Advisory Committee has been established under the NHMRC Guidelines, and includes a representative from each major recruitment centre. This committee approves all decisions relating to the Registry including approval of research studies. A National Genetic Heart Disease Registry will provide a valuable resource to further our knowledge of the clinical and genetic aspects of these diseases. Since most of the current data about the prevalence, natural history and outcomes of genetic heart diseases has emanated from the United States and Europe, characterising these Australian populations will be of significant benefit, allowing for more informed and specific health care planning and resource provision.

  7. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  8. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  9. Japan Renal Biopsy Registry and Japan Kidney Disease Registry: Committee Report for 2009 and 2010.

    Science.gov (United States)

    Sugiyama, Hitoshi; Yokoyama, Hitoshi; Sato, Hiroshi; Saito, Takao; Kohda, Yukimasa; Nishi, Shinichi; Tsuruya, Kazuhiko; Kiyomoto, Hideyasu; Iida, Hiroyuki; Sasaki, Tamaki; Higuchi, Makoto; Hattori, Motoshi; Oka, Kazumasa; Kagami, Shoji; Kawamura, Tetsuya; Takeda, Tetsuro; Hataya, Hiroshi; Fukasawa, Yuichiro; Fukatsu, Atsushi; Morozumi, Kunio; Yoshikawa, Norishige; Shimizu, Akira; Kitamura, Hiroshi; Yuzawa, Yukio; Matsuo, Seiichi; Kiyohara, Yutaka; Joh, Kensuke; Nagata, Michio; Taguchi, Takashi; Makino, Hirofumi

    2013-04-01

    The Japan Renal Biopsy Registry (J-RBR) was started in 2007 and the Japan Kidney Disease Registry (J-KDR) was then started in 2009 by the Committee for Standardization of Renal Pathological Diagnosis and the Committee for the Kidney Disease Registry of the Japanese Society of Nephrology. The purpose of this report is to describe and summarize the registered data from 2009 and 2010. For the J-KDR, data were collected from 4,016 cases, including 3,336 (83.1 %) by the J-RBR and 680 (16.9 %) other cases from 59 centers in 2009, and from 4,681 cases including 4,106 J-RBR cases (87.7 %) and 575 other cases (12.3 %) from 94 centers in 2010, including the affiliate hospitals. In the J-RBR, 3,165 native kidneys (94.9 %) and 171 renal grafts (5.1 %) and 3,869 native kidneys (94.2 %) and 237 renal grafts (5.8 %) were registered in 2009 and 2010, respectively. Patients younger than 20 years of age comprised 12.1 % of the registered cases, and those 65 years and over comprised 24.5 % of the cases with native kidneys in 2009 and 2010. The most common clinical diagnosis was chronic nephritic syndrome (55.4 % and 50.0 % in 2009 and 2010, respectively), followed by nephrotic syndrome (22.4 % and 27.0 %); the most frequent pathological diagnosis as classified by the pathogenesis was IgA nephropathy (31.6 % and 30.4 %), followed by primary glomerular diseases (except IgA nephropathy) (27.2 % and 28.1 %). Among the primary glomerular diseases (except IgA nephropathy) in the patients with nephrotic syndrome, membranous nephropathy was the most common histopathology in 2009 (40.3 %) and minor glomerular abnormalities (50.0 %) were the most common in 2010 in native kidneys in the J-RBR. Five new secondary and longitudinal research studies by the J-KDR were started in 2009 and one was started in 2010.

  10. The rationale for early intervention in schizophrenia and related disorders

    DEFF Research Database (Denmark)

    Nordentoft, Merete; Jeppesen, Pia; Petersen, Lone;

    2009-01-01

    Abstract Aim: To examine the rationale and evidence supporting an early intervention approach in schizophrenia. Methods: A selective literature review was conducted. Results: During the onset of schizophrenia, there is often a significant delay between the emergence of psychotic symptoms...

  11. Influencing Acceptability of Parent Training Interventions Through Treatment Rationales

    OpenAIRE

    Chase, Trisha

    2015-01-01

    Parent training is an effective intervention for parents of children with a variety of childhood disorders, and parents often view behavioral parent training as acceptable. Explanations and rationales for parent training are commonly provided at the beginning of treatment. However, there is little research regarding how rationales may influence acceptability. There is also limited information on whether fathers and mothers judge the acceptability of parent training differently. The purpose of...

  12. Rationales for Place-based Approaches in Scotland

    OpenAIRE

    Bynner, Claire

    2016-01-01

    The aim of this paper is to remove the confusion surrounding what place-based approaches are, the rationales behind their use, the development of this approach to public service reform in Scotland and the future challenges presented by austerity and welfare reform. Key arguments presented in this paper:  The rationales driving the emergence of new place-based approaches at the neighbourhood level include: o The Civic – in the need for higher quality, more responsive services and for co...

  13. To mitigate Black-hole attack with CBDS in MANET

    OpenAIRE

    Navjot; Er.Pooja Ran

    2015-01-01

    Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperati...

  14. European operative registry to avoid complications in operative gynecology.

    Science.gov (United States)

    Putz, Andreas; Bohlin, Tonje; Rakovan, Martin; Putz, Ariane Maria; De Wilde, Rudy Leon

    2016-08-01

    The aim of this study is to determine how complications can be avoided in gynecological minimally invasive surgery in Europe. The Norwegian Gynecological Endoscopic Registry (NGER) facilitates medical research over a long duration. Can experiences from the Norwegian registry be used to develop a European registry to avoid complications? To answer this question, we used the NGER data from February 2013 until March 2015 to analyze the complications of gynecological endoscopy. The registry includes sociodemographic factors, related comorbidity, previous surgery, present procedure, and intraoperative complications. Postoperative complications were identified with a questionnaire administered 4 weeks after surgery. The risk factors leading to complications in gynecological endoscopy were found to be obesity, diabetes mellitus, heart disease, hypertension, previous surgery due to cervical carcinoma in situ, and low educational level. Regional differences in the complication rate were noted. National web-based operation registries such as the NGER can identify the risk factors for complications of gynecological endoscopic surgery and can help improve the outcome after surgery. The experience from NGER can be used to establish a European register. PMID:26805611

  15. OCLC Registry of Digital Masters – Opportunities for European Cooperation

    Directory of Open Access Journals (Sweden)

    Janet Lees

    2005-11-01

    Full Text Available I would like to thank the Preservation Division for the invitation to participate in the programme today. I would also like to thank the LIBER Board for their interest in the early stages of this project culminating in the announcement LIBER President Erland Kolding Nielsen made last night about LIBER support and collaboration with OCLC PICA with respect to the Digital Registry. This initiative reflects my new role within OCLC PICA, which is to identify opportunities for joint development with our major shareholder OCLC, and sometimes 3rd parties such as LIBER. My main purpose today is to provide a descriptive paper to inform LIBER members about the OCLC Digital Registry and to outline the possible role for LIBER and its membership in a model for European participation. My presentation will be in three phases: the need for a registry, a description of the Registry and finally, and perhaps most importantly, to outline opportunities for LIBER and its members in establishing a model for European contribution. We are all familiar with the concept of a registry through our participation in union catalogues and perhaps also from our experience with microfilms through the European Register of Microform Masters (EROMM hosted by our friends in Göttingen.

  16. Shoulder injuries from attacking motion

    Science.gov (United States)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  17. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  18. REAC/TS Radiation Accident Registry: An Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doran M. Christensen, DO, REAC/TS Associate Director and Staff Physician Becky Murdock, REAC/TS Registry and Health Physics Technician

    2012-12-12

    Over the past four years, REAC/TS has presented a number of case reports from its Radiation Accident Registry. Victims of radiological or nuclear incidents must meet certain dose criteria for an incident to be categorized as an “accident” and be included in the registry. Although the greatest numbers of “accidents” in the United States that have been entered into the registry involve radiation devices, the greater percentage of serious accidents have involved sealed sources of one kind or another. But if one looks at the kinds of accident scenarios that have resulted in extreme consequence, i.e., death, the greater share of deaths has occurred in medical settings.

  19. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  20. Attack Penetration System for SQL Injection

    Directory of Open Access Journals (Sweden)

    Manju Kaushik

    2014-06-01

    Full Text Available The SQL Injection attack is a popular way of attack in terms of document structure and common threats now a day. There are several ways of attack detection as per our study and also prevention methods had been discussed in several research papers. So the main motivation of our paper to penetrate the attack. For this we have proposed an efficient framework from which the central authority can control all the visited IP and restrict those IP. If the IP is in the restricted zone then the contents are restricted by using SQL update command with some status modification states. If the restricted IP wish to access the data from their credentials, it is immediately inform to the admin and the time of attack alert will be stored in the log area of that attack. Finally by comparison we will justify our results which are better in comparison to the previous test and methodology.

  1. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  2. Patient-reported outcome measures in arthroplasty registries.

    Science.gov (United States)

    Rolfson, Ola; Eresian Chenok, Kate; Bohm, Eric; Lübbeke, Anne; Denissen, Geke; Dunn, Jennifer; Lyman, Stephen; Franklin, Patricia; Dunbar, Michael; Overgaard, Søren; Garellick, Göran; Dawson, Jill

    2016-07-01

    The International Society of Arthroplasty Registries (ISAR) Steering Committee established the Patient-Reported Outcome Measures (PROMs) Working Group to convene, evaluate, and advise on best practices in the selection, administration, and interpretation of PROMs and to support the adoption and use of PROMs for hip and knee arthroplasty in registries worldwide. The 2 main types of PROMs include generic (general health) PROMs, which provide a measure of general health for any health state, and specific PROMs, which focus on specific symptoms, diseases, organs, body regions, or body functions. The establishment of a PROM instrument requires the fulfillment of methodological standards and rigorous testing to ensure that it is valid, reliable, responsive, and acceptable to the intended population. A survey of the 41 ISAR member registries showed that 8 registries administered a PROMs program that covered all elective hip or knee arthroplasty patients and 6 registries collected PROMs for sample populations; 1 other registry had planned but had not started collection of PROMs. The most common generic instruments used were the EuroQol 5 dimension health outcome survey (EQ-5D) and the Short Form 12 health survey (SF-12) or the similar Veterans RAND 12-item health survey (VR-12). The most common specific PROMs were the Hip disability and Osteoarthritis Outcome Score (HOOS), the Knee injury and Osteoarthritis Outcome Score (KOOS), the Oxford Hip Score (OHS), the Oxford Knee Score (OKS), the Western Ontario and McMaster Universities Arthritis Index (WOMAC), and the University of California at Los Angeles Activity Score (UCLA). PMID:27168175

  3. SQL INJECTION ATTACK DETECTION AND PREVENTION

    OpenAIRE

    Dr. SUNITHA ABBURU; PERUMALSAMY RAMASAMY

    2012-01-01

    Nowadays SQL injection attacks (SQLIAs) and cross scripting increased in real web applications very much, and the SQL injection attacks damages the databases through web applications. Injection queries are different type of way to attack the databases. This paper address the issue of SQLIA’s and script in an efficient way. The proposed approach detects and prevents all the Injection queries as well as the cross scripting through the Framework and Static analysis and Dynamic analysis. The cont...

  4. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  5. Creating an effective clinical registry for rare diseases.

    Science.gov (United States)

    D'Agnolo, Hedwig Ma; Kievit, Wietske; Andrade, Raul J; Karlsen, Tom Hemming; Wedemeyer, Heiner; Drenth, Joost Ph

    2016-06-01

    The exposure of clinicians to patients with rare gastrointestinal diseases is limited. This hurts clinical studies, which impedes accumulation of scientific knowledge on the natural disease course, treatment outcomes and prognosis in these patients. An excellent method to detect patterns on an aggregate level that would not be possible to discover in individual cases, is a registry study. This paper aims to describe a template to create a successful international registry for rare diseases. We focus mainly on rare hepatic diseases, but lessons from this paper serve other fields in medicine, as well.

  6. CMS Run Registry: Data Certification Bookkeeping and Publication System

    Science.gov (United States)

    Rapsevicius, V.; CMS DQM Group

    2011-12-01

    The Run Registry of the CMS experiment at the LHC is the central tool for the tracking of the data quality monitoring and data certification workflows and the bookkeeping of the results. It consists of a Java web application frontend which connects to an Oracle database in the backend. The current production version 2 of the Run Registry application, was deployed in the beginning of the year 2010, before the LHC data taking started, and has since then undergone a number of full release cycles. In this note we describe the architecture and the experiences from the first year of datataking.

  7. Initial experiences of a multicenter transluminal revascularization registry

    International Nuclear Information System (INIS)

    This paper establishes a multicenter registry for collection and analysis of data from a large series of patients undergoing percutaneous transluminal revascularization of peripheral vascular lesions. The registry began as a joint collaboration between the radiology departments of Thomas Jefferson University Hospital and the University of Pennsylvania, through the Philadelphia Society of Angiography/Interventional Radiology. The American College of Radiology research office in Philadelphia is used as the data collection center. A detailed data form has been developed. It includes information about patient history, procedure indications, lesion location and morphology, techniques used, immediate angiographic and clinical outcome, and clinical follow-up at intervals up to 5 years

  8. Service Registry: A Key Piece for Enhancing Reuse in SOA

    Directory of Open Access Journals (Sweden)

    Juan Pablo García-González

    2013-01-01

    Full Text Available One of the promises of adopting a service-oriented approach in organizations is the potential cost savings that result from the reuse of existing services. A service registry is one of the fundamental pieces of service oriented architecture (SOA for achieving reuse. It refers to a place in which service providers can impart information about their offered services and potential clients can search for services. In this article, we provide advice for implementing an enterprise-wide service registry. We also discuss open issues in industry and academia that affect the management of service- repository information.

  9. DANBIO: a nationwide registry of biological therapies in Denmark.

    Science.gov (United States)

    Hetland, M L

    2005-01-01

    Since the year 2000, Danish rheumatologists have been collecting data on a routine basis in the nationwide DANBIO registry, which includes all rheumatologic patients receiving biological drugs. Demographic data, markers of disease activity, current treatment, serious and non-serious adverse events and reasons for discontinuation are registered at each visit either on paper forms or on-line. By June 2005, approximately 3000 treatment courses (18,000 visits) were in the registry, corresponding to close to 90% of eligible patients. Rheumatoid arthritis was the most prevalent diagnosis (75%) followed by ankylosing spondylitis (11%) and psoriatic arthritis (7%). Infections occurred in 43% of the treatment series. PMID:16273809

  10. Using registries to identify type 2 diabetes patients

    Directory of Open Access Journals (Sweden)

    Thomsen RW

    2014-12-01

    Full Text Available Reimar W Thomsen, Henrik Toft Sørensen Department of Clinical Epidemiology, Aarhus University Hospital, DenmarkValidation studies of health care registries are considered boring by some. An epidemiologist recently conducted a validation study based on the Danish National Registry of Patients and received the following unflattering comment from a reviewer: “A good example of a paper of limited scope that probably would only be published electronically where space is unlimited”. We do not subscribe to this point of view. See Original Research article

  11. Regulatory insight into the European human pluripotent stem cell registry.

    Science.gov (United States)

    Kurtz, Andreas; Stacey, Glyn; Kidane, Luam; Seriola, Anna; Stachelscheid, Harald; Veiga, Anna

    2014-12-01

    The European pluripotent stem cell registry aims at listing qualified pluripotent stem cell (PSC) lines that are available globally together with relevant information for each cell line. Specific emphasis is being put on documenting ethical procurement of the cells and providing evidence of pluripotency. The report discusses the tasks and challenges for a global PSC registry as an instrument to develop collaboration, to access cells from diverse resources and banks, and to implement standards, and as a means to follow up usage of cells and support adherence to regulatory and scientific standards and transparency for stakeholders. PMID:25457963

  12. IVOA Recommendation: Registry Relational Schema Version 1.0

    CERN Document Server

    Demleitner, Markus; Molinaro, Marco; Greene, Gretchen; Dower, Theresa; Perdikeas, Menelaos

    2015-01-01

    Registries provide a mechanism with which VO applications can discover and select resources - first and foremost data and services - that are relevant for a particular scientific problem. This specification defines an interface for searching this resource metadata based on the IVOA's TAP protocol. It specifies a set of tables that comprise a useful subset of the information contained in the registry records, as well as the table's data content in terms of the XML VOResource data model. The general design of the system is geared towards allowing easy authoring of queries.

  13. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to...... properties of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  14. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  15. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  16. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  17. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  18. A report of the Malaysian dialysis registry of the National Renal Registry, Malaysia.

    Science.gov (United States)

    Lim, Y N; Lim, T O; Lee, D G; Wong, H S; Ong, L M; Shaariah, W; Rozina, G; Morad, Z

    2008-09-01

    The Malaysian National Renal Registry was set up in 1992 to collect data for patients on renal replacement therapy (RRT). We present here the report of the Malaysian dialysis registry. The objectives of this papar are: (1) To examine the overall provision of dialysis treatment in Malaysia and its trend from 1980 to 2006. (2) To assess the treatment rate according to the states in the country. (3) To describe the method, location and funding of dialysis. (4) To characterise the patients accepted for dialysis treatment. (5) To analyze the outcomes of the dialysis treatment. Data on patients receiving dialysis treatment were collected at initiation of dialysis, at the time of any significant outcome, as well as yearly. The number of dialysis patients increased from 59 in 1980 to almost 15,000 in 2006. The dialysis acceptance rate increased from 3 per million population in 1980 to 116 per million population in 2006, and the prevalence rate from 4 to 550 per million population over the same period. The economically advantaged states of Malaysia had much higher dialysis treatment rates compared to the less economically advanced states. Eighty to 90% of new dialysis patients were accepted into centre haemodialysis (HD), and the rest into the chronic ambulatory peritoneal dialysis (CAPD) programme. The government provided about half of the funding for dialysis treatment. Patients older than 55 years accounted for the largest proportion of new patients on dialysis since the 1990s. Diabetes mellitus has been the main cause of ESRD and accounted for more than 50% of new ESRD since 2002. Annual death rate averaged about 10% on HD and 15% on CAPD. The unadjusted 5-year patient survival on both HD and CAPD was about 80%. Fifty percent of dialysis patients reported very good median QoL index score. About 70% of dialysis patients were about to work full or part time. There has been a very rapid growth of dialysis provision in Malaysia particularly in the older age groups. ESRD

  19. The National Registry of Evidence-based Programs and Practices (NREPP)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The National Registry of Evidence-based Programs and Practices (NREPP) is a searchable online registry of mental health and substance abuse interventions that have...

  20. 78 FR 1825 - Notice of Establishment of an Animal and Plant Health Inspection Service Stakeholder Registry

    Science.gov (United States)

    2013-01-09

    ... Inspection Service Stakeholder Registry AGENCY: Animal and Plant Health Inspection Service, USDA. ACTION... Service stakeholder registry. FOR FURTHER INFORMATION CONTACT: Ms. Hallie Zimmers, Advisor for State and Stakeholder Relations, Legislative and Public Affairs, APHIS, room 1147, 1400 Independence Avenue...

  1. 77 FR 2126 - Pipeline Safety: Implementation of the National Registry of Pipeline and Liquefied Natural Gas...

    Science.gov (United States)

    2012-01-13

    ... Registry of Pipeline and Liquefied Natural Gas Operators AGENCY: Pipeline and Hazardous Materials Safety... 72878), titled: ``Pipeline Safety: Updates to Pipeline and Liquefied Natural Gas Reporting Requirements... registry of pipeline and liquefied natural gas operators. FOR FURTHER INFORMATION CONTACT: Jamerson...

  2. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  3. BioSWR--semantic web services registry for bioinformatics.

    Directory of Open Access Journals (Sweden)

    Dmitry Repchevsky

    Full Text Available Despite of the variety of available Web services registries specially aimed at Life Sciences, their scope is usually restricted to a limited set of well-defined types of services. While dedicated registries are generally tied to a particular format, general-purpose ones are more adherent to standards and usually rely on Web Service Definition Language (WSDL. Although WSDL is quite flexible to support common Web services types, its lack of semantic expressiveness led to various initiatives to describe Web services via ontology languages. Nevertheless, WSDL 2.0 descriptions gained a standard representation based on Web Ontology Language (OWL. BioSWR is a novel Web services registry that provides standard Resource Description Framework (RDF based Web services descriptions along with the traditional WSDL based ones. The registry provides Web-based interface for Web services registration, querying and annotation, and is also accessible programmatically via Representational State Transfer (REST API or using a SPARQL Protocol and RDF Query Language. BioSWR server is located at http://inb.bsc.es/BioSWR/and its code is available at https://sourceforge.net/projects/bioswr/under the LGPL license.

  4. Clinical Cancer Registries - Are They Up for Health Services Research?

    Science.gov (United States)

    Pobiruchin, Monika; Bochum, Sylvia; Martens, Uwe M; Schramm, Wendelin

    2016-01-01

    Clinical cancer registries are a valuable data source for health services research (HSR). HSR is in need of high quality routine care data for its evaluations. However, the secondary use of routine data - such as documented cancer cases in a disease registry - poses new challenges in terms of data quality, IT-management, documentation processes and data privacy. In the clinical cancer registry Heilbronn-Franken, real-world data from the Giessen Tumor Documentation System (GTDS) was utilized for analyses of patients' disease processes and guideline adherence in follow-up care. A process was developed to map disease state definitions to fields of the GTDS database and extract patients' disease progress information. Thus, the disease process of sub-cohorts could be compared to each other, e.g., comparison of disease free survival of HER2 (human epidermal growth factor receptor 2)-positive and -negative women who were treated with Trastuzumab, a targeted therapy applied in breast cancer. In principle, such comparisons are feasible and of great value for HSR as they depict a routine care setting of a diverse patient cohort. Yet, local documentation practice, missing flow of information from external health care providers or small sub-cohorts impede the analyses of clinical cancer registries data bases and usage for HSR. PMID:27577380

  5. Retinoblastoma Registry report--Hospital Kuala Lumpur experience.

    Science.gov (United States)

    Jamalia, R; Sunder, R; Alagaratnam, J; Goh, P P

    2010-06-01

    Retinoblastoma is a childhood ocular cancer. The aim of this paper is to describe the clinical and epidemiological characteristics of patients with retinoblastoma in a major paediatric ophthalmology center in the country. Retrospective information was collected through the retinoblastoma registry. Late presentation with advanced staging is a major problem.

  6. Chemical Abstracts Service Chemical Registry System: History, Scope, and Impacts.

    Science.gov (United States)

    Weisgerber, David W.

    1997-01-01

    Describes the history, scope, and applications of the Chemical Abstracts Service Chemical Registry System, a computerized database that uniquely identifies chemical substances on the basis of their molecular structures. Explains searching the system is and discusses its use as an international resource. (66 references) (Author/LRW)

  7. European biliary atresia registries: summary of a symposium

    DEFF Research Database (Denmark)

    Petersen, C.; Harder, D.; Abola, Z.;

    2008-01-01

    Biliary atresia (BA) is a rare but potentially devastating disease. The European Biliary Atresia Registry (EBAR) was set up to improve data collection and to develop a pan-national and interdisciplinary strategy to improve clinical outcomes. From 2001 to 2005, 100 centers from 22 countries...

  8. National Marrow Donor Program and Be The Match Registry

    Science.gov (United States)

    ... version of this page please turn Javascript on. Feature: Bone Marrow Transplants The National Marrow Donor Program and Be The Match Registry Past Issues / Summer 2011 Table of Contents Creating connections. Saving lives. Founded in 1987 by the federal government, the ...

  9. Process produces accurate registry between circuit board prints

    Science.gov (United States)

    1966-01-01

    Tapes and quick-mount circles of contrasting colors aid in obtaining precise registry between the two circuits of two-sided printed circuit boards. The tapes and circles are mounted on opposite sides of transparent plastic film to define the conductive path and feed-through hole locations.

  10. Implementation and Analysis of Initial Trauma Registry in Iquitos, Peru

    Directory of Open Access Journals (Sweden)

    Vincent Duron

    2016-10-01

    Full Text Available Background: In Peru, 11% of deaths are due to trauma. Iquitos is a large underserved Peruvian city isolated from central resources by its geography. Our objective was to implement a locally driven trauma registry to sustainably improve trauma healthcare in this region. Methods: All trauma patients presenting to the main regional referral hospital were included in the trauma registry. A pilot study retrospectively analyzed data from the first two months after implementation. Results: From March to April 2013, 572 trauma patients were entered into the database. Average age was 26.9 years. Ten percent of patients presented more than 24 hours after injury. Most common mechanisms of injury were falls (25.5%, motor vehicle collisions (23.3%, and blunt assault (10.5%. Interim analysis revealed that 99% of patients were entered into the database. However, documentation of vital signs was poor: 42% of patients had temperature, 26% had oxygen saturation documented. After reporting to registry staff, a significant increase in temperature (42 to 97%, P < 0.001 and oxygen saturation (26 to 92%, P < 0.001 documentation was observed. Conclusion: A trauma registry is possible to implement in a resource-poor setting. Future efforts will focus on analysis of data to enhance prevention and treatment of injuries in Iquitos.

  11. hPSCreg--the human pluripotent stem cell registry.

    Science.gov (United States)

    Seltmann, Stefanie; Lekschas, Fritz; Müller, Robert; Stachelscheid, Harald; Bittner, Marie-Sophie; Zhang, Weiping; Kidane, Luam; Seriola, Anna; Veiga, Anna; Stacey, Glyn; Kurtz, Andreas

    2016-01-01

    The human pluripotent stem cell registry (hPSCreg), accessible at http://hpscreg.eu, is a public registry and data portal for human embryonic and induced pluripotent stem cell lines (hESC and hiPSC). Since their first isolation the number of hESC lines has steadily increased to over 3000 and new iPSC lines are generated in a rapidly growing number of laboratories as a result of their potentially broad applicability in biomedicine and drug testing. Many of these lines are deposited in stem cell banks, which are globally established to store tens of thousands of lines from healthy and diseased donors. The Registry provides comprehensive and standardized biological and legal information as well as tools to search and compare information from multiple hPSC sources and hence addresses a translational research need. To facilitate unambiguous identification over different resources, hPSCreg automatically creates a unique standardized name for each cell line registered. In addition to biological information, hPSCreg stores extensive data about ethical standards regarding cell sourcing and conditions for application and privacy protection. hPSCreg is the first global registry that holds both, manually validated scientific and ethical information on hPSC lines, and provides access by means of a user-friendly, mobile-ready web application. PMID:26400179

  12. hPSCreg—the human pluripotent stem cell registry

    Science.gov (United States)

    Seltmann, Stefanie; Lekschas, Fritz; Müller, Robert; Stachelscheid, Harald; Bittner, Marie-Sophie; Zhang, Weiping; Kidane, Luam; Seriola, Anna; Veiga, Anna; Stacey, Glyn; Kurtz, Andreas

    2016-01-01

    The human pluripotent stem cell registry (hPSCreg), accessible at http://hpscreg.eu, is a public registry and data portal for human embryonic and induced pluripotent stem cell lines (hESC and hiPSC). Since their first isolation the number of hESC lines has steadily increased to over 3000 and new iPSC lines are generated in a rapidly growing number of laboratories as a result of their potentially broad applicability in biomedicine and drug testing. Many of these lines are deposited in stem cell banks, which are globally established to store tens of thousands of lines from healthy and diseased donors. The Registry provides comprehensive and standardized biological and legal information as well as tools to search and compare information from multiple hPSC sources and hence addresses a translational research need. To facilitate unambiguous identification over different resources, hPSCreg automatically creates a unique standardized name for each cell line registered. In addition to biological information, hPSCreg stores extensive data about ethical standards regarding cell sourcing and conditions for application and privacy protection. hPSCreg is the first global registry that holds both, manually validated scientific and ethical information on hPSC lines, and provides access by means of a user-friendly, mobile-ready web application. PMID:26400179

  13. BioSWR--semantic web services registry for bioinformatics.

    Science.gov (United States)

    Repchevsky, Dmitry; Gelpi, Josep Ll

    2014-01-01

    Despite of the variety of available Web services registries specially aimed at Life Sciences, their scope is usually restricted to a limited set of well-defined types of services. While dedicated registries are generally tied to a particular format, general-purpose ones are more adherent to standards and usually rely on Web Service Definition Language (WSDL). Although WSDL is quite flexible to support common Web services types, its lack of semantic expressiveness led to various initiatives to describe Web services via ontology languages. Nevertheless, WSDL 2.0 descriptions gained a standard representation based on Web Ontology Language (OWL). BioSWR is a novel Web services registry that provides standard Resource Description Framework (RDF) based Web services descriptions along with the traditional WSDL based ones. The registry provides Web-based interface for Web services registration, querying and annotation, and is also accessible programmatically via Representational State Transfer (REST) API or using a SPARQL Protocol and RDF Query Language. BioSWR server is located at http://inb.bsc.es/BioSWR/and its code is available at https://sourceforge.net/projects/bioswr/under the LGPL license.

  14. Automated Detection System for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Dr K.V.N.Sunitha

    2010-10-01

    Full Text Available Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL Injection vulnerability (SQLIV, which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. The intent is that Web applications will limit the kinds of queries that can be generated to a safe subset of all possible queries, regardless of what input users provide. SQL Injection attacks are possible due to the design drawbacks of the web sites, which interact with back-end databases. Successful attacks may damage more. We introduce a system that deals with new automated technique for preventing SQLIA based on the novel concept of regular expressions is to detect SQL Injection attacks. The proposed system can detect the attacks that are from Internet and Insider Attacks, by analyzing the packets of the network servers.

  15. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    R.J.J.H. van Son

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  16. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  17. The Toxicology Investigators Consortium Case Registry--the 2012 experience.

    Science.gov (United States)

    Wiegand, Timothy; Wax, Paul; Smith, Eric; Hart, Katherine; Brent, Jeffrey

    2013-12-01

    In 2010, the American College of Medical Toxicology (ACMT) established its Case Registry, the Toxicology Investigators Consortium (ToxIC). All cases are entered prospectively and include only suspected and confirmed toxic exposures cared for at the bedside by board-certified or board-eligible medical toxicologists at its participating sites. The primary aims of establishing this Registry include the development of a realtime toxico-surveillance system in order to identify and describe current or evolving trends in poisoning and to develop a research tool in toxicology. ToxIC allows for extraction of data from medical records from multiple sites across a national and international network. All cases seen by medical toxicologists at participating institutions were entered into the database. Information characterizing patients entered in 2012 was tabulated and data from the previous years including 2010 and 2011 were included so that cumulative numbers and trends could be described as well. The current report includes data through December 31st, 2012. During 2012, 38 sites with 68 specific institutions contributed a total of 7,269 cases to the Registry. The total number of cases entered into the Registry at the end of 2012 was 17,681. Emergency departments remained the most common source of consultation in 2012, accounting for 61 % of cases. The most common reason for consultation was for pharmaceutical overdose, which occurred in 52 % of patients including intentional (41 %) and unintentional (11 %) exposures. The most common classes of agents were sedative-hypnotics (1,422 entries in 13 % of cases) non-opioid analgesics (1,295 entries in 12 % of cases), opioids (1,086 entries in 10 % of cases) and antidepressants (1,039 entries in 10 % of cases). N-acetylcysteine (NAC) was the most common antidote administered in 2012, as it was in previous years, followed by the opioid antagonist naloxone, sodium bicarbonate, physostigmine and flumazenil. Anti-crotalid Fab

  18. The Toxicology Investigators Consortium Case Registry--the 2012 experience.

    Science.gov (United States)

    Wiegand, Timothy; Wax, Paul; Smith, Eric; Hart, Katherine; Brent, Jeffrey

    2013-12-01

    In 2010, the American College of Medical Toxicology (ACMT) established its Case Registry, the Toxicology Investigators Consortium (ToxIC). All cases are entered prospectively and include only suspected and confirmed toxic exposures cared for at the bedside by board-certified or board-eligible medical toxicologists at its participating sites. The primary aims of establishing this Registry include the development of a realtime toxico-surveillance system in order to identify and describe current or evolving trends in poisoning and to develop a research tool in toxicology. ToxIC allows for extraction of data from medical records from multiple sites across a national and international network. All cases seen by medical toxicologists at participating institutions were entered into the database. Information characterizing patients entered in 2012 was tabulated and data from the previous years including 2010 and 2011 were included so that cumulative numbers and trends could be described as well. The current report includes data through December 31st, 2012. During 2012, 38 sites with 68 specific institutions contributed a total of 7,269 cases to the Registry. The total number of cases entered into the Registry at the end of 2012 was 17,681. Emergency departments remained the most common source of consultation in 2012, accounting for 61 % of cases. The most common reason for consultation was for pharmaceutical overdose, which occurred in 52 % of patients including intentional (41 %) and unintentional (11 %) exposures. The most common classes of agents were sedative-hypnotics (1,422 entries in 13 % of cases) non-opioid analgesics (1,295 entries in 12 % of cases), opioids (1,086 entries in 10 % of cases) and antidepressants (1,039 entries in 10 % of cases). N-acetylcysteine (NAC) was the most common antidote administered in 2012, as it was in previous years, followed by the opioid antagonist naloxone, sodium bicarbonate, physostigmine and flumazenil. Anti-crotalid Fab

  19. When Regional Innovation Policies Meet Policy Rationales and Evidence:

    DEFF Research Database (Denmark)

    Borrás, Susana; Jordana, Jacint

    of innovation policy rationales, advocating for more specialisation; likewise, greater data availability at the regional level has allowed more sophisticated assessment of innovation performance. Finally, the crisis since 2008 has had ravaging effects in some regions, with job losses and severe economic......In spite of recent advancements regarding regional innovation policy rationales and evidence, there are few analyses about the actual features of existing regional innovation policies. Nevertheless, a policy analysis perspective is important in order to recognise their distinctive patterns across...... regions, and to understand how rationales and evidence can be translated into policy-making. To this purpose, this paper develops a framework to study the extent to which regional innovation policies have changed during the past few years. Since the mid-2000s there has been an important development...

  20. When Regional Innovation Policies meet Policy Rationales and Evidence

    DEFF Research Database (Denmark)

    Borrás, Susana; Jordana, Jacint

    2016-01-01

    of innovation policy rationales, advocating for more specialization; likewise, greater data availability at the regional level has allowed more sophisticated assessment of innovation performance. Finally, the crisis since 2008 has had ravaging effects in some regions, with job losses and severe economic......In spite of recent advancements regarding regional innovation policy rationales and evidence, there are few analyses about the actual features of existing regional innovation policies. Nevertheless, a policy analysis perspective is important in order to recognize their distinctive patterns across...... regions, and to understand how rationales and evidence can be translated into policy-making. To this purpose, this paper develops a framework to study the extent to which regional innovation policies have changed during the past few years. Since the mid-2000s, there has been an important development...

  1. [The medical rationale category and a new epistemology in health].

    Science.gov (United States)

    do Nascimento, Marilene Cabral; de Barros, Nelson Filice; Nogueira, Maria Inês; Luz, Madel Therezinha

    2013-12-01

    This article is an analytical report on the 20-year trajectory of the 'medical rationale' category that emerged in the early 1990s in the area of Social and Human Sciences in Health in the field of Public Health. Its objective was to study complex and therapeutic medical systems and traditional, complementary and alternative medicines. Based on a critical review of the literature, it presents some aspects of the cultural, political, institutional and social context of its emergence, as well as its main contributions and developments on a theoretical level and on social policies and practices in health. The southern epistemology concept of Boaventura de Sousa Santos is used to reflect upon the contribution of the 'medical rationale' category to the critique of the post-modern scientific rationale and to the creation of a new epistemology in health.

  2. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  3. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  4. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  5. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  6. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  7. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  8. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  9. Limitations of drug registries to evaluate orphan medicinal products for the treatment of lysosomal storage disorders

    NARCIS (Netherlands)

    C.E.M. Hollak; J.M.F.G. Aerts; S. Aymé; J. Manuel

    2011-01-01

    Orphan drugs are often approved under exceptional circumstances, requiring submission of additional data on safety and effectiveness through registries. These registries are mainly focused on one drug only and data is frequently incomplete. Some registries also address phenotypic heterogeneity and n

  10. Improving Diabetes Outcomes Using a Web-Based Registry and Interactive Education: A Multisite Collaborative Approach

    Science.gov (United States)

    Morrow, Robert W.; Fletcher, Jason; Kelly, Kim F.; Shea, Laura A.; Spence, Maureen M.; Sullivan, Janet N.; Cerniglia, Joan R.; Yang, YoonJung

    2013-01-01

    Introduction: To support the adoption of guideline concordant care by primary care practices, the New York Diabetes Coalition (NYDC) promoted use of an electronic diabetes registry and developed an interactive educational module on using the registry and improving patient communication. The NYDC hypothesized that use of a registry with immediate…

  11. Developing a provisional and national renal disease registry for Iran

    Directory of Open Access Journals (Sweden)

    Sima Ajami

    2015-01-01

    Full Text Available Background: Disease registry is a database that includes information about people suffering a special kind of disease. The aim of this study was to first identify and compare the National Renal Disease Registry (NRDR characteristics in some countries with Iran; and second, develop a provisional and NRDR for Iran. Materials and Methods: Retrieval of data of the NRDR was performed by scholars responsible in related agencies, including the Ministry of Health and Medical Education, Renal Disease charity, and data registries in the United States, United Kingdom, Malaysia, and Iran. This research was applied, and the study was descriptive-comparative. The study population consisted of the NRDR in selected countries in which data were collected by forms that were designed according to the study objectives. Sources of data were researchers, articles, books, journals, databases, websites, related documents, and people who are active in this regard, and related agencies, including the Ministry of Health and Medical Education, and patient support charity. The researchers collected data for each country based on the study objectives and then put them in comparative tables. Data were analyzed by descriptive, comparative, and theoretical methods. Results: Most of the renal transplant teams report their own results as a single center experiences. America and Britain have a preeminent national registry of renal disease compared to other countries. Conclusion: Given that control, prevention, and treatment of chronic renal diseases incur high expenses and the disease is one of leading mortality factors in Iran and across the world and since national registry system for chronic renal diseases can provide better tools and strategies to manage and evaluate patients′ characteristics as well as risk factors which eventually leads to making better decisions.

  12. Inception of a national multidisciplinary registry for stereotactic radiosurgery.

    Science.gov (United States)

    Sheehan, Jason P; Kavanagh, Brian D; Asher, Anthony; Harbaugh, Robert E

    2016-01-01

    Stereotactic radiosurgery (SRS) represents a multidisciplinary approach to the delivery of ionizing high-dose radiation to treat a wide variety of disorders. Much of the radiosurgical literature is based upon retrospective single-center studies along with a few randomized controlled clinical trials. More timely and effective evidence is needed to enhance the consistency and quality of and clinical outcomes achieved with SRS. The authors summarize the creation and implementation of a national SRS registry. The American Association of Neurological Surgeons (AANS) through NeuroPoint Alliance, Inc., started a successful registry effort with its lumbar spine initiative. Following a similar approach, the AANS and NeuroPoint Alliance collaborated with corporate partners and the American Society for Radiation Oncology to devise a data dictionary for an SRS registry. Through administrative and financial support from professional societies and corporate partners, a framework for implementation of the registry was created. Initial plans were devised for a 3-year effort encompassing 30 high-volume SRS centers across the country. Device-specific web-based data-extraction platforms were built by the corporate partners. Data uploaders were then used to port the data to a common repository managed by Quintiles, a national and international health care trials company. Audits of the data for completeness and veracity will be undertaken by Quintiles to ensure data fidelity. Data governance and analysis are overseen by an SRS board comprising equal numbers of representatives from the AANS and NeuroPoint Alliance. Over time, quality outcome assessments and post hoc research can be performed to advance the field of SRS. Stereotactic radiosurgery offers a high-technology approach to treating complex intracranial disorders. Improvements in the consistency and quality of care delivered to patients who undergo SRS should be afforded by the national registry effort that is underway. PMID

  13. Inception of a national multidisciplinary registry for stereotactic radiosurgery.

    Science.gov (United States)

    Sheehan, Jason P; Kavanagh, Brian D; Asher, Anthony; Harbaugh, Robert E

    2016-01-01

    Stereotactic radiosurgery (SRS) represents a multidisciplinary approach to the delivery of ionizing high-dose radiation to treat a wide variety of disorders. Much of the radiosurgical literature is based upon retrospective single-center studies along with a few randomized controlled clinical trials. More timely and effective evidence is needed to enhance the consistency and quality of and clinical outcomes achieved with SRS. The authors summarize the creation and implementation of a national SRS registry. The American Association of Neurological Surgeons (AANS) through NeuroPoint Alliance, Inc., started a successful registry effort with its lumbar spine initiative. Following a similar approach, the AANS and NeuroPoint Alliance collaborated with corporate partners and the American Society for Radiation Oncology to devise a data dictionary for an SRS registry. Through administrative and financial support from professional societies and corporate partners, a framework for implementation of the registry was created. Initial plans were devised for a 3-year effort encompassing 30 high-volume SRS centers across the country. Device-specific web-based data-extraction platforms were built by the corporate partners. Data uploaders were then used to port the data to a common repository managed by Quintiles, a national and international health care trials company. Audits of the data for completeness and veracity will be undertaken by Quintiles to ensure data fidelity. Data governance and analysis are overseen by an SRS board comprising equal numbers of representatives from the AANS and NeuroPoint Alliance. Over time, quality outcome assessments and post hoc research can be performed to advance the field of SRS. Stereotactic radiosurgery offers a high-technology approach to treating complex intracranial disorders. Improvements in the consistency and quality of care delivered to patients who undergo SRS should be afforded by the national registry effort that is underway.

  14. Home enteral nutrition in Spain: NADYA registry 2011-2012

    Directory of Open Access Journals (Sweden)

    Carmina Wanden-Berghe

    2014-06-01

    Full Text Available Objective: To describe the results of the home enteral nutrition (HEN registry of the NADYA-SENPE group in 2011 and 2012. Material and methods: We retrieved the data of the patients recorded from January 1st 2011 to December 31st 2012. Results: There were 3021 patients in the registry during the period from 29 hospitals, which gives 65.39 per million inhabitants. 97.95% were adults, 51.4% male. Mean age was 67.64 ± 19.1, median age was 72 years for adults and 7 months for children. Median duration with HEN was 351 days and for 97.5% was their first event with HEN. Most patients had HEN because of neurological disease (57.8%. Access route was nasogastric tube for 43.5% and gastrostomy for 33.5%. Most patients had limited activity level and, concerning autonomy, 54.8% needed total help. Nutritional formula was supplied from chemist's office to 73.8% of patients and disposables, when necessary, was supplied from hospitals to 53.8% of patients. HEN was finished for 1,031 patients (34.1% during the period of study, 56.6% due to decease and 22.2% due to recovery of oral intake. Conclusions: Data from NADYA-SENPE registry must be explained cautiously because it is a non-compulsory registry. In spite of the change in the methodology of the registry in 2010, tendencies regarding HEN have been maintained, other than oral route.

  15. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  16. Research on First Attack Probability Model of an Attacker Level Bombing Anti-air Radars

    Institute of Scientific and Technical Information of China (English)

    LUO Peng-cheng; MU Fu-ling; ZHOU Jing-lun

    2007-01-01

    The paper mainly studies the first attack probability (FAP) of an attacker level bombing anti-air radars through analyzing the radiant point orientation and attack (RPOA) process of attackers. Firstly, the searching target process is analyzed, and a corresponding target finding model is brought forward. Secondly, the target approaching process is concretely analyzed when the attacker levelly bombs the anti-air radar, and a corresponding target approaching model is presented. Finally, a demonstration is given to analyze the major factors in the model and prove its validity.

  17. An Network Attack Modeling Method Based on MLL-AT

    Science.gov (United States)

    Fen, Yan; Xinchun, Yin; Hao, Huang

    In this paper, the method of modeling attack using attack tree is researched. The main goal is effectively using attack tree to model and express multi-stage network attacks. We expand and improve the traditional attack tree. The attack nodes in traditional attack tree are redefined, and the attack risk of leaf node is quantified. On those basis, the mentality and method of building MLL-AT (Multi-Level & Layer Attack Tree) are proposed. The improved attack tree can model attack more accurately, in particular to multi-stage network attacks. And the new model can also be used to evaluate system's risk, to distinguish between varying system security threat degrees caused by different attack sequences.

  18. Medical complications in patients with stroke: data validity in a stroke registry and a hospital discharge registry

    Directory of Open Access Journals (Sweden)

    Annette Ingeman

    2010-03-01

    Full Text Available Annette Ingeman1, Grethe Andersen2, Heidi H Hundborg1, Søren P Johnsen11Department of Clinical Epidemiology, 2Department of Neurology, Aarhus University Hospital, DenmarkBackground: Stroke patients frequently experience medical complications; yet, data on incidence, causes, and consequences are sparse.Objective: To examine the data validity of medical complications among patients with stroke in a population-based clinical registry and a hospital discharge registry.Methods: We examined the predictive values, sensitivity and specificity of medical complications among patients admitted to specialized stroke units and registered in the Danish National Indicator Project (DNIP and the Danish National Registry of Patients (NRP between January 2003 and December 2006 (n = 8,024. We retrieved and reviewed medical records from a random sample of patients (n = 589, 7.3%.Results: We found substantial variation in the data quality of stroke-related medical complication diagnoses both within the specific complications and between the registries. The positive predictive values ranged from 39.0%–87.1% in the DNIP, and from 0.0%–92.9% in the NRP. The negative predictive values ranged from 71.6%–98.9% in the DNIP and from 63.3% to 97.4% in the NRP. In both registries the specificity of the diagnoses was high. The sensitivity ranged from 23.5% (95% confidence interval [CI]: 14.9–35.4 for falls to 62.9% (95% CI: 54.9–70.4 for urinary infection in the DNIP, and from 0.0 (95% CI: 0.0–4.99 for falls to 18.1% (95% CI: 2.3–51.8 for pressure ulcer in the NRP.Conclusion: The DNIP may be useful for studying medical complications among patients with stroke.Keywords: stroke, medical complications, data validity, clinical database

  19. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  20. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  1. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  2. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  3. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  4. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  5. Attack detection in unattended sensor networks

    Science.gov (United States)

    Wu, Curt; Monnier, Camille; Fry, Gerald; Girod, Lewis; Luke, Jahn

    2010-04-01

    Because sensor networks are often deployed in hostile environments where their security and integrity may be compromised, it is essential to maximize the reliability and trustworthiness of existing and envisioned sensor networks. During operations, the sensor network must be robust to deception, node compromise, and various other attacks, while maintaining the operator's situational awareness regarding the health and integrity of the system. To address these needs, we have designed a Framework to Ensure and Assess Trustworthiness in Sensor systems (FEATS) to identify attacks on sensor system integrity and inform the operator of sensor data trustworthiness. We have developed and validated unsupervised anomaly detection algorithms for sensor data captured from an experimental acoustic sensor platform under a number of attack scenarios. The platform, which contains four audio microphones, was exposed to two physical attacks (audio filtering and audio playback) as well as a live replay attack (replaying live audio data that is captured at a remote location), which is analogous to a wormhole attack in the routing layer. With our unsupervised learning algorithms, we were able to successfully identify the presence of various attacks.

  6. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  7. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  8. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  9. Framing Involvement: Rationale Construction in an Interorganisational Collaboration

    Science.gov (United States)

    Siegel, David J.

    2008-01-01

    An analysis of the different rationales articulated and utilized by partners in an interorganizational collaboration is the focus of this paper. The Leadership Education and Development (LEAD) Program in Business is an initiative involving 12 US universities, nearly 40 multinational corporations, a federal government agency, and a non-profit…

  10. Building "Applied Linguistic Historiography": Rationale, Scope, and Methods

    Science.gov (United States)

    Smith, Richard

    2016-01-01

    In this article I argue for the establishment of "Applied Linguistic Historiography" (ALH), that is, a new domain of enquiry within applied linguistics involving a rigorous, scholarly, and self-reflexive approach to historical research. Considering issues of rationale, scope, and methods in turn, I provide reasons why ALH is needed and…

  11. Meeting a Moral Imperative: A Rationale for Teaching the Holocaust

    Science.gov (United States)

    Lindquist, David H.

    2011-01-01

    A primary rationale for studying the Holocaust (Shoah) involves the opportunity to consider the moral implications that can be drawn from examining the event. Studying the Shoah forces students to consider what it means to be human and humane by examining the full continuum of individual behavior, from "ultimate evil" to "ultimate good". This…

  12. Karl Popper and Jean Piaget: A Rationale for Constructivism

    Science.gov (United States)

    Harlow, Steve; Cummings, Rhoda; Aberasturi, Suzanne M.

    2006-01-01

    The current faddish use of the term constructivism has taken on as many different definitions as the number of people attempting to define it. This essay clarifies the meaning of constructivism through an examination of Karl Popper's and Jean Piaget's theories. The authors provide a rationale for the use of Popper's paradigm of "Three Worlds" and…

  13. A Rationale for Mixed Methods (Integrative) Research Programmes in Education

    Science.gov (United States)

    Niaz, Mansoor

    2008-01-01

    Recent research shows that research programmes (quantitative, qualitative and mixed) in education are not displaced (as suggested by Kuhn) but rather lead to integration. The objective of this study is to present a rationale for mixed methods (integrative) research programs based on contemporary philosophy of science (Lakatos, Giere, Cartwright,…

  14. Introducing ICT in Schools in England: Rationale and Consequences

    Science.gov (United States)

    Hammond, Michael

    2014-01-01

    This paper provides a critical perspective on the attempts to promote the use of information and communication technology (ICT) in teaching and learning in England. It describes the rationale given for the introduction of ICT in terms of its potential to impact on educational standards to contribute to developing a curriculum which has more…

  15. Rationale of Early Adopters of Fossil Fuel Divestment

    Science.gov (United States)

    Beer, Christopher Todd

    2016-01-01

    Purpose: This research uses the social science perspectives of institutions, ecological modernization and social movements to analyze the rationale used by the early-adopting universities of fossil fuel divestment in the USA. Design/methodology/approach: Through analysis of qualitative data from interviews with key actors at the universities that…

  16. Who Is at Risk for a Heart Attack?

    Science.gov (United States)

    ... on Twitter. Who Is at Risk for a Heart Attack? Certain risk factors make it more likely that ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  17. Need for a roadmap for development of a coordinated national registry programme.

    Science.gov (United States)

    Wilkins, S; Best, R L; Evans, S M

    2015-11-01

    Clinical quality registries are an overlooked and under-funded arm of clinical research in Australia. Registries are databases for patients with a particular disease, or who undergo a procedure, or use a health resource. Registries, where properly funded and universally adopted, have provided substantial benefits to the quality of healthcare and, in some cases, have had demonstrable effect in reducing costs. There is a lack of a coordinated programme for both funding and development of registries in Australia. A coordinated effort is required to address key gaps in registry coverage and ensure registries comply with appropriate technical and operating principles, and target areas where registries can add value to the health system. This will ensure that Australia is competitive with its international peers in this dynamic environment.

  18. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    OpenAIRE

    Patel, A K; Jaypalsinh. A. Gohil; D.T. Meva

    2010-01-01

    Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between commun...

  19. Patient and Provider Assessment of Lipid Management Registry

    Science.gov (United States)

    2016-02-15

    Hyperlipidemia; Hypercholesterolemia; Cardiovascular Disease; Diabetes; Chronic Kidney Disease (CKD); Hypertension; Smoking; Myocardial Infarction (MI); Unstable Angina; Angina; Coronary Artery Disease (CAD); Stroke; Transient Ischemic Attack (TIA); Carotid Stenosis; Peripheral Arterial Disease; Atherosclerosis; Claudication

  20. Registry Evaluation of Digital Ulcers in Systemic Sclerosis

    Directory of Open Access Journals (Sweden)

    Felice Galluccio

    2010-01-01

    Full Text Available Digital ulcers are a very frequent complication of systemic sclerosis affecting about half of the SSc patients, and about 75% of the affected patients have their first DU episode within 5 years from their first non-Raynaud symptom. The lack of adequate classification criteria as well as the lack of knowledge of the development of DU have contributed to the opening of specific registries to better understand the natural history of these lesions. For these reason, specific disease registries play a fundamental role in this field of research. Thanks to the systematic collection of data and their subsequent analysis and comparison between different cohorts, it is possible to improve understanding of the underlying trigger mechanisms of DU development and to determine temporal trends. In the future, the development of recommendations for the management of DU remains of pivotal importance to prevent DU development and obtain rapid healing as well as reduction of pain and disability.

  1. Need for Renal Biopsy Registry in Saudi Arabia

    Directory of Open Access Journals (Sweden)

    Al-Homrany Mohammad

    2008-01-01

    Full Text Available Many renal lesions may result in chronic kidney disease if not detected early or treated properly. Glomerulonephritis is considered one of the leading causes of end-stage renal disease. The prevalence of different renal lesions were identified by inconsistent studies. The causes of inconsistencies include lack of unified methods in diagnosing and processing renal biopsies by different pathologists, patients selection′s bias for renal biopsy, and the variable policies and protocols adopted by different nephrologists. Establishment of renal biopsy registry may help to surmount these differences. In addition, combined data obtained from renal biopsy renal and replacement therapy registries can help study the long-term outcome of patients with renal diseases.

  2. The International Quotidian Dialysis Registry: annual report 2006.

    Science.gov (United States)

    Nesrallah, Gihad E; Suri, Rita S; Zoller, Rezso; Garg, Amit X; Moist, Louise M; Lindsay, Robert M

    2006-07-01

    Interest in short daily and nocturnal hemodialysis (HD) regimens continues to grow worldwide. Despite growing optimism that these therapies will afford better patient outcomes over conventional HD, the current literature has not been viewed as sufficiently compelling to affect widespread implementation in most jurisdictions. Before these therapies can gain wider acceptance, larger and more rigorous studies will likely be needed. In June 2004, the Quotidian Dialysis Registry, based at the Lawson Health Research Institute at the University of Western Ontario, Canada, began recruiting patients across North America. By using an Internet-based data entry platform, patients from various centers worldwide will eventually be recruited, and studied prospectively. This paper constitutes the second annual update on patient and center recruitment, patient and treatment characteristics, and future directions for the registry. PMID:16805881

  3. Observatory and registry of school buildings for maintenance planning

    Directory of Open Access Journals (Sweden)

    Maria Rita Pinto

    2015-04-01

    Full Text Available The issue of the school has been a priority in the political agenda of the successive Italian governments during the last decade. This priority is also due to the size of the school real estate, consisting of approximately 41,000 buildings. The recent reactivation of the Observatory of School Buildings and of the Registry is an opportunity to improve maintenance planning. The paper deals with the role of the Observatory in monitoring the conservation status of school real estate, and the objectives to be pursued through the activation of the School Building Registry. Indeed, the integration with UNI standards in the field of maintenance can produce positive results in terms of quality and quantity of data available for the Information System, which represents an essential tool to streamline time and costs of inspections and interventions.

  4. Nanotubes Motion on Layered Materials: A Registry Perspective

    CERN Document Server

    Oz, Inbal; Itkin, Yaron; Buchwalter, Asaf; Akulov, Katherine; Hod, Oded

    2015-01-01

    At dry and clean material junctions of rigid materials the corrugation of the sliding energy landscape is dominated by variations of Pauli repulsions. These occur when electron clouds centered around atoms in adjacent layers overlap as they slide across each other. In such cases there exists a direct relation between interfacial surface (in)commensurability and superlubricity, a frictionless and wearless tribological state. The Registry Index is a purely geometrical parameter that quanti?es the degree of interlayer commensurability, thus providing a simple and intuitive method for the prediction of sliding energy landscapes at rigid material interfaces. In the present study, we extend the applicability of the Registry Index to non-parallel surfaces, using a model system of nanotubes motion on ?at hexagonal materials. Our method successfully reproduces sliding energy landscapes of carbon nanotubes on Graphene calculated using a Lennard-Jones type and the Kolmogorov-Crespi interlayer potentials. Furthermore, it...

  5. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  6. SQL INJECTION ATTACK DETECTION AND PREVENTION

    Directory of Open Access Journals (Sweden)

    Dr. SUNITHA ABBURU

    2012-04-01

    Full Text Available Nowadays SQL injection attacks (SQLIAs and cross scripting increased in real web applications very much, and the SQL injection attacks damages the databases through web applications. Injection queries are different type of way to attack the databases. This paper address the issue of SQLIA’s and script in an efficient way. The proposed approach detects and prevents all the Injection queries as well as the cross scripting through the Framework and Static analysis and Dynamic analysis. The contribution is twofold 1. SQL Injection AttackDetection and prevention 2. SQL Injection Reports. These techniques have been implemented in ASP.Net and SQL Server and tested by conducting various experiments and prove that the web applications and database is protected from scripting and SQL injection queries.

  7. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  8. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  9. Recovery of infrastructure networks after localised attacks

    Science.gov (United States)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  10. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  11. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  12. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  13. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  14. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  15. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  16. Karachi Commander Escapes Attack, 10 Dead

    Institute of Scientific and Technical Information of China (English)

    潘志强

    2004-01-01

    KARACHI: The army commander in the Pakistani city of Karachi narrowly① escaped assassination② yesterday when gunmen attacked his convoy③ with gunfire and a bomb, killing at least 10 and wounding his driver, officials said.

  17. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  18. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  19. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  20. Results from a multicentre international registry of familial Mediterranean fever

    DEFF Research Database (Denmark)

    Ozen, Seza; Demirkaya, Erkan; Amaryan, Gayane;

    2014-01-01

    BACKGROUND AND AIM: Familial Mediterranean fever (FMF) is an autoinflammatory disease caused by mutations of the MEFV gene. We analyse the impact of ethnic, environmental and genetic factors on the severity of disease presentation in a large international registry. METHODS: Demographic, genetic...... Mediterranean patients whether they lived in their countries or western European countries. European patients had a lower frequency of the high penetrance M694V mutation and a significant delay of diagnosis (pfever episodes...

  1. The German Aortic Valve Registry (GARY): in-hospital outcome

    OpenAIRE

    Hamm, Christian W.; Möllmann, Helge; Holzhey, David; Beckmann, Andreas; Veit, Christof; Figulla, Hans-Reiner; Cremer, J; Kuck, Karl-Heinz; Lange, Rüdiger; Zahn, Ralf; Sack, Stefan; Schuler, Gerhard; Walther, Thomas; Beyersdorf, Friedhelm; Böhm, Michael

    2013-01-01

    Background Aortic stenosis is a frequent valvular disease especially in elderly patients. Catheter-based valve implantation has emerged as a valuable treatment approach for these patients being either at very high risk for conventional surgery or even deemed inoperable. The German Aortic Valve Registry (GARY) provides data on conventional and catheter-based aortic procedures on an all-comers basis. Methods and results A total of 13 860 consecutive patients undergoing repair for aortic valve d...

  2. Gender differences in acute stroke: Istanbul medical school stroke registry

    OpenAIRE

    Nilüfer Yesilot; Bahar Aksay Koyuncu; Oguzhan Çoban; Rezzan Tuncay; Sara Zarko Bahar

    2011-01-01

    Background : We aimed to investigate gender differences in Turkish stroke patients. Material and Methods : Demographics, risk factors, clinical and etiologic subtypes, laboratory findings, clinical course, and in-hospital prognosis of 1 522 patients with ischemic stroke (IS) and 320 patients with intracerebral hemorrhage prospectively registered in the Istanbul Medical School Stroke Registry (1994-2004) were analyzed separately. Results : The mean age of IS patients was higher in females (n :...

  3. Pleural Mesothelioma Surveillance: Validity of Cases from a Tumour Registry

    Directory of Open Access Journals (Sweden)

    France Labrèche

    2012-01-01

    Full Text Available BACKGROUND: Pleural mesothelioma is a rare tumour associated with exposure to asbestos fibres. Fewer than than one-quarter of cases registered in the Quebec Tumour Registry (QTR have been compensated as work-related. While establishing a surveillance system, this led to questioning as to whether there has been over-registration of cases that are not authentic pleural mesotheliomas in the QTR.

  4. Baseline Characteristics of the Korean Registry of Pulmonary Arterial Hypertension

    OpenAIRE

    Chung, Wook-Jin; Park, Yong Bum; Jeon, Chan Hong; Jung, Jo Won; Ko, Kwang-Phil; Choi, Sung Jae; Seo, Hye Sun; Lee, Jae Seung; Jung, Hae Ok; ,

    2015-01-01

    Despite recent advances in understanding of the pathobiology and targeted treatments of pulmonary arterial hypertension (PAH), epidemiologic data from large populations have been limited to western countries. The aim of the Korean Registry of Pulmonary Arterial Hypertension (KORPAH) was to examine the epidemiology and prognosis of Korean patients with PAH. KORPAH was designed as a nationwide, multicenter, prospective data collection using an internet webserver from September 2008 to December ...

  5. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  6. CASE STUDY OF SQL INJECTION ATTACKS

    OpenAIRE

    Sonakshi*, Rakesh Kumar, Girdhar Gopal

    2016-01-01

    Today, most of the web applications are associated with database at back-end so there are possibilities of SQL injection attacks (SQLIA) on it. A number of preventive measures have also been discovered by various researchers to overcome this attack, but which measure is more convenient and provides fast access to application without compromising the security is also a major concern nowadays. This paper provides a clear distinction among different types of SQLIAs and how these can be performed...

  7. Textual Manipulation for SQL Injection Attacks

    OpenAIRE

    Hussein AlNabulsi; Izzat Alsmadi; Mohammad Al-Jarrah

    2013-01-01

    SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNOR...

  8. Panic Attack during Elective Gastrointestinal Endoscopy

    OpenAIRE

    Charalampos Mitsonis; Nikolaos Dimopoulos; Marianna Zavrou; Vassiliki Psarra; Christos Giofkos; Christos Fiorakis; Athanasios Dimitriadis; Dimitrios Valavanis; Eleni Vousoura; Iannis Zervas; Efstathios Papavassiliou

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatie...

  9. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  10. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  11. Two Improved Multiple-Differential Collision Attacks

    OpenAIRE

    An Wang; Liji Wu; Zongyue Wang; Xuexin Zheng; Man Chen; Jing Ma

    2014-01-01

    In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementat...

  12. Logical Modes of Attack in Argumentation Networks

    OpenAIRE

    Gabbay, Dov M.; Garcez, A. S. D. Avila

    2009-01-01

    This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the meta level to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, the...

  13. Military Orthopaedic Trauma Registry: Quality Data Now Available.

    Science.gov (United States)

    Rivera, Jessica C; Greer, Renee M; Wenke, Joseph C; Ficke, James R; Johnson, Anthony E

    2016-01-01

    The Military Orthopaedic Trauma Registry (MOTR) orginally began as part of the Department of Defense Trauma Registry (DoDTR) and became a live registry in 2013. As a quality improvement process, this study examined MOTR data for 20 female amputees compared with DoDTR data. The DoDTR provided diagnosis and procedure codes as a list but no details. The MOTR provided additional data, including specific limb, fracture classifications, and associated injuries per limb. The MOTR allowed for construction of a treatment time line for each limb, including number and timing of debridements, antibiotics, and implant types. Orthopaedic-specific complications were also coded more frequently in the MOTR and clearly identified with a specific injury and treatment. During initial quality control checks, the MOTR provides a greater volume and granularity of detail for orthopaedic-specific injury and treatment information, indicating that the MOTR is on track to provide a valuable repository for data-driven orthopaedic management of combat injury. PMID:27518292

  14. The importance of rheumatology biologic registries in Latin America.

    Science.gov (United States)

    de la Vega, Maria; da Silveira de Carvalho, Hellen M; Ventura Ríos, Lucio; Goycochea Robles, Maria V; Casado, Gustavo C

    2013-04-01

    Rheumatoid arthritis is a systemic inflammatory disorder characterized by joint articular pain and disability. Although there is scarcity of data available on the incidence and prevalence of RA in Latin America, there is a growing recognition of this disease where chronic diseases are on the rise and infectious disease on the decline. RA is a substantial burden to patients, society, and the healthcare system. The heterogeneity identified within RA presents an opportunity for personalized medicine, especially in regions with such demographic diversity as that of Latin America. To understand the long-term effects of treatment for RA especially on safety, registries have been established, a number of which have been created in Latin America. Despite their weaknesses (e.g., lack of controls and randomization), registries have provided additional and complementary information on the use of biologics in clinical practice in Latin America and other regions. Although certain challenges remain in the implementation and maintenance of registries, they continue to provide real-life data to clinical practice contributing to improved patient care.

  15. The German IVF-Registry – D·I·R

    Directory of Open Access Journals (Sweden)

    Bühler K

    2013-01-01

    Full Text Available Systematic data collection in the field of assisted reproductive techniques is performed in Germany since 30 years. Since 1997, data collection is performed electronically and in a prospective way. In 1998, by a code of the German Medical Association participation at the registry has become mandatory for all IVF centres in Germany. Different software solutions can be used in the centres for data collection. All of them have to cooperate with a special “DIRmod-DLL”, controlling online plausibility and prospectivity of the collected data. More than one million treatment cycles have been reported in the annuals published since 1996 up to 2010. All in all 1.2 millions cycles are included in the registry. Clinical pregnancy rate increased continuously and miscarriage rate decreased. By reduction of the mean number of transferred embryos of about 20% the percentage of born triplets in relationship to all children born after ART decreased of about 80%. It can be shown with the huge number of documented cycles that political decisions exert a dominating influence on treatment and drug choice. The German IVF registry has been established over the last 30 years as an instrument of quality assurance and has experienced highest regard by colleagues and by the international scientific world.

  16. Implementation and analysis of initial trauma registry in Iquitos, Peru

    Science.gov (United States)

    Duron, Vincent; DeUgarte, Daniel; Bliss, David; Salazar, Ernesto; Casapia, Martin; Ford, Henri; Upperman, Jeffrey

    2016-01-01

    Background: In Peru, 11% of deaths are due to trauma. Iquitos is a large underserved Peruvian city isolated from central resources by its geography. Our objective was to implement a locally driven trauma registry to sustainably improve trauma healthcare in this region. Methods: All trauma patients presenting to the main regional referral hospital were included in the trauma registry. A pilot study retrospectively analyzed data from the first two months after implementation. Results: From March to April 2013, 572 trauma patients were entered into the database. Average age was 26.9 years. Ten percent of patients presented more than 24 hours after injury. Most common mechanisms of injury were falls (25.5%), motor vehicle collisions (23.3%), and blunt assault (10.5%). Interim analysis revealed that 99% of patients were entered into the database. However, documentation of vital signs was poor: 42% of patients had temperature, 26% had oxygen saturation documented. After reporting to registry staff, a significant increase in temperature (42 to 97%, P analysis of data to enhance prevention and treatment of injuries in Iquitos.

  17. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  18. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  19. [Lucky National Registry (Luxembourg Acute Myocardial Infarction Registry). Are women much better taken care of than men?].

    Science.gov (United States)

    Oprea, Irina; Vaillant, Michel; Hesse, Malou; Jacobs, Loredana; Beissel, Jean; Wagner, Daniel R

    2008-01-01

    The national LUCKY registry (Luxembourg Acute Myocardial Infarction Registry) confirms for Luxembourg that transfer of patients with acute myocardial infarction for primary percutaneous coronary intervention (PCI) is very effective. However, while mortality is low after PCI, a third of the patients with acute myocardial infarction develop severe left ventricular dysfunction. This may in part be explained by relatively long time delays between onset of symptoms and opening of the infarct-related artery, despite short distances between hospitals (time is myocardium). Surprisingly, in comparison with men, women are younger, have a higher body mass index and receive less evidence-based therapies such as statins before and after myocardial infarction. In conclusion, PCI has substantially improved the treatment of acute myocardial infarction in Luxembourg, but all actors including the patient have to keep efforts high to minimize time delays.

  20. A framework for design rationale capture and use during geometry design

    OpenAIRE

    Van Schaik, Jeroen Robbert

    2014-01-01

    Despite broad agreement on the utility of design rationale use and capture, a review of the relevant literature shows that industrial usage remains limited, especially during geometry design. An initial field study confirmed low design rationale capture during the geometry design stage. The lack of linking between design rationale and geometry models is identified as a factor holding back design rationale capture. A toolset is presented to link entities in geometry models to design ra...

  1. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the

  2. Report of incidence and mortality in China cancer registries, 2009

    Institute of Scientific and Technical Information of China (English)

    Wanqing Chen; Rongshou Zheng; Siwei Zhang; Ping Zhao; Guanglin Li; Lingyou Wu; Jie He

    2013-01-01

    The National Central Cancer Registry (NCCR) collected cancer registration data in 2009 from local cancer registries in 2012,and analyzed to describe cancer incidence and mortality in China.Methods.:On basis of the criteria of data quality from NCCR,data subrnitted from 104 registries were checked and evaluated.There were 72 registries' data qualified and accepted for cancer registry annual report in 2012.Descriptive analysis included incidence and mortality stratified by area (urban/rural),sex,age group and cancer site.The top 10 common cancers in different groups,proportion and cumulative rates were also calculated.Chinese population census in 1982 and Segi's population were used for age-standardized incidence/mortality rates.Results:All 72 cancer registries covered a total of 85,470,522 population (57,489,009 in urban and 27,981,513 in rural areas).The total new cancer incident cases and cancer deaths were 244,366 and 154,310,respectively.The morphology verified cases accounted for 67.23%,and 3.14% of incident cases only had information from death certifications.The crude incidence rate in Chinese cancer registration areas was 285.91/100,000(males 317.97/100,000,females 253.09/100,000),age-standardized incidence rates by Chinese standard population (ASIRC) and by world standard population (ASIRW) were 146.87/100,000 and 191.72/100,000 with the cumulative incidence rate (0-74 age years old) of 22.08%.The cancer incidence and ASIRC were 303.39/100,000 and 150.31/100,000 in urban areas whereas in rural areas,they were 249.98/100,000 and 139.68/100,000,respectively.The cancer mortality in Chinese cancer regist-ation areas was 180.54/100,000 (224.20/100,000 in males and 135.85/100,000 in females),age-standardized umortality rates by Chinese standard population (ASMRC) and by world standard population (ASMRW) were 85.06/100,000 and 115.65/100,000,and the cumulative incidence rate (0-74 age years old) was 12.94%.The cancer mortality and ASMRC were 181

  3. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  4. Mineralized Collagen: Rationale, Current Status, and Clinical Applications

    Directory of Open Access Journals (Sweden)

    Zhi-Ye Qiu

    2015-07-01

    Full Text Available This paper presents a review of the rationale for the in vitro mineralization process, preparation methods, and clinical applications of mineralized collagen. The rationale for natural mineralized collagen and the related mineralization process has been investigated for decades. Based on the understanding of natural mineralized collagen and its formation process, many attempts have been made to prepare biomimetic materials that resemble natural mineralized collagen in both composition and structure. To date, a number of bone substitute materials have been developed based on the principles of mineralized collagen, and some of them have been commercialized and approved by regulatory agencies. The clinical outcomes of mineralized collagen are of significance to advance the evaluation and improvement of related medical device products. Some representative clinical cases have been reported, and there are more clinical applications and long-term follow-ups that currently being performed by many research groups.

  5. Supporting awareness in creative group work by exposing design rationale

    Directory of Open Access Journals (Sweden)

    Umer Farooq

    2011-01-01

    Full Text Available When creativity is taken as a long-term, complex, and collaborative activity, support for awareness is required for group members to monitor the development of ideas, track how these ideas became narrowed, and understand how alternatives are being implemented and integrated by colleagues. In this paper, we investigate the effects of exposing design rationale to convey awareness, specifically activity awareness, in group creativity. Through evaluating a prototype, we investigate status updates that convey design rationale, and to what consequences, in small groups in fully distributed collaboration. We found that status updates are used for a variety of purposes and that participants’ comments on their collaborators’ status updates provided feedback. Overall, results suggest that participants’ awareness about their collaborators’ future plans increased over time. Majority of participants found the status updates useful, particularly those with higher metacognitive knowledge. Based on our results, two design strategies for activity awareness are proposed.

  6. Safety and efficacy of intensive vs. guideline antiplatelet therapy in high-risk patients with recent ischemic stroke or transient ischemic attack

    DEFF Research Database (Denmark)

    Christensen, Hanne Krarup

    2015-01-01

    RATIONALE: The risk of recurrence following a stroke or transient ischemic attack is high, especially immediately after the event. HYPOTHESIS: Because two antiplatelet agents are superior to one in patients with non-cardioembolic events, more intensive treatment might be even more effective. SAMPLE...... ischemic stroke or transient ischemic attack. Randomization and data collection are performed over a secure Internet site with real-time data validation and concealment of allocation. Outcomes, serious adverse events, and neuroimaging are adjudicated centrally with blinding to treatment allocation. STUDY...... (bleeding, death, serious adverse events). DISCUSSION: The trial has recruited more than 50% of its target sample size (latest number: 2399) and is running in 104 sites in 4 countries. One-third of patients presented with a transient ischemic attack....

  7. Frit valg i ældreplejen - rationaler og udfordringer

    OpenAIRE

    Svendsen, Peter Emil Juhl; Hagmann, Lotte Nygaard; Johansen, Michael Urban

    2004-01-01

    Projektet omhandler de rationaler der ligger bag indførelsen af frit valg i ældreplejen, primært fra Regeringens perspektiv. Den anden store del af projektet er en analyse af fritvalgsordningerne i forhold til om disse nu også er effektive, altså om det kan betale sig at indføre fritvalgsordninger i ældreplejen eller om effektivitet bedre opnås i rent offentligt regi.

  8. Physics rationale for the engineering specifications for ZTH

    International Nuclear Information System (INIS)

    This report presents the physics rationale that established the engineering design of ZTH. The physics criteria are given and the implications regarding the engineering design are presented. Experimental and theoretical background evidence is given in support of the criteria but the justification is left to other reports and peer reviews. The physics criteria discussed here are limited to the ones deemed to be of highest engineering priority. 32 refs., 9 figs

  9. Who Should Benefit from REDD+? Rationales and Realities

    Directory of Open Access Journals (Sweden)

    Cecilia Luttrell

    2013-12-01

    Full Text Available Benefit-sharing mechanisms are a central design aspect of REDD+ because they help to create the necessary incentives to reduce carbon emissions. However, if stakeholders do not perceive the benefit sharing as fair, the legitimacy of REDD+, and support for the mechanism, will be weakened. In this paper, drawing on data from CIFOR's Global Comparative Study on REDD+, we analyze national policy processes in 6 countries and incipient benefit-sharing arrangements in 21 REDD+ project sites. Through our analysis of current practices and debates, we identify six rationales that have been put forward to justify how benefits should be distributed and to whom. These rationales encompass a range of perspectives. Some hold that benefit sharing should be related to actual carbon emission reductions or to costs incurred in achieving the reduction of emissions; others emphasize the importance of a legal right to benefit, the need to consider aspects such as poverty reduction or the appropriateness of rewarding those with a history of protecting the forest. Each rationale has implications for the design of benefit-sharing mechanisms and the equity of their outcomes. We point out that, given the wide range of rationales and interests at play, the objectives of REDD+ and benefit sharing must be clearly established and the term "benefit" defined before effective benefit-sharing mechanisms can be designed. For stakeholders to support REDD+, the legitimacy of decision-making institutions, consideration of context, and attention to process are critical. Building legitimacy requires attention not only to fair distributional outcomes but also to consensus on relevant institutions' authority to make decisions and to procedural equity.

  10. Piezoelectric hydrogen bonding: computational screening for a design rationale.

    Science.gov (United States)

    Werling, Keith A; Griffin, Maryanne; Hutchison, Geoffrey R; Lambrecht, Daniel S

    2014-09-01

    Organic piezoelectric materials are promising targets in applications such as energy harvesting or mechanical sensors and actuators. In a recent paper (Werling, K. A.; et al. J. Phys. Chem. Lett. 2013, 4, 1365-1370), we have shown that hydrogen bonding gives rise to a significant piezoelectric response. In this article, we aim to find organic hydrogen bonded systems with increased piezo-response by investigating different hydrogen bonding motifs and by tailoring the hydrogen bond strength via functionalization. The largest piezo-coefficient of 23 pm/V is found for the nitrobenzene-aniline dimer. We develop a simple, yet surprisingly accurate rationale to predict piezo-coefficients based on the zero-field compliance matrix and dipole derivatives. This rationale increases the speed of first-principles piezo-coefficient calculations by an order of magnitude. At the same time, it suggests how to understand and further increase the piezo-response. Our rationale also explains the remarkably large piezo-response of 150 pm/V and more for another class of systems, the "molecular springs" (Marvin, C.; et al. J. Phys. Chem. C 2013, 117, 16783-16790.).

  11. Piezoelectric hydrogen bonding: computational screening for a design rationale.

    Science.gov (United States)

    Werling, Keith A; Griffin, Maryanne; Hutchison, Geoffrey R; Lambrecht, Daniel S

    2014-09-01

    Organic piezoelectric materials are promising targets in applications such as energy harvesting or mechanical sensors and actuators. In a recent paper (Werling, K. A.; et al. J. Phys. Chem. Lett. 2013, 4, 1365-1370), we have shown that hydrogen bonding gives rise to a significant piezoelectric response. In this article, we aim to find organic hydrogen bonded systems with increased piezo-response by investigating different hydrogen bonding motifs and by tailoring the hydrogen bond strength via functionalization. The largest piezo-coefficient of 23 pm/V is found for the nitrobenzene-aniline dimer. We develop a simple, yet surprisingly accurate rationale to predict piezo-coefficients based on the zero-field compliance matrix and dipole derivatives. This rationale increases the speed of first-principles piezo-coefficient calculations by an order of magnitude. At the same time, it suggests how to understand and further increase the piezo-response. Our rationale also explains the remarkably large piezo-response of 150 pm/V and more for another class of systems, the "molecular springs" (Marvin, C.; et al. J. Phys. Chem. C 2013, 117, 16783-16790.). PMID:24576213

  12. Power analysis attacks revealing the secrets of smart cards

    CERN Document Server

    Mangard, Stefan; Popp, Thomas

    2008-01-01

    A comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. It discusses simple and differential power analysis as well as advanced techniques like template attacks.

  13. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  14. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  15. Prophylaxis in congenital factor VII deficiency: indications, efficacy and safety. Results from the Seven Treatment Evaluation Registry (STER).

    Science.gov (United States)

    Napolitano, Mariasanta; Giansily-Blaizot, Muriel; Dolce, Alberto; Schved, Jean F; Auerswald, Guenter; Ingerslev, Jørgen; Bjerre, Jens; Altisent, Carmen; Charoenkwan, Pimlak; Michaels, Lisa; Chuansumrit, Ampaiwan; Di Minno, Giovanni; Caliskan, Umran; Mariani, Guglielmo

    2013-04-01

    Because of the very short half-life of factor VII, prophylaxis in factor VII deficiency is considered a difficult endeavor. The clinical efficacy and safety of prophylactic regimens, and indications for their use, were evaluated in factor VII-deficient patients in the Seven Treatment Evaluation Registry. Prophylaxis data (38 courses) were analyzed from 34 patients with severe factor VII deficiency (plasma-derived factor VII, and ten received fresh frozen plasma. Prophylactic schedules clustered into "frequent" courses (three times weekly, n=23) and "infrequent" courses (≤ 2 times weekly, n=15). Excluding courses for menorrhagia, "frequent" and "infrequent" courses produced 18/23 (78%) and 5/12 (41%) "excellent" outcomes, respectively; relative risk, 1.88; 95% confidence interval, 0.93-3.79; P=0.079. Long term prophylaxis lasted from 1 to >10 years. No thrombosis or new inhibitors occurred. In conclusion, a subset of patients with factor VII deficiency needed prophylaxis because of severe bleeding. Recombinant activated factor VII schedules based on "frequent" administrations (three times weekly) and a 90 μg/kg total weekly dose were effective. These data provide a rationale for long-term, safe prophylaxis in factor VII deficiency.

  16. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  17. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  18. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  19. Panic Attack during Elective Gastrointestinal Endoscopy.

    Science.gov (United States)

    Mitsonis, Charalampos; Dimopoulos, Nikolaos; Zavrou, Marianna; Psarra, Vassiliki; Giofkos, Christos; Fiorakis, Christos; Dimitriadis, Athanasios; Valavanis, Dimitrios; Vousoura, Eleni; Zervas, Iannis; Papavassiliou, Efstathios

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y). Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, P < 0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, P < 0.05). Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients. PMID:22007196

  20. Detecting and Localizing Wireless Network Attacks Techniques

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  1. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    Directory of Open Access Journals (Sweden)

    A.K. Patel

    2010-05-01

    Full Text Available Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between communicating Access Points to prevent Rouge Access Points from masquerading as false neighbours. Our defense greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.

  2. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  3. Establishment and use of national registries for actinide elements in humans

    International Nuclear Information System (INIS)

    This TECDOC covers all aspects of the establishment and use of registries for actinide elements in Member States. These aspects include assessing the need for such registries; defining scope of the work and developing objectives; administration; organization and staffing; policies; practices; procedures; protocols; registration and enrollment; data collection and evaluation; establishing and analytical laboratory; publication of results and application of findings. Not all aspects will be relevant to all Member States establishing such registries. 1 tab

  4. Quality of record linkage in a highly automated cancer registry that relies on encrypted identity data

    OpenAIRE

    Schmidtmann, Irene; Sariyar, Murat; Borg, Andreas; Gerold-Ay, Aslihan; Heidinger, Oliver; Hense, Hans-Werner; Krieg, Volker; Hammer, Gaël Paul

    2016-01-01

    Objectives: In the absence of unique ID numbers, cancer and other registries in Germany and elsewhere rely on identity data to link records pertaining to the same patient. These data are often encrypted to ensure privacy. Some record linkage errors unavoidably occur. These errors were quantified for the cancer registry of North Rhine Westphalia which uses encrypted identity data. Methods: A sample of records was drawn from the registry, record linkage information was included. In parallel, pl...

  5. A most convenient flag : the development of the Singapore ship registry, 1969-82

    OpenAIRE

    Tenold, Stig

    2000-01-01

    The aim of this report is to trace the development of the Singapore Ship Registry, from the introduction of open registry in 1969 until the tightening of registration requirements from the late 1970s. The extraordinary growth of the Singapore merchant marine is analysed in the light of the policies of the Singapore government. In many respects, the opening of the registry mirrors the Singapore economic policies in general, as it facilitated the growth of domestic employment and production, wi...

  6. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  7. Early Detection of SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hossain Shahriar

    2013-07-01

    Full Text Available SQL Injection (SQLI is a common vulnerability found in web applications.The starting point of SQLIattack is the client-side (browser. If attack inputs can be detected early at the browse side, then it could bethwarted early by not forwarding the malicious inputs to the server-side for further processing.This paperpresents a client-side approach to detect SQLI attacks1. The client-side accepts shadow SQL queries fromthe server-side and checks any deviation betweenshadow queries with dynamic queries generated withuser supplied inputs. We measure the deviation of shadow query and dynamic query based on conditionalentropy metrics and propose four metrics in this direction. We evaluate the approach with three PHPapplications containing SQLI vulnerabilities. The evaluation results indicate that our approach can detectwell-known SQLI attacks early at the client-side and impose negligible overhead.

  8. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  9. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria;

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  10. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    , localisation services and many others. These technologies can be classified under the name of ubiquitous systems. The term Ubiquitous System dates back to 1991 when Mark Weiser at Xerox PARC Lab first referred to it in writing. He envisioned a future where computing technologies would have been melted...... in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  11. [Twelve years of working of Brazzaville cancer registry].

    Science.gov (United States)

    Nsondé Malanda, Judith; Nkoua Mbon, Jean Bernard; Bambara, Augustin Tozoula; Ibara, Gérard; Minga, Benoît; Nkoua Epala, Brice; Gombé Mbalawa, Charles

    2013-02-01

    The Brazzaville cancer registry was created in 1996 with the support of the International Agency Research against Cancer (IARC) which is located in Lyon, France. The Brazzaville cancer registry is a registry which is based on population which records new cancer cases occurring in Brazzaville by using Canreg 4.0 Software. Its aim is to supply useful information to fight against cancer to physicians and to decision makers. We conducted this study whose target was to determine the incidence of cancer in Brazzaville during twelve years, from January 1st, 1998 to December 31, 2009. During that period 6,048 new cancer cases were recorded: 3,377 women (55.8%), 2,384 men (39.4%), and 287 children (4.8%) from 0 to 14 years old with an annual average of 504 cases. Middle age to the patient's diagnosis was 49.5 years in female sex and 505.5 years old for male sex. The incidence rate of cancers in Brazzaville was 39.8 or 100.000 inhabitants per year and by sex we observed 49 to female sex and 35.2 for male sex. The first cancers localizations observed to women were in order of frequency: breast, cervix uterine, liver ovaries, hematopoietic system, to men : liver, prostate, hematopoietic system, colon and stomach; to children : retina, kidney, hematopoietic system, liver and bones. These rates are the basis to know the burden of cancer among all pathologies of Brazzaville and the achievement of a national cancer control program.

  12. Pelvic Floor Disorders Registry: Study Design and Outcome Measures.

    Science.gov (United States)

    Weber LeBrun, Emily; Adam, Rony A; Barber, Matthew D; Boyles, Sarah Hamilton; Iglesia, Cheryl B; Lukacz, Emily S; Moalli, Pamela; Moen, Michael D; Richter, Holly E; Subak, Leslee L; Sung, Vivian W; Visco, Anthony G; Bradley, Catherine S

    2016-01-01

    Pelvic floor disorders affect up to 24% of adult women in the United States, and many patients with pelvic organ prolapse (POP) choose to undergo surgical repair to improve their quality of life. While a variety of surgical repair approaches and techniques are utilized, including mesh augmentation, there is limited comparative effectiveness and safety outcome data guiding best practice. In conjunction with device manufacturers, federal regulatory organizations, and professional societies, the American Urogynecologic Society developed the Pelvic Floor Disorders Registry (PFDR) designed to improve the quality of POP surgery by facilitating quality improvement and research on POP treatments. The PFDR will serve as a resource for surgeons interested in benchmarking and outcomes data and as a data repository for Food and Drug Administration-mandated POP surgical device studies. Provider-reported clinical data and patient-reported outcomes will be collected prospectively at baseline and for up to 3 years after treatment. All data elements including measures of success, adverse events, and surgeon characteristics were identified and defined within the context of the anticipated multifunctionality of the registry, and with collaboration from multiple stakeholders. The PFDR will provide a platform to collect high-quality, standardized patient-level data from a variety of nonsurgical (pessary) and surgical treatments of POP and other pelvic floor disorders. Data from this registry may be used to evaluate short- and longer-term treatment outcomes, patient-reported outcomes, and complications, as well as to identify factors associated with treatment success and failure with the overall goal of improving the quality of care for women with these conditions.

  13. Registry of hemophilia and other bleeding disorders in Syria.

    Science.gov (United States)

    Ali, T; Schved, J F

    2012-11-01

    Creating a national registry for bleeding disorders is a major step in establishing a National Hemophilia Care Program in all countries. Creating such a registry which would contain accurate and regularly updated data, including laboratory analysis confirmed by a reference laboratory established at the Syrian Hemophilia Society. Blood samples were drawn and analysed in the Society reference laboratory for the following screening tests: prothrombin time (PT), APTT and coagulation factor assays. Inhibitor detection and VWF RiCof were performed depending on the result of the screening tests. HBs Ag, anti-HCV, anti-HIV 1+2 and syphilis tests were also performed to detect transfusion transmitted agents (TTA). Diagnosis of the bleeding disorder type was confirmed for 760 of these cases. Among the 760 confirmed patients, 82.5% had haemophilia. Among these, 89.6%were haemophilia A; 10.4% were haemophilia B; 8.3% had VWD; 9.2% had other rare bleeding disorders as follows: 1.2% FVII deficiency, 0.7% FV deficiency, 1.8% F1 deficiency, 0.4% FX deficiency, 1.4% platelets dysfunctions (mainly Glanzmann Thrombasthenia) and 3.7% had combined FVIII and FV deficiency. Eighty (21.3%) cases of 375 screened for transfusion transmitted agents were positive for at least one infection: 0.5% were HBsAg positive, 19.7% were anti-HCV positive, 0.8% had combined HBsAg and anti-HCV positivity and 0.3% was anti-Syphilis positive. All patients were negative for HIV1 and HIV2. The preliminary data presented here follow known data on haemophilia A, haemophilia B and VWD disease. This registry will certainly help in improving haemophilia care in Syria.

  14. Malignancies in Swedish persons with haemophilia: a longitudinal registry study.

    Science.gov (United States)

    Lövdahl, Susanna; Henriksson, Karin M; Baghaei, Fariba; Holmström, Margareta; Berntorp, Erik; Astermark, Jan

    2016-09-01

    The aim of the study was to investigate, over time, the incidence of and mortality due to malignant diseases among persons with haemophilia, compared to matched controls. Persons with haemophilia A or B were enrolled via registries at each haemophilia centre, as well as from the National Patient Registry, and were compared to five sex and age-matched controls per patient. Data from the national Cancer Registry were linked to the study participants. A total of 1431 persons with haemophilia and 7150 matched controls were enrolled. Between the years 1972 and 2008, 164 malignancies were reported. The most common type of cancer among patients was prostate cancer, followed by haematologic malignancies, including lymphoma and leukaemia, which were significantly more frequent in patients [n = 35 (2.4%) vs. n = 60 (0.8%); P < 0.001]. Malignancies in bladder and other urinary organs were also significantly different [n = 21 (1.5%) vs. n = 46 (0.6%); P < 0.01]. The overall incidence rate ratio of malignancies per 1000 person-years compared to the controls was 1.3 [95% confidence interval (CI) 1.1, 1.6]. In subgroup analysis, the corresponding incidence rate ratios per 1000 person-years for persons with severe haemophilia was 1.7 (95% CI 0.9, 3.1) and that for mild/moderate haemophilia 1.1 (95% CI 0.8, 1.5). Swedish persons with haemophilia had a significantly higher incidence of malignant diseases than controls. These were primarily haematologic malignancies and cancer in urinary organs, and the difference independent of any co-infections with HIV and/or viral hepatitis. The findings indicate the importance of further studies and close follow-up of malignancies in persons with haemophilia. PMID:26974329

  15. Quantifying Public Response towards Islam on Twitter after Paris Attacks

    OpenAIRE

    Magdy, Walid; Darwish, Kareem; Abokhodair, Norah

    2015-01-01

    The Paris terrorist attacks occurred on November 13, 2015 prompted a massive response on social media including Twitter, with millions of posted tweets in the first few hours after the attacks. Most of the tweets were condemning the attacks and showing support to Parisians. One of the trending debates related to the attacks concerned possible association between terrorism and Islam and Muslims in general. This created a global discussion between those attacking and those defending Islam and M...

  16. Defeating pharming attacks at the client-side

    OpenAIRE

    Gastellier-Prevost, Sophie; LAURENT, Maryline

    2011-01-01

    International audience With the deployment of "always-connected" broadband Internet access, personal networks are a privileged target for attackers and DNS-based corruption. Pharming attacks - an enhanced version of phishing attacks - aim to steal users' credentials by redirecting them to a fraudulent login website, using DNS-based techniques that make the attack imperceptible to the end-user. In this paper, we define an advanced approach to alert the end-user in case of pharming attacks a...

  17. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    Science.gov (United States)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  18. Resistance of the double random phase encryption against various attacks.

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-01

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  19. Commensurate Registry and Chemisorption at a Hetero-organic Interface

    Science.gov (United States)

    Stadtmüller, Benjamin; Sueyoshi, Tomoki; Kichin, Georgy; Kröger, Ingo; Soubatch, Sergey; Temirov, Ruslan; Tautz, F. Stefan; Kumpf, Christian

    2012-03-01

    We present evidence for a partly chemisorptive bonding between single monolayers of copper-II-phthalocyanine (CuPc) and 3,4,9,10-perylene-tetracarboxylic-dianhydride (PTCDA) that are stacked on Ag(111). A commensurate registry between the two molecular layers and the substrate, i.e., a common crystallographic lattice for CuPc and PTCDA films as well as for the Ag(111) surface, indicates that the growth of the upper layer is dominated by the structure of the lower. Photoemission spectroscopy clearly reveals a gradual filling of the lowest unoccupied molecular orbital of PTCDA due to CuPc adsorption, which proves the chemisorptive character.

  20. Commensurate registry and chemisorptions at a hetero-organic interface

    OpenAIRE

    Stadtmüller, B; Sueyoshi, T; Kichin, G.; Kröger, I.; Soubatch, S.; Temirov, R.; Tautz, F. S.; Kumpf, C.

    2012-01-01

    We present evidence for a partly chemisorptive bonding between single monolayers of copper-II-phthalocyanine (CuPc) and 3,4,9,10-perylene-tetracarboxylic-dianhydride (PTCDA) that are stacked on Ag(111). A commensurate registry between the two molecular layers and the substrate, i.e., a common crystallographic lattice for CuPc and PTCDA films as well as for the Ag(111) surface, indicates that the growth of the upper layer is dominated by the structure of the lower. Photoemission spectroscopy c...

  1. Studies based on the Danish Multiple Sclerosis Registry

    DEFF Research Database (Denmark)

    Koch-Henriksen, Nils; Stenager, Egon; Brønnum-Hansen, Henrik

    2011-01-01

    Introduction: This paper reviews the most important articles using data from the Danish Multiple Sclerosis Registry (DMSR) published in the past 25 years. Research topics: These articles include: descriptive epidemiological studies, indicating that the female incidence of multiple sclerosis (MS......) in Denmark has increased considerably; follow-up studies on social events, showing that patients at a high rate lose their working ability and their spouses/partners; mortality studies, demonstrating a considerable excess mortality; cause-of-death studies; comorbidity studies; and, most importantly...

  2. Establishing a Twin Registry in Guinea-Bissau

    DEFF Research Database (Denmark)

    Bjerregaard-Andersen, Morten; Gomes, Margarida A; Joaquím, Luis C;

    2013-01-01

    , diabetes mellitus, metabolic syndrome, and infectious diseases such as HIV, tuberculosis, and malaria. A major focus area is also the etiology of low birth weight and how epigenetic processes might modulate the consequences of low birth weight in Sub-Saharan Africa. For this, monozygotic twin studies...... represent a powerful tool. Though twin studies have been carried out by the Bandim Health Project for more than 30 years, the renewed registry described here was officially established in 2009 and includes both a cohort of newborn twins and a cohort of young and adult twins. Currently more than 1,500 twins...

  3. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  4. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  5. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  6. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  7. Fast Collision Attack on MD5

    OpenAIRE

    Stevens, Marc

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfill restrictions to properly rotate the differentials in the first round. We will present a new algorithm to find the first block and we will use an algorithm of Klima to find the second block. To o...

  8. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    OpenAIRE

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (200...

  9. Findings on the atopic triad from a Danish twin registry

    DEFF Research Database (Denmark)

    Thomsen, SF; Ulrik, Charlotte Suppli; Kyvik, KO;

    2006-01-01

    OBJECTIVE: To estimate to what extent the same genetic and environmental risk factors influence asthma, hay fever and eczema. DESIGN: From the nationwide Danish Twin Registry, twin cohorts born between 1953 and 1982 were contacted for a questionnaire survey, and a total of 29 183 twin individuals...... role. These results can prove informative when counselling families with atopy, and may furthermore be used to guide the search for pleiotropic genes of importance for these diseases.......OBJECTIVE: To estimate to what extent the same genetic and environmental risk factors influence asthma, hay fever and eczema. DESIGN: From the nationwide Danish Twin Registry, twin cohorts born between 1953 and 1982 were contacted for a questionnaire survey, and a total of 29 183 twin individuals...... in liability between the different diseases were 0.57 (95% CI 0.54-0.59) for asthma and hay fever, 0.40 (95% CI 0.36-0.42) for asthma and eczema, and 0.33 (95% CI 0.29-0.36) for hay fever and eczema. Decomposition of these correlations into their genetic and environmental contributions showed that shared genes...

  10. The role of cancer registries in cancer control.

    Science.gov (United States)

    Parkin, Donald Maxwell

    2008-04-01

    Cancer control aims to reduce the incidence, morbidity, and mortality of cancer and to improve the quality of life of cancer patients through the systematic implementation of evidence-based interventions in prevention, early diagnosis, treatment, and palliative care. In the context of a national cancer control program (NCCP), a cancer surveillance program (CSP), built around a population-based cancer registry, is an essential element. Data on the size and evolution of the cancer burden in the population are essential to evaluation of the current situation, to setting objectives for cancer control, and defining priorities. Cancer data are essential in monitoring the progress of the implementation of an NCCP, as well as providing an evaluation of the many individual cancer control activities. In the context of an NCCP, the CSP should provide a focus of epidemiological expertise, not only for providing statistical data on incidence, mortality, stage distribution, treatment patterns, and survival but also for conducting studies into the important causes of cancer in the local situation, and for providing information about the prevalence of exposure to these factors in the population. Cancer surveillance via the population-based registry therefore plays a crucial role in formulating cancer control plans, as well as in monitoring their success. PMID:18463952

  11. First annual report of the Austrian CML registry.

    Science.gov (United States)

    Schmidt, Stefan; Wolf, Dominik; Thaler, Josef; Burgstaller, Sonja; Linkesch, Wolfgang; Petzer, Andreas; Fridrik, Michael; Lang, Alois; Agis, Hermine; Valent, Peter; Krieger, Otto; Walder, Alois; Korger, Markus; Schlögl, Ernst; Sliwa, Tamer; Wöll, Ernst; Mitterer, Manfred; Eisterer, Wolfgang; Pober, Michael; Gastl, Günther

    2010-10-01

    The Austrian chronic myeloid leukemia (CML) registry monitors individual disease courses, treatments applied, clinical outcome, and side effects of CML patients on a nationwide basis to provide data on the "real-life" situation and to complement the information and interpretation gained from the selected patient population observed in clinical trials. This report summarizes the Austrian CML registry data as of March 2009. A total of 179 patients have been registered with a median number of 1012 follow-up visits and median observation duration of 20 months. At diagnosis most patients (n = 163) were in chronic phase (early, late, and secondary), whereas only 4 were in advanced phase. A total of 137 patients were treated with tyrosine kinase inhibitors (TKIs), of which 14 received first and second generation TKIs sequentially. Other treatment modalities included chemotherapy or interferon and stem cell transplantation (SCT). Cumulative incidence rates for complete hematological responses (CHR) were 91.6% and 94.4% at 12 and 24 months, respectively, compared to cumulative incidence rates of complete cytogenetical response rates of 64% and 80% at these timepoints. A total of 5 patients progressed from chronic phase to accelerated (n = 3) and blastic phase (n = 2) while receiving imatinib standard dose. Estimated overall survival (OS) rate at 60 months was 90% and progression free survival (PFS) according to European Leukemia Net (ELN) failure definition was 58%. PMID:20936366

  12. Cryptographic Attacks and Countermeasures - A Mathematical View

    OpenAIRE

    Canright, David; Stanica, Pantelimon

    2009-01-01

    2009 CyberSecurity Summit, Naval Postgraduate School 1st NPS Cyber Summit was held at the Naval Postgraduate School in Monterey, California on October 29, 2009. Sessions were held on the following topics: security requirements, Kerchkoffs' principle, mathematics of cybersecurity, the data encryption standard, nonlinear equations, Cyber attacks on Bluetooth EQ, Crypto properties of S-boxes.

  13. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  14. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with…

  15. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  16. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  17. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  18. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  19. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  20. The diagnosis of transient ischemic attacks

    NARCIS (Netherlands)

    P.J. Koudstaal (Peter Jan)

    1989-01-01

    textabstractThe diagnosis of transient ischemic attack (TIA) is fraught with difficulty, since the diagnosis rests entirely upon the history of the patient's symptoms and the neurologist's skill in questioning the patient. The aim of this thesis is to investigate various measures to improve the reli

  1. Persistent cognitive impairment after transient ischemic attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.; Duijnhoven, D.A. van; Leeuw, F.E. de; Kessels, R.P.; Dijk, E.J. van

    2014-01-01

    BACKGROUND AND PURPOSE: By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whe

  2. Persistent Cognitive Impairment After Transient Ischemic Attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.M.M.; Duijnhoven, D.A. van; de Leeuw, F.E.; Kessels, R.P.C.; Dijk, E.J. van

    2014-01-01

    Background and Purpose—By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whet

  3. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.;

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  4. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  5. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  6. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... that helps in structuring attack identification and can integrate physical, virtual, and social components. These models form a solid basis for guiding the manual identification of attack scenarios. Their main benefit, however, is in the analytic generation of attacks. In this work we present a systematic...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  7. Report of Incidence and Mortality in China Cancer Registries, 2008

    Institute of Scientific and Technical Information of China (English)

    Wan-qing Chen; Rong-shou Zheng; Si-wei Zhang; Ni Li; Ping Zhao; Guang-lin Li; Liang-you Wu; Jie He

    2012-01-01

    Objective:Annual cancer incidence and mortality in 2008 were provided by National Central Cancer Registry in China,which data were collected from population-based cancer registries in 2011.Methods:There were 56 registries submitted their data in 2008.After checking and evaluating the data quality,total 41 registries' data were accepted and pooled for analysis.Incidence and mortality rates by area (urban or rural areas) were assessed,as well as the age-and sex-specific rates,age-standardized rates,proportions and cumulative rate.Results:The coverage population of the 41 registries was 66,138,784 with 52,158,495 in urban areas and 13,980,289 in rural areas.There were 197,833 new cancer cases and 122,136 deaths in cancer with mortality to incidence ratio of 0.62.The morphological verified rate was 69.33%,and 2.23% of cases were identified by death certificate only.The crude cancer incidence rate in all areas was 299.12/100,000 (330.16/100,000 in male and 267.56/100,000 in female) and the age-standardized incidence rates by Chinese standard population (ASIRC) and world standard population (ASIRW) were 148.75/100,000 and 194.99/100,000,respectively.The cumulative incidence rate (0-74 years old) was of 22.27%.The crude incidence rate in urban areas was higher than that in rural areas.However,after adjusted by age,the incidence rate in urban was lower than that in rural.The crude cancer mortality was 184.67/100,000 (228.14/100,000 in male and 140.48/100,000 in female),and the age-standardized mortality rates by Chinese standard population (ASMRC) and by world population were 84.36/100,000 and 114.32/100,000,respectively.The cumulative mortality rate (0-74 years old) was of 12.89%.Age-adjusted mortality rates in urban areas were lower than that in rural areas.The most common cancer sites were lung,stomach,colon-rectum,liver,esophagus,pancreas,brain,lymphoma,breast and cervix which accounted for 75% of all cancer incidence.Lung cancer was the leading cause of

  8. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  9. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim. PMID:16936505

  10. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  11. Rationales behind the choice of administration form with fentanyl

    DEFF Research Database (Denmark)

    Jacobsen, Ramune; Møldrup, Claus; Christrup, Lona

    2010-01-01

    BACKGROUND AND AIM: The aim of this study was to describe the rationale behind the choice of fentanyl administration forms among Danish general practitioners (GPs). METHODS: Thirty-eight Danish GPs were contacted via an Internet survey system to perform a Delphi survey. In the brainstorming phase......, the main reasons for prescribing and not prescribing fentanyl patches, oral transmucosal systems (OTFCs), and nasal sprays were identified. In the second phase, GPs were asked to rate the importance of each reason. RESULTS AND DISCUSSION: Thirty-three GPs responded in the brainstorming phase, and 33 and 31...

  12. Critique of rationale for transmutation of nuclear waste

    International Nuclear Information System (INIS)

    It has been suggested that nuclear transmutation could be used in the elimination or reduction of hazards from radioactive wastes. The rationale for this suggestion is the subject of this paper. The objectives of partitioning-transmutation are described. The benefits are evaluated. The author concludes that transmutation would appear at best to offer the opportunity of reducing an already low risk. This would not seem to be justifiable considering the cost. If non-radiological risks are considered, there is a negative total benefit

  13. Plato's Cosmic Theology: A Rationale for a Polytheistic Astrology?

    Science.gov (United States)

    Henriques, André

    2015-05-01

    Plato's cosmology influenced classical astronomy and religion, but was in turn influenced by the polytheistic context of its time. Throughout his texts, including the cosmological treatise Timaeus, and the discussions on the soul in the Phaedrus, Plato (c.428-c.348 BC) established what can be generalised as Platonic cosmological thought. An understanding of the philosophical and mythical levels of Platonic thought can provide a rationale for polytheistic and astrological worldviews, pointing to some cosmological continuity, alongside major shifts, from ancient Greek religion to the astrological thought of ancient astronomers such as Claudius Ptolemy.

  14. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  15. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  16. Acromegaly according to the Danish National Registry of Patients: how valid are ICD diagnoses and how do patterns of registration affect the accuracy of registry data?

    OpenAIRE

    Dal J; Skou N; Nielsen EH; Jørgensen JOL; Pedersen L

    2014-01-01

    Jakob Dal,1 Nikolaj Skou,1 Eigil Husted Nielsen,2 Jens Otto Lunde Jørgensen,1 Lars Pedersen3 1Department of Endocrinology, Aarhus University Hospital, Aarhus, 2Department of Endocrinology, Aalborg University Hospital, Aalborg, 3Department of Clinical Epidemiology, Aarhus University Hospital, Aarhus, Denmark Background: The incidence of acromegaly is uncertain, since population-based studies are few. In the absence of a specific acromegaly registry, the Danish National Registry of ...

  17. 77 FR 7167 - Global Rare Diseases Patient Registry and Data Repository (GRDR) Notice and Request for...

    Science.gov (United States)

    2012-02-10

    ... HUMAN SERVICES National Institutes of Health Global Rare Diseases Patient Registry and Data Repository (GRDR) Notice and Request for Information (RFI) SUMMARY: The Office of Rare Diseases Research (ORDR), an... Global Rare Diseases Patient Registry and Data Repository (GRDR), and to submit background...

  18. Safety of biologics in rheumatoid arthritis: data from randomized controlled trials and registries.

    Science.gov (United States)

    Codreanu, Catalin; Damjanov, Nemanja

    2015-01-01

    Over the past decade, the use of biologics has significantly changed the management of rheumatoid arthritis (RA). Biologics selectively target components of the immune system, resulting in better disease control. However, the growing use of biologics in RA has increased safety concerns among rheumatologists. Randomized controlled trials (RCTs) and registries are the most reliable sources of clinical safety data. Although safety data from RCTs provide certain insights into the clinical safety profile of an agent, strict constraints in study design (eg, exclusion criteria and restrictive treatment protocols) often do not accurately reflect possible safety issues in the use of the agent, either in the clinical setting or over long-term treatment. Registries, on the other hand, are not restrictive regarding patient enrollment, making them more reliable in evaluating long-term safety. A number of registries have been established globally: in Europe, the United States, and Asia. However, the availability of registry data from Eastern Europe is lacking. The notable exceptions so far are registries from the Czech Republic (ATTRA, a registry of patients treated with anti-tumor necrosis factor-alpha drugs) and Serbia (National registry of patients with rheumatoid arthritis in Serbia [NARRAS]). The current report provides an overview of safety data with biologics in RA from RCTs and registries. Availability of regional safety data from Eastern Europe is of great importance to its clinicians for making evidence-based treatment decisions in RA. PMID:25670881

  19. The Danish Registry on Regular Dialysis and Transplantation: completeness and validity of incident patient registration

    DEFF Research Database (Denmark)

    Hommel, Kristine; Rasmussen, Søren; Madsen, Mette;

    2010-01-01

    The Danish National Registry on Regular Dialysis and Transplantation (NRDT) provides systematic information on the epidemiology and treatment of end-stage chronic kidney disease in Denmark. It is therefore of major importance that the registry is valid and complete. The aim of the present study...

  20. Myositis registries and biorepositories: powerful tools to advance clinical, epidemiologic and pathogenic research

    Science.gov (United States)

    Rider, Lisa G.; Dankó, Katalin; Miller, Frederick W.

    2016-01-01

    Purpose of review Clinical registries and biorepositories have proven extremely useful in many studies of diseases, especially rare diseases. Given their rarity and diversity, the idiopathic inflammatory myopathies, or myositis syndromes, have benefited from individual researchers’ collections of cohorts of patients. Major efforts are being made to establish large registries and biorepositories that will allow many additional studies to be performed that were not possible before. Here we describe the registries developed by investigators and patient support groups that are currently available for collaborative research purposes. Recent findings We have identified 46 myositis research registries, including many with biorepositories, which have been developed for a wide variety of purposes and have resulted in great advances in understanding the range of phenotypes, clinical presentations, risk factors, pathogenic mechanisms, outcome assessment, therapeutic responses, and prognoses. These are now available for collaborative use to undertake additional studies. Two myositis patient registries have been developed for research, and myositis patient support groups maintain demographic registries with large numbers of patients available to be contacted for potential research participation. Summary Investigator-initiated myositis research registries and biorepositories have proven extremely useful in understanding many aspects of these rare and diverse autoimmune diseases. These registries and biorepositories, in addition to those developed by myositis patient support groups, deserve continued support to maintain the momentum in this field as they offer major opportunities to improve understanding of the pathogenesis and treatment of these diseases in cost-effective ways. PMID:25225838

  1. 77 FR 16471 - Pipeline Safety: Implementation of the National Registry of Pipeline and Liquefied Natural Gas...

    Science.gov (United States)

    2012-03-21

    ...: Implementation of the National Registry of Pipeline and Liquefied Natural Gas Operators AGENCY: Pipeline and... registry of pipeline and liquefied natural gas operators. This notice provides updates to the information... the Federal Register (75 FR 72878) titled: ``Pipeline Safety: Updates to Pipeline and...

  2. Treatment of autoinflammatory diseases: results from the Eurofever Registry and a literature review

    NARCIS (Netherlands)

    Haar, N. Ter; Lachmann, H.; Ozen, S.; Woo, P.; Uziel, Y.; Modesto, C.; Kone-Paut, I.; Cantarini, L.; Insalaco, A.; Neven, B.; Hofer, M.; Rigante, D.; Al-Mayouf, S.; Touitou, I.; Gallizzi, R.; Papadopoulou-Alataki, E.; Martino, S.; Kuemmerle-Deschner, J.; Obici, L.; Iagaru, N.; Simon, A.; Nielsen, S.; Martini, A.; Ruperto, N.; Gattorno, M.; Frenkel, J.

    2013-01-01

    OBJECTIVE: To evaluate the response to treatment of autoinflammatory diseases from an international registry and an up-to-date literature review. METHODS: The response to treatment was studied in a web-based registry in which clinical information on anonymised patients with autoinflammatory diseases

  3. 76 FR 72424 - Submission for OMB Review; Comment Request Information Program on the Genetic Testing Registry

    Science.gov (United States)

    2011-11-23

    ... information collection was previously published in the Federal Register on July 27, 2011, (76 FR 44937) and... Program on the Genetic Testing Registry AGENCY: National Institutes of Health (NIH), PHS, DHHS. ACTION... control number. Proposed Collection: Title: The Genetic Testing Registry; Type of Information...

  4. An evolution of trauma care evaluation: A thesis on trauma registry and outcome prediction models

    NARCIS (Netherlands)

    P. Joosse

    2013-01-01

    Outcome prediction models play an invaluable role in the evaluation and improvement of modern trauma care. Trauma registries underlying these outcome prediction models need to be accurate, complete and consistent. This thesis focused on the opportunities and limitations of trauma registries and outc

  5. 36 CFR 704.1 - Films selected for inclusion in the National Film Registry.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Films selected for inclusion in the National Film Registry. 704.1 Section 704.1 Parks, Forests, and Public Property LIBRARY OF CONGRESS NATIONAL FILM REGISTRY OF THE LIBRARY OF CONGRESS § 704.1 Films selected for inclusion in...

  6. 75 FR 29350 - Draft Guidance for Industry: Questions and Answers Regarding the Reportable Food Registry as...

    Science.gov (United States)

    2010-05-25

    ... HUMAN SERVICES Food and Drug Administration Draft Guidance for Industry: Questions and Answers Regarding the Reportable Food Registry as Established by the Food and Drug Administration Amendments Act of 2007... information to the industry in complying with the Reportable Food Registry requirements prescribed by the...

  7. Protecting buildings from a biological or chemical attack: Actions to take before or during a release

    Energy Technology Data Exchange (ETDEWEB)

    Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

    2003-01-29

    This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

  8. New Knowledge Network Evaluation Method for Design Rationale Management

    Institute of Scientific and Technical Information of China (English)

    JING Shikai; ZHAN Hongfei; LIU Jihong; WANG Kuan; JIANG Hao; ZHOU Jingtao

    2015-01-01

    Current design rationale (DR) systems have not demonstrated the value of the approach in practice since little attention is put to the evaluation method of DR knowledge. To systematize knowledge management process for future computer-aided DR applications, a prerequisite is to provide the measure for the DR knowledge. In this paper, a new knowledge network evaluation method for DR management is presented. The method characterizes the DR knowledge value from four perspectives, namely, the design rationale structure scale, association knowledge and reasoning ability, degree of design justification support and degree of knowledge representation conciseness. The DR knowledge comprehensive value is also measured by the proposed method. To validate the proposed method, different style of DR knowledge network and the performance of the proposed measure are discussed. The evaluation method has been applied in two realistic design cases and compared with the structural measures. The research proposes the DR knowledge evaluation method which can provide object metric and selection basis for the DR knowledge reuse during the product design process. In addition, the method is proved to be more effective guidance and support for the application and management of DR knowledge.

  9. Glucocorticoid augmentation of prolonged exposure therapy: rationale and case report

    Directory of Open Access Journals (Sweden)

    Laura Pratchett

    2010-12-01

    Full Text Available Rationale: Prolonged exposure (PE therapy has been found to reduce symptoms of posttraumatic stress disorder (PTSD; however, it is difficult for many patients to engage fully in the obligatory retelling of their traumatic experiences. This problem is compounded by the fact that habituation and cognitive restructuring – the main mechanisms through which PE is hypothesized to work – are not instantaneous processes, and often require several weeks before the distress associated with imaginal exposure abates. Case reports: Two cases are described that respectively illustrate the use of hydrocortisone and placebo, in combination with PE, for the treatment of combat-related PTSD. Based on known effects of glucocorticoids on learning and memory performance, we hypothesized that augmentation with hydrocortisone would improve the therapeutic effects of PE by hastening “new” learning and facilitating decreases in the emotional impact of fear memories during the course of treatment. The veteran receiving hydrocortisone augmentation of PE displayed an accelerated and ultimately greater decline in PTSD symptoms than the veteran receiving placebo. Conclusions: While no general conclusion can be derived from comparison of two patients, the findings are consistent with the rationale for augmentation. These case reports support the potential for an appropriately designed and powered clinical trial to examine the efficacy of glucocorticoids in augmenting the effects of psychotherapy for PTSD.

  10. Optimizing the management of neuromyelitis optica and spectrum disorders in resource poor settings: Experience from the Mangalore demyelinating disease registry

    Directory of Open Access Journals (Sweden)

    Lekha Pandit

    2013-01-01

    Full Text Available Background: In resource-poor settings, the management of neuromyelitis optica (NMO and NMO spectrum (NMOS disorders is limited because of delayed diagnosis and financial constraints. Aim: To device a cost-effective strategy for the management of NMO and related disorders in India. Materials and Methods: A cost-effective and disease-specific protocol was used for evaluating the course and treatment outcome of 70 consecutive patients. Results: Forty-five patients (65% had a relapse from the onset and included NMO (n = 20, recurrent transverse myelitis (RTM; n = 10, and recurrent optic neuritis (ROPN; n = 15. In 38 (84.4% patients presenting after multiple attacks, the diagnosis was made clinically. Only 7 patients with a relapsing course were seen at the onset and included ROPN (n = 5, NMO (n = 1, and RTM (n = 1. They had a second attack after a median interval of 1 ± 0.9 years, which was captured through our dedicated review process. Twenty-five patients had isolated longitudinally extensive transverse myelitis (LETM, of which 20 (80% remained ambulant at follow-up of 3 ± 1.9 years. Twelve patients (17% with median expanded disability status scale (EDSS of 8.5 at entry had a fatal outcome. Serum NMO-IgG testing was done in selected patients, and it was positive in 7 of 18 patients (39%. Irrespective of the NMO-IgG status, the treatment compliant patients (44.4% showed significant improvement in EDSS (P ≤ 0.001. Conclusions : Early clinical diagnosis and treatment compliance were important for good outcome. Isolated LETM was most likely a post-infectious demyelinating disorder in our set-up. NMO and NMOS disorders contributed to 14.9% (45/303 of all demyelinating disorders in our registry.

  11. Comparative Analysis of Routing Attacks in Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Bipul Syam Purkayastha

    2012-03-01

    Full Text Available In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.

  12. Concrete Deterioration under Alternate Action of Carbonation and Sulfate Attack

    Directory of Open Access Journals (Sweden)

    Fenglan Li

    2013-11-01

    Full Text Available By micro- and macro-observations, the study reveals the deterioration mechanisms of concrete under alternate action of carbonation and sodium sulfate solution attack (C-SA comparied with the single sodium sulfate solution attack (SA. The studies indicate that in both cases, the main attack product is ettringite, some gypsum is checked only in the first layer of case SA, the thaumasite form of sulfate attack is not initiated in case C-SA. Compared with the single sodium sulfate solution attack, although the carbonation layer mitigates the extent of sulfate attack in limited exposure period, the alternate action of carbonation and sulfate attack still leads to strength degradation to some extent. The effect of carbonation on sulfate attack for longer exposure period deserves further research.

  13. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    Science.gov (United States)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  14. Heart Attack Help? There's an App for That

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159504.html Heart Attack Help? There's an App for That Emergency medicine ... American Heart Association. When someone is suffering a heart attack, stroke or cardiac arrest, quick action can be ...

  15. New attacks on Wi-Fi Protected Setup

    Directory of Open Access Journals (Sweden)

    Hamed Mohtadi

    2015-09-01

    Full Text Available Wi-Fi Protected Setup (WPS is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weaknesses in the implementation of WPS and provides an improved evil twin attack. This attack shows that even by completely disabling the WPS on the routers, all vulnerabilities are not covered.

  16. Heart Attack Before 50 Ups Early Death Risk

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_160692.html Heart Attack Before 50 Ups Early Death Risk But healthy ... News) -- The risk of early death after a heart attack has lessened over the past 30 years among ...

  17. An Attack Modeling Based on Colored Petri Net

    Institute of Scientific and Technical Information of China (English)

    ZHOU Shijie; QIN Zhiguang; ZHANG Feng; LIU Jinde

    2004-01-01

    A color petri net (CPN) based attack modeling approach is addressed.Compared with graph-based modeling,CPN based attack model is fiexible enough to model Intemet intrusions,because of their static and dynamic features.The processes and rules of building CPN based attack model from attack tree are also presented.In order to evaluate the risk of intrusion,some cost elements are added to CPN based attack modeling.This extended model is useful in intrusion detection and risk evaluation.Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions,such as intrusion response and intrusion defense.A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn't.

  18. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof;

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  19. Flooding attack and defence in Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Hou Yafei; Zhong Yiping; Zhang Shiyong; Dai Zhoulin

    2006-01-01

    Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

  20. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.