WorldWideScience

Sample records for attack registry rationale

  1. [Short-term prognosis of transient ischemic attacks. Mexican multicenter stroke registry].

    Science.gov (United States)

    Arauz, Antonio; Cantú, Carlos; Ruiz-Sandoval, José Luis; Villarreal-Careaga, Jorge; Barinagarrementeria, Fernando; Murillo-Bonilla, Luis; Fernández, José Antonio; Torres, Bertha; León, Carolina; Rodríguez-Leyva, Idelfonso; Rangel-Guerra, Ricardo

    2006-01-01

    There are no data on Mexican population referring to frequency and prognosis of transient ischemic attacks (TIA). The purpose of the present study was to: (1) estimate the prevalence, vascular risk factors and short-term outcome in patients with TIA included in the first Mexican registry of cerebrovascular disease, and (2) analyze the acute care provided in these patients. This national registry of cerebrovascular diseases is a multicenter, observational, and hospital-based registry that was conducted from November 2002 to October 2004. The registry was developed to improve our knowledge in Mexico regarding risk factors profile, outcome, current diagnostic and treatment strategies, and short-term follow-up in patients with acute cerebral ischemia. Standardized data assessment was used by all centers which included information on demographics, pre-hospital events (including stroke onset and arrival to hospital), emergency department triage and workup. Short-term outcome was evaluated at day 30. Of this registry, TIA cases were selected and associated risk factors, clinical characteristics, diagnosis and treatment were analyzed. During the study time period, 2,000 patients were enrolled; 97 (5%) with diagnosis of TIA; 51 women and 46 men, mean age 69.3 +/- 11.4 years. Among these 97 patients; 51 (52.6%) were admitted to the hospital for evaluation. The main risk factors were; age > or = 65 years in 74%, hypertension in 64%, diabetes in 45%, and dislipidemia in 36% and obesity in 31%. The affected arterial territory was carotid TIA in 74% and vertebrobasilar in 26%. TIA was attributed to atherosclerosis in 63% of the patients, cardioembolism in 17%, and small vessels disease in 5%. At 30 days follow-up; three patients died during the initial evaluation (two secondary to cardiac arrhythmia, and one secondary to pneumonia). Among 14 of the 94 survivors (14.9%) we documented an early stroke recurrence, including cerebral infarction in nine patients (9.6%) and new TIA in

  2. POL-TAVI - Polish Registry of Transcatheter Aortic Valve Implantation - simple tool, great value, rationale and design.

    Science.gov (United States)

    Zembala-John, Joanna; Wilczek, Krzysztof; Tobota, Zdzisław; Chodór, Piotr; Cieśla, Daniel; Jaźwiec, Tomasz; Banasiak, Waldemar; Stępińska, Janina; Kalarus, Zbigniew; Opolski, Grzegorz; Zembala, Marian

    2016-12-01

    Aortic stenosis (AS) is the most common valvular heart disease in adults in Europe and North America. Management of AS patients depends on accurate diagnosis of the cause and stage of the disease process: the first and definitive therapeutic choice for a growing number of elderly patients with symptomatic AS is surgical treatment. In patients not eligible for surgery, transcatheter aortic valve implantation (TAVI) constitutes a safe and effective alternative. As an innovative, costly method of treatment, it requires however careful monitoring of its course, documenting its early and long-term results, and assessment of its safety and medical-economic cost-effectiveness. A medical registry seems to be an excellent tool to perform such analysis. The aim of this paper is to present the design and rationale for creation of the first National Cardiac-Cardiac Surgical Registry of Percutaneous Aortic Valve Treatment POL-TAVI, to describe its genesis and to highlight its key assumptions and aims. Despite its recent beginnings, the POL-TAVI Registry has already demonstrated its value and usability in monitoring and assessment of TAVI procedures, leading to further improvement and development of this new method in Poland. It constitutes an important and valuable tool for patients, the medical community and the payer.

  3. POL-TAVI – Polish Registry of Transcatheter Aortic Valve Implantation – simple tool, great value, rationale and design

    Science.gov (United States)

    Wilczek, Krzysztof; Tobota, Zdzisław; Chodór, Piotr; Cieśla, Daniel; Jaźwiec, Tomasz; Banasiak, Waldemar; Stępińska, Janina; Kalarus, Zbigniew; Opolski, Grzegorz; Zembala, Marian

    2016-01-01

    Aortic stenosis (AS) is the most common valvular heart disease in adults in Europe and North America. Management of AS patients depends on accurate diagnosis of the cause and stage of the disease process: the first and definitive therapeutic choice for a growing number of elderly patients with symptomatic AS is surgical treatment. In patients not eligible for surgery, transcatheter aortic valve implantation (TAVI) constitutes a safe and effective alternative. As an innovative, costly method of treatment, it requires however careful monitoring of its course, documenting its early and long-term results, and assessment of its safety and medical-economic cost-effectiveness. A medical registry seems to be an excellent tool to perform such analysis. The aim of this paper is to present the design and rationale for creation of the first National Cardiac-Cardiac Surgical Registry of Percutaneous Aortic Valve Treatment POL-TAVI, to describe its genesis and to highlight its key assumptions and aims. Despite its recent beginnings, the POL-TAVI Registry has already demonstrated its value and usability in monitoring and assessment of TAVI procedures, leading to further improvement and development of this new method in Poland. It constitutes an important and valuable tool for patients, the medical community and the payer. PMID:28096826

  4. Rationale for the Cytogenomics of Cardiovascular Malformations Consortium: A Phenotype Intensive Registry Based Approach

    Directory of Open Access Journals (Sweden)

    Robert B. Hinton

    2015-04-01

    Full Text Available Cardiovascular malformations (CVMs are the most common birth defect, occurring in 1%–5% of all live births. Although the genetic contribution to CVMs is well recognized, the genetic causes of human CVMs are identified infrequently. In addition, a failure of systematic deep phenotyping of CVMs, resulting from the complexity and heterogeneity of malformations, has obscured genotype-phenotype correlations and contributed to a lack of understanding of disease mechanisms. To address these knowledge gaps, we have developed the Cytogenomics of Cardiovascular Malformations (CCVM Consortium, a multi-site alliance of geneticists and cardiologists, contributing to a database registry of submicroscopic genetic copy number variants (CNVs based on clinical chromosome microarray testing in individuals with CVMs using detailed classification schemes. Cardiac classification is performed using a modification to the National Birth Defects Prevention Study approach, and non-cardiac diagnoses are captured through ICD-9 and ICD-10 codes. By combining a comprehensive approach to clinically relevant genetic analyses with precise phenotyping, the Consortium goal is to identify novel genomic regions that cause or increase susceptibility to CVMs and to correlate the findings with clinical phenotype. This registry will provide critical insights into genetic architecture, facilitate genotype-phenotype correlations, and provide a valuable resource for the medical community.

  5. Rationale, design, and baseline characteristics of the CLARIFY registry of outpatients with stable coronary artery disease.

    Science.gov (United States)

    Sorbets, Emmanuel; Greenlaw, Nicola; Ferrari, Roberto; Ford, Ian; Fox, Kim M; Tardif, Jean-Claude; Tendera, Michal; Steg, Philippe Gabriel

    2017-10-01

    Despite major advances in prevention and treatment, coronary artery disease (CAD) remains the leading cause of death worldwide. Whereas many sources of data are available on the epidemiology of acute coronary syndromes, fewer datasets reflect the contemporary management and outcomes of stable CAD patients. A worldwide contemporary registry would improve our knowledge about stable CAD. The main objectives are to describe the demographics, clinical profile, contemporary management and outcomes of outpatients with stable CAD; to identify gaps between evidence and treatment; and to investigate long-term prognostic determinants. CLARIFY (ProspeCtive observational LongitudinAl RegIstry oF patients with stable coronary arterY disease) is an ongoing international observational longitudinal registry. Stable CAD patients from 45 countries in Europe, Asia, America, Middle East, Australia and Africa were enrolled between November 2009 and June 2010. The inclusion criteria were previous myocardial infarction, evidence of coronary stenosis >50%, proven symptomatic myocardial ischemia or prior revascularization procedure. The main exclusion criteria were serious non-cardiovascular disease, conditions interfering with life expectancy or severe other cardiovascular disease (including advanced heart failure). Follow-up visits were planned annually for up to 5 years, interspersed with 6-month telephone calls. Of the 32,703 patients enrolled, most (77.6%) were male, age (mean ± SD) was 64.2 ± 10.5 years, and 71.0% were receiving treatment for hypertension; mean ± SD resting heart rate was 68.2 ± 10.6 bpm. Patients were enrolled based on a history of myocardial infarction >3 months earlier (57.7%), having at least one stenosis >50% on coronary angiography (61.1%), proven symptomatic myocardial ischemia on non-invasive testing (23.1%), or history of percutaneous coronary intervention or coronary artery bypass graft (69.8%). Baseline characteristics were similar across the four

  6. Change the management of patients with heart failure: Rationale and design of the CHAMP-HF registry.

    Science.gov (United States)

    DeVore, Adam D; Thomas, Laine; Albert, Nancy M; Butler, Javed; Hernandez, Adrian F; Patterson, J Herbert; Spertus, John A; Williams, Fredonia B; Turner, Stuart J; Chan, Wing W; Duffy, Carol I; McCague, Kevin; Mi, Xiaojuan; Fonarow, Gregg C

    2017-07-01

    Heart failure (HF) with reduced ejection fraction (HFrEF) is a common and costly condition that diminishes patients' health status and confers a poor prognosis. Despite the availability of multiple guideline-recommended pharmacologic and cardiac device therapies for patients with chronic HFrEF, outcomes remain suboptimal. Currently, there is limited insight into the rationale underlying clinical decisions by health care providers and patient factors that guide the use and intensity of outpatient HF treatments. A better understanding of current practice patterns has the potential to improve patients' outcomes. The CHAnge the Management of Patients with Heart Failure (CHAMP-HF) registry will evaluate the care and outcomes of patients with chronic HFrEF by assessing real-world treatment patterns, as well as the reasons for and barriers to medication treatment changes. CHAMP-HF will enroll approximately 5,000 patients with chronic HFrEF (left ventricular ejection fraction ≤40%) at approximately 150 US sites, and patients will be followed for a maximum duration of 24 months. Participating sites will collect data from both providers (HF history, examination findings, results of diagnostic studies, pharmacotherapy treatment patterns, decision-making factors, and clinical outcomes) and patients (medication adherence and patient-reported outcomes). The CHAMP-HF registry will provide a unique opportunity to study practice patterns and the adoption of new HF therapies across a diverse mix of health care providers and outpatient practices in the United States that care for HFrEF patients. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. The new Childhood Arthritis and Rheumatology Research Alliance (CARRA) registry: design, rationale, and characteristics of patients enrolled in the first 12 months.

    Science.gov (United States)

    Beukelman, Timothy; Kimura, Yukiko; Ilowite, Norman T; Mieszkalski, Kelly; Natter, Marc D; Burrell, Grendel; Best, Brian; Jones, Jason; Schanberg, Laura E

    2017-04-17

    Herein we describe the history, design, and rationale of the new Childhood Arthritis and Rheumatology Research Alliance (CARRA) Registry and present the characteristics of patients with juvenile idiopathic arthritis (JIA) enrolled in the first 12 months of operation. The CARRA Registry began prospectively collecting data in the United States and Canada in July 2015 to evaluate the safety of therapeutic agents in persons with childhood-onset rheumatic disease, initially restricted to JIA. Secondary objectives include the evaluation of disease outcomes and their associations with medication use and other factors. Data are collected every 6 months and include clinical assessments, detailed medication use, patient-reported outcomes, and safety events. Follow-up is planned for at least 10 years for each participant and is facilitated by a telephone call center. As of July 2016, 1192 patients with JIA were enrolled in the CARRA Registry at 49 clinical sites. At enrollment, their median age was 12.4 years old and median disease duration was 2.6 years. Owing to preferential enrollment, patients with systemic JIA (13%) and with a polyarticular course (75%) were over-represented compared to patients in typical clinical practice. Approximately 49% were currently using biologic agents and ever use of oral glucocorticoids was common (47%). The CARRA Registry provides safety surveillance data to pharmaceutical companies to satisfy their regulatory requirements, and several independently-funded sub-studies that use the Registry infrastructure are underway. The new CARRA Registry successfully enrolled nearly 1200 participants with JIA in the first 12 months of its operation. Sustainable funding has been secured from multiple sources. The CARRA Registry may serve as a model for the study of other uncommon diseases.

  8. One-Year Outcomes After Minor Stroke or High-Risk Transient Ischemic Attack: Korean Multicenter Stroke Registry Analysis.

    Science.gov (United States)

    Park, Hong-Kyun; Kim, Beom Joon; Han, Moon-Ku; Park, Jong-Moo; Kang, Kyusik; Lee, Soo Joo; Kim, Jae Guk; Cha, Jae-Kwan; Kim, Dae-Hyun; Nah, Hyun-Wook; Park, Tai Hwan; Park, Sang-Soon; Lee, Kyung Bok; Lee, Jun; Hong, Keun-Sik; Cho, Yong-Jin; Lee, Byung-Chul; Yu, Kyung-Ho; Oh, Mi-Sun; Kim, Joon-Tae; Choi, Kang-Ho; Kim, Dong-Eog; Ryu, Wi-Sun; Choi, Jay Chol; Johansson, Saga; Lee, Su Jin; Lee, Won Hee; Lee, Ji Sung; Lee, Juneyoung; Bae, Hee-Joon

    2017-11-01

    Patients with minor ischemic stroke or transient ischemic attack are at high risk of recurrent stroke and vascular events, which are potentially disabling or fatal. This study aimed to evaluate contemporary subsequent vascular event risk after minor ischemic stroke or transient ischemic attack in Korea. Patients with minor ischemic stroke or high-risk transient ischemic attack admitted within 7 days of symptom onset were identified from a Korean multicenter stroke registry database. We estimated 3-month and 1-year event rates of the primary outcome (composite of stroke recurrence, myocardial infarction, or all-cause death), stroke recurrence, a major vascular event (composite of stroke recurrence, myocardial infarction, or vascular death), and all-cause death and explored differences in clinical characteristics and event rates according to antithrombotic strategies at discharge. Of 9506 patients enrolled in this study, 93.8% underwent angiographic assessment and 72.7% underwent cardiac evaluations; 25.1% had symptomatic stenosis or occlusion of intracranial arteries. At discharge, 95.2% of patients received antithrombotics (antiplatelet polytherapy, 37.1%; anticoagulation, 15.3%) and 86.2% received statins. The 3-month cumulative event rate was 5.9% for the primary outcome, 4.3% for stroke recurrence, 4.6% for a major vascular event, and 2.0% for all-cause death. Corresponding values at 1 year were 9.3%, 6.1%, 6.7%, and 4.1%, respectively. Patients receiving nonaspirin antithrombotic strategies or no antithrombotic agent had higher baseline risk profiles and at least 1.5× higher event rates for clinical event outcomes than those with aspirin monotherapy. Contemporary secondary stroke prevention strategies based on thorough diagnostic evaluation may contribute to the low subsequent vascular event rates observed in real-world clinical practice in Korea. © 2017 American Heart Association, Inc.

  9. Trends in incidence, attack rate, and mortality of acute myocardial infarction in Estonia: the Tallinn AMI Registry 1991-2005.

    Science.gov (United States)

    Laks, Toivo; Jõeste, Enn; Pullisaar, Olar; Mäeots, Ene; Lapidus, Ilja; Pietilä, Arto; Salomaa, Veikko

    2013-03-01

    Coronary event rates have declined in most Western countries during the past decades, but the trends in the former Eastern block have not been established. The purpose of the present study was to examine the trends in acute coronary events during 1991-2005 in Tallinn, Estonia. The Tallinn Acute Myocardial Infarction (AMI) Registry recorded all AMI events among the residents of Tallinn, Estonia, aged 35-64 years during two time periods, 1991-1997 and 2003-2005. Altogether, 4889 AMI events were recorded. The average age-standardized incidence and attack rate of AMI events were lower in the second than in the first registration period in both sexes. When analyzed annually, the AMI event rates increased from 1991 to 1993 in both sexes. Thereafter from 1993 to 2005 the incidence of first AMI events declined significantly, 2.7%/year in men and 5.0%/year in women (P Estonia. After that especially the incidence of first AMI started to decline, and the declines have continued until 2005.

  10. The rationale and design of the national familial hypercholesterolemia registries in Turkey: A-HIT1 and A-HIT2 studies.

    Science.gov (United States)

    Kayıkçıoğlu, Meral; Tokgözoğlu, Lale

    2017-04-01

    Familial hypercholesterolemia (FH) is a genetic disease characterized by extremely high levels of cholesterol, leading to premature atherosclerosis. Although many countries have already addressed the burden of FH by means of national registries, Turkey has no national FH registry or national screening program to detect FH. Creation of a series of FH registries is planned as part of Turkish FH Initiative endorsed by the Turkish Society of Cardiology to meet this need. This article provides detailed information on the rationale and design of the first 2 FH registries (A-HIT1 and A-HIT2). A-HIT1 is a nationwide survey of adult homozygous FH (HoFH) patients undergoing low-density lipoprotein (LDL) apheresis (LA) in Turkey. A-HIT1 will provide insight into the clinical status of HoFH patients undergoing LA. Primary objective of this cross-sectional study is to identify how HoFH patients on LA are managed. Inclusion criteria are age >12 years, diagnosis of HoFH, and regular LA treatment. All available apheresis centers were electronically invited to participate in the study. The principal physicians of each center will respond to a questionnaire regarding their attitude toward LA. For each patient, another questionnaire will be used to collect data on clinical status, medication use, and disease data. In addition, patients will be asked to complete self-report questionnaires that provide information on quality of life, disease-related anxiety, and depression. A-HIT2 is a registry of adult FH patients presenting at outpatient clinics. At least 1000 FH patients will be recruited from 30 outpatient clinics representing the 12 statistical regions in Turkey based on the EU NUTS classification. Sites specializing in cardiology, internal medicine, and endocrinology were invited to participate. The primary objective of this cross-sectional study is to determine clinical status and management of patients in Turkey diagnosed with FH. Eligibility for screening was defined as having

  11. Design and rationale for the Influenza vaccination After Myocardial Infarction (IAMI) trial. A registry-based randomized clinical trial

    DEFF Research Database (Denmark)

    Fröbert, Ole; Götberg, Matthias; Angerås, Oskar

    2017-01-01

    BACKGROUND: Registry studies and case-control studies have demonstrated that the risk of acute myocardial infarction (AMI) is increased following influenza infection. Small randomized trials, underpowered for clinical end points, indicate that future cardiovascular events can be reduced following...... influenza vaccination in patients with established cardiovascular disease. Influenza vaccination is recommended by international guidelines for patients with cardiovascular disease, but uptake is varying and vaccination is rarely prioritized during hospitalization for AMI. METHODS/DESIGN: The Influenza...... vaccination After Myocardial Infarction (IAMI) trial is a double-blind, multicenter, prospective, registry-based, randomized, placebo-controlled, clinical trial. A total of 4,400 patients with ST-segment elevation myocardial infarction (STEMI) or non-STEMI undergoing coronary angiography will randomly...

  12. Acute Stroke or Transient Ischemic Attack Treated with Aspirin or Ticagrelor and Patient Outcomes (SOCRATES) trial: rationale and design.

    Science.gov (United States)

    Johnston, S Claiborne; Amarenco, Pierre; Albers, Gregory W; Denison, Hans; Easton, J Donald; Held, Peter; Jonasson, Jenny; Minematsu, Kazuo; Molina, Carlos A; Wong, Lawrence K S

    2015-12-01

    The risk of recurrent ischemia is high in the acute period after ischemic stroke and transient ischemic attack. Aspirin is recommended by guidelines for this indication, but more intensive antiplatelet therapy may be justified. We aim to evaluate whether ticagrelor, a potent antiplatelet agent that blocks the P2Y12 receptor without requiring metabolic activation, reduces the risk of major vascular events compared with aspirin when randomization occurs within 24 h after symptom onset of a nonsevere ischemic stroke or high-risk transient ischemic attack. Acute Stroke or Transient Ischemic Attack Treated with Aspirin or Ticagrelor and Patient Outcomes (SOCRATES) is a randomized, double-blind, event-driven trial and will include an estimated 13,600 participants randomized in 33 countries worldwide to collect 844 primary events. The primary endpoint is the composite of stroke (ischemic or hemorrhagic), myocardial infarction, and death. Time to the first primary endpoint will be compared in the treatment groups during 90-day follow-up, with major hemorrhage serving as the primary safety endpoint. Participants will be followed for an additional 30 days after the randomized treatment period. The SOCRATES trial fulfills an important clinical need by evaluating a potent antiplatelet agent as a superior alternative to current standard of care in patients presenting acutely with ischemic stroke or transient ischemic attack. © 2015 The Authors. International Journal of Stroke published by John Wiley & Sons Ltd on behalf of World Stroke Organization.

  13. Trends in the Attack Rates, Incidence, and Mortality of Stroke during 1986–2012: Data of Kaunas (Lithuania) Stroke Registry

    Science.gov (United States)

    Radisauskas, Ricardas; Malinauskiene, Vilija; Milinaviciene, Egle; Kranciukaite-Butylkiniene, Daina; Tamosiunas, Abdonas; Bernotiene, Gailute; Luksiene, Dalia; Milasauskiene, Zemyna; Sopagiene, Diana; Rastenyte, Daiva

    2016-01-01

    Background There is a lack of reliable epidemiological data on longitudinal trends in stroke attack rates, incidence, and mortality in the countries of the Baltic region. Aims The aim of the present study was to explore the longitudinal trends of stroke in middle-aged urban population of Lithuania during the period of 1986 through 2012. Methods All stroke events in the studied population were ascertained and validated according to the standardized criteria outlined by the WHO MONICA Project. The study included all patients in Kaunas (Lithuania) city aged 25 to 64 years who experienced a stroke between 1986 and 2012. Estimates of time-trends of the annual percentage change in stroke attack rates, incidence of stroke, and mortality from this condition were made by applying the Joinpoint regression analysis. Results During the study period, 9,992 stroke events were registered. The overall proportion of recurrent events was 25.7%. Overall, 18.9% of the events (20.0% in men, and 17.4% in women) were fatal within 28 days. During the period of 1986 to 2012, a flat trend in the incidence of stroke was observed among both male and female middle-aged inhabitants of Kaunas city, while attack rates were increasing due to the increase in recurrent strokes. Both mortality and 28-day case fatality of stroke declined significantly over the study period in both sexes. Conclusions An increase both in the incidence and recurrence of stroke among middle-aged men residing in Kaunas city and in the recurrence of stroke among women denotes the inefficiency of measures applied both for primary and secondary prevention of stroke in Lithuania. The revision of current prevention strategies and the introduction of new ones are of paramount importance in order to fight the epidemic of stroke. PMID:27124412

  14. Evaluation oF FactORs ImpacTing CLinical Outcome and Cost EffectiveneSS of the S-ICD: Design and Rationale of the EFFORTLESS S-ICD Registry

    DEFF Research Database (Denmark)

    Pedersen, Susanne S; Lambiase, Pier; Boersma, Lucas V A

    2012-01-01

    or in the vasculature. We present the rationale and study design of the Evaluation oF FactORs ImpacTing CLinical Outcome and Cost EffectiveneSS of the S-ICD (EFFORTLESS S-ICD) Registry which was designed to evaluate the long-term performance of the S-ICD including patient quality of life and long-term resource......) complication-free rate, 360-day complication-free rate, and percentage of inappropriate shocks for atrial fibrillation and supraventricular ventricular tachyarrhythmia. Other endpoints include patient-reported outcomes (e.g., quality of life) and hospital personnel implant and follow-up experience with the S...

  15. Exploring Clinical and Epidemiological Characteristics of Interstitial Lung Diseases: Rationale, Aims, and Design of a Nationwide Prospective Registry—The EXCITING-ILD Registry

    Directory of Open Access Journals (Sweden)

    Michael Kreuter

    2015-01-01

    Full Text Available Despite a number of prospective registries conducted in past years, the current epidemiology of interstitial lung diseases (ILD is still not well defined, particularly regarding the prevalence and incidence, their management, healthcare utilisation needs, and healthcare-associated costs. To address these issues in Germany, a new prospective ILD registry, “Exploring Clinical and Epidemiological Characteristics of Interstitial Lung Diseases” (EXCITING-ILD, is being conducted by the German Centre for Lung Research in association with ambulatory, inpatient, scientific pulmonology organisations and patient support groups. This multicentre, noninterventional, prospective, and observational ILD registry aims to collect comprehensive and validated data from all healthcare institutions on the incidence, prevalence, characteristics, management, and outcomes regarding all ILD presentations in the real-world setting. Specifically, this registry will collect demographic data, disease-related data such as ILD subtype, treatments, diagnostic procedures (e.g., HRCT, surgical lung biopsy, risk factors (e.g., familial ILD, significant comorbidities, ILD managements, and disease outcomes as well as healthcare resource consumption. The EXCITING-ILD registry will include in-patient and out-patient ILD healthcare facilities in more than 100 sites. In summary, this registry will document comprehensive and current epidemiological data as well as important health economic data for ILDs in Germany.

  16. Longitudinal determinants of depression among World Trade Center Health Registry enrollees, 14-15 years after the 9/11 attacks.

    Science.gov (United States)

    Jacobson, Melanie H; Norman, Christina; Nguyen, Angela; Brackbill, Robert M

    2018-03-15

    Exposure to the September 11, 2001 (9/11) terrorist attacks has been found to be associated with posttraumatic stress disorder (PTSD) and comorbid PTSD and depression up to 10-11 years post-disaster. However, little is known about the longitudinal predictors of mental health conditions over time. We examined longitudinal determinants of depression within strata of PTSD among 21,258 enrollees of the World Trade Center Health Registry who completed four questionnaires over 14 years of follow-up (Wave 1 in 2003-04; Wave 2 in 2005-06; Wave 3 in 2011-12; and Wave 4 in 2015-16). PTSD status was measured using the PTSD checklist on all four waves and defined as a score of ≥ 44; depression was assessed using the 8-item Patient Health Questionnaire at Waves 3 and 4 and defined as a score of ≥ 10. Across Waves 3 and 4, 18.6% experienced depression, and it was more common among those who ever had PTSD (56.1%) compared with those who had not (5.6%). Across PTSD strata, predictors of depression included low income, unemployment, low social integration and support, post-9/11 traumatic life events, and chronic physical illness. These factors also decreased the likelihood of recovering from depression. Depression symptoms were not measured at Waves 1 and 2; data was self-reported. These findings highlight the substantial burden of depression in a trauma-exposed population 14-15 years post-disaster, especially among those with PTSD. Similar life stressors predicted the course of depression among those with and without PTSD which may inform public health and clinical interventions. Copyright © 2018 The Authors. Published by Elsevier B.V. All rights reserved.

  17. Determining the prevalence and predictors of sleep disordered breathing in patients with chronic heart failure: rationale and design of the SCHLA-HF registry

    Science.gov (United States)

    2014-01-01

    Background The objective of the SCHLA-HF registry is to investigate the prevalence of sleep-disordered breathing (SDB) in patients with chronic heart failure with reduced left ventricular systolic function (HF-REF) and to determine predictors of SDB in such patients. Methods Cardiologists in private practices and in hospitals in Germany are asked to document patients with HF-REF into the prospective SCHLA-HF registry if they meet predefined inclusion and exclusion criteria. Screening was started in October 2007 and enrolment was completed at the end of May 2013. After enrolment in the registry, patients are screened for SDB. SDB screening is mainly undertaken using the validated 2-channel ApneaLink™ device (nasal flow and pulse oximetry; ResMed Ltd., Sydney, Australia). Patients with a significant number of apneas and hypopneas per hour recording time (AHI ≥15/h) and/or clinical symptoms suspicious of SDB will be referred to a cooperating sleep clinic for an attended in-lab polysomnography with certified scoring where the definite diagnosis and, if applicable, the differentiation between obstructive and central sleep apnea will be made. Suggested treatment will be documented. Discussion Registries play an important role in facilitating advances in the understanding and management of cardiovascular disease. The SCHLA-HF registry will provide consistent data on a large group of patients with HF-REF that will help to answer questions on the prevalence, risk factors, gender differences and stability of SDB in these patients by cross-sectional analyses. Further insight into the development of SDB will be gained by extension of the registry to include longitudinal data. PMID:24716484

  18. Rationale and design of a prospective study: Cervical Dystonia Patient Registry for Observation of OnaBotulinumtoxinA Efficacy (CD PROBE

    Directory of Open Access Journals (Sweden)

    Schwartz Marc

    2011-11-01

    Full Text Available Abstract Background A registry of patients with cervical dystonia (Cervical Dystonia Patient Registry for Observation of onaBotulinumtoxinA Efficacy [CD PROBE] was initiated to capture data regarding physician practices and patient outcomes with onabotulinumtoxinA (BOTOX®, Allergan, Inc., Irvine, CA, USA. Methods and baseline demographics from an interim analysis are provided. Methods/Design This is a prospective, multicenter, clinical registry in the United States enrolling subjects with cervical dystonia (CD who are toxin naïve and/or new to the physicians' practices, or who had been in a clinical trial but received their last injection ≥ 16 weeks prior to enrollment. Subjects are followed over 3 injection cycles of onabotulinumtoxinA, with assessments at time of injection and 4-6 weeks later. Information on physician's practice, patient demographics, CD disease history, duration of treatment intervals and neurotoxin dose, dilution, use of electromyography, and muscles injected are collected. Outcomes are assessed by physicians and subjects using various questionnaires. Discussion This ongoing registry includes 609 subjects with the following baseline data: 75.9% female, 93.6% Caucasian, mean age 57.6 ± 14.3, age at symptom onset 48.3 ± 16.2, and time to diagnosis 5.4 ± 8.6 years, with an additional 1.0 ± 3.5 years before treatment. Of those employed at the time of diagnosis, 36.6% stopped working as a result of CD. CD PROBE, the largest clinical registry of CD treatment, will provide useful data on current treatment practices with onabotulinumtoxinA, potentially leading to refinements for optimization of outcomes. Trial registration NCT00836017

  19. Acute management of stroke patients taking non-vitamin K antagonist oral anticoagulants Addressing Real-world Anticoagulant Management Issues in Stroke (ARAMIS) Registry: Design and rationale.

    Science.gov (United States)

    Xian, Ying; Hernandez, Adrian F; Harding, Tina; Fonarow, Gregg C; Bhatt, Deepak L; Suter, Robert E; Khan, Yosef; Schwamm, Lee H; Peterson, Eric D

    2016-12-01

    Non-vitamin K antagonist oral anticoagulants (NOACs, dabigatran, rivaroxaban, apixaban, and edoxaban) have been increasingly used as alternatives to warfarin for stroke prophylaxis in patients with atrial fibrillation. Yet there is substantial lack of information on how patients on NOACs are currently treated when they have an acute ischemic stroke and the best strategies for treating intracerebral hemorrhage for those on chronic anticoagulation with warfarin or a NOAC. These are critical unmet needs for real world clinical decision making in these emergent patients. The ARAMIS Registry is a multicenter cohort study of acute stroke patients who were taking chronic anticoagulation therapy prior to admission and are admitted with either an acute ischemic stroke or intracerebral hemorrhage. Built upon the existing infrastructure of American Heart Association/American Stroke Association Get With the Guidelines Stroke, the ARAMIS Registry will enroll a total of approximately 10,000 patients (5000 with acute ischemic stroke who are taking a NOAC and 5000 with anticoagulation-related intracerebral hemorrhage who are on warfarin or a NOAC). The primary goals of the ARAMIS Registry are to provide a comprehensive picture of current treatment patterns and outcomes of acute ischemic stroke patients on NOACs, as well as anticoagulation-related intracerebral hemorrhage in patients on either warfarin or NOACs. Beyond characterizing the index hospitalization, up to 2500 patients (1250 ischemic stroke and 1250 intracerebral hemorrhage) who survive to discharge will be enrolled in an optional follow-up sub-study and interviewed at 3 and 6 months after discharge to assess longitudinal medication use, downstream care, functional status, and patient-reported outcomes. The ARAMIS Registry will document the current state of management of NOAC treated patients with acute ischemic stroke as well as contemporary care and outcome of anticoagulation-related intracerebral hemorrhage. These

  20. International REgistry to assess medical Practice with lOngitudinal obseRvation for Treatment of Heart Failure (REPORT-HF): rationale for and design of a global registry.

    Science.gov (United States)

    Filippatos, Gerasimos; Khan, Sadiya Sana; Ambrosy, Andrew P; Cleland, John G F; Collins, Sean P; Lam, Carolyn S P; Angermann, Christiane E; Ertl, Georg; Dahlström, Ulf; Hu, Dayi; Dickstein, Kenneth; Perrone, Sergio V; Ghadanfar, Mathieu; Bermann, Georgina; Noe, Adele; Schweizer, Anja; Maier, Thomas; Gheorghiade, Mihai

    2015-05-01

    The clinical characteristics, initial presentation, management, and outcomes of patients hospitalized with new-onset (first diagnosis) heart failure (HF) or decompensation of chronic HF are poorly understood worldwide. REPORT-HF (International REgistry to assess medical Practice with lOngitudinal obseRvation for Treatment of Heart Failure) is a global, prospective, and observational study designed to characterize patient trajectories longitudinally during and following an index hospitalization for HF. Data collection for the registry will be conducted at ∼300 sites located in ∼40 countries. Comprehensive data including demographics, clinical presentation, co-morbidities, treatment patterns, quality of life, in-hospital and post-discharge outcomes, and health utilization and costs will be collected. Enrolment of ∼20 000 adult patients hospitalized with new-onset (first diagnosis) HF or decompensation of chronic HF over a 3-year period is planned with subsequent 3 years follow-up. The REPORT-HF registry will explore the clinical characteristics, management, and outcomes of HF worldwide. This global research programme may have implications for the formulation of public health policy and the design and conduct of international clinical trials. © 2015 The Authors. European Journal of Heart Failure published by John Wiley & Sons Ltd on behalf of European Society of Cardiology.

  1. Sutureless Aortic Valve Replacement International Registry (SU-AVR-IR): design and rationale from the International Valvular Surgery Study Group (IVSSG)

    Science.gov (United States)

    Phan, Kevin; Bouchard, Denis; Carrel, Thierry P.; Dapunt, Otto E.; Di Bartolomeo, Roberto; Eichstaedt, Harald C.; Fischlein, Theodor; Folliguet, Thierry; Gersak, Borut; Glauber, Mattia; Haverich, Axel; Misfeld, Martin; Oberwalder, Peter J.; Santarpino, Giuseppe; Shrestha, Malakh Lal; Solinas, Marco; Vola, Marco; Alamanni, Francesco; Albertini, Alberto; Bhatnagar, Gopal; Carrier, Michel; Clark, Stephen; Collart, Federic; Kappert, Utz; Kocher, Alfred; Meuris, Bart; Mignosa, Carmelo; Ouda, Ahmed; Pelletier, Marc; Rahmanian, Parwis Baradaran; Reineke, David; Teoh, Kevin; Troise, Giovanni; Villa, Emmanuel; Wahlers, Thorsten; Yan, Tristan D.

    2015-01-01

    Background Sutureless aortic valve replacement (SU-AVR) is an innovative approach which shortens cardiopulmonary bypass and cross-clamp durations and may facilitate minimally invasive approach. Evidence outlining its safety, efficacy, hemodynamic profile and potential complications is replete with small-volume observational studies and few comparative publications. Methods Minimally invasive aortic valve surgery and high-volume SU-AVR replacement centers were contacted for recruitment into a global collaborative coalition dedicated to sutureless valve research. A Research Steering Committee was formulated to direct research and support the mission of providing registry evidence warranted for SU-AVR. Results The International Valvular Surgery Study Group (IVSSG) was formed under the auspices of the Research Steering Committee, comprised of 36 expert valvular surgeons from 27 major centers across the globe. IVSSG Sutureless Projects currently proceeding include the Retrospective and Prospective Phases of the SU-AVR International Registry (SU-AVR-IR). Conclusions The global pooling of data by the IVSSG Sutureless Projects will provide required robust clinical evidence on the safety, efficacy and hemodynamic outcomes of SU-AVR. PMID:25870808

  2. Blood Pressure and Risk of Vascular Dementia: Evidence From a Primary Care Registry and a Cohort Study of Transient Ischemic Attack and Stroke.

    Science.gov (United States)

    Emdin, Connor A; Rothwell, Peter M; Salimi-Khorshidi, Gholamreza; Kiran, Amit; Conrad, Nathalie; Callender, Thomas; Mehta, Ziyah; Pendlebury, Sarah T; Anderson, Simon G; Mohseni, Hamid; Woodward, Mark; Rahimi, Kazem

    2016-06-01

    Vascular dementia is the second most common form of dementia but reliable evidence on age-specific associations between blood pressure (BP) and risk of vascular dementia is limited and some studies have reported negative associations at older ages. In a cohort of 4.28 million individuals, free of known vascular disease and dementia and identified from linked electronic primary care health records in the United Kingdom (Clinical Practice Research Datalink), we related BP to time to physician-diagnosed vascular dementia. We further determined associations between BP and dementia in a prospective population-based cohort of incident transient ischemic attack and stroke (Oxford Vascular Study). For a median follow-up of 7.0 years, 11 114 initial presentations of vascular dementia were observed in the primary care cohort after exclusion of the first 4 years of follow-up. The association between usual systolic BP and risk of vascular dementia decreased with age (hazard ratio per 20 mm Hg higher systolic BP, 1.62; 95% confidence interval, 1.13-2.35 at 30-50 years; 1.26, 1.18-1.35 at 51-70 years; 0.97, 0.92-1.03 at 71-90 years; P trend=0.006). Usual systolic BP remained predictive of vascular dementia after accounting for effect mediation by stroke and transient ischemic attack. In the population-based cohort, prior systolic BP was predictive of 5-year risk of dementia with no evidence of negative association at older ages. BP is positively associated with risk of vascular dementia, irrespective of preceding transient ischemic attack or stroke. Previous reports of inverse associations in old age could not be confirmed. © 2016 American Heart Association, Inc.

  3. The Danish Stroke Registry.

    Science.gov (United States)

    Johnsen, Søren Paaske; Ingeman, Annette; Hundborg, Heidi Holmager; Schaarup, Susanne Zielke; Gyllenborg, Jesper

    2016-01-01

    The aim of the Danish Stroke Registry is to monitor and improve the quality of care among all patients with acute stroke and transient ischemic attack (TIA) treated at Danish hospitals. All patients with acute stroke (from 2003) or TIA (from 2013) treated at Danish hospitals. Reporting is mandatory by law for all hospital departments treating these patients. The registry included >130,000 events by the end of 2014, including 10,822 strokes and 4,227 TIAs registered in 2014. The registry holds prospectively collected data on key processes of care, mainly covering the early phase after stroke, including data on time of delivery of the processes and the eligibility of the individual patients for each process. The data are used for assessing 18 process indicators reflecting recommendations in the national clinical guidelines for patients with acute stroke and TIA. Patient outcomes are currently monitored using 30-day mortality, unplanned readmission, and for patients receiving revascularization therapy, also functional level at 3 months poststroke. Sociodemographic, clinical, and lifestyle factors with potential prognostic impact are registered. The Danish Stroke Registry is a well-established clinical registry which plays a key role for monitoring and improving stroke and TIA care in Denmark. In addition, the registry is increasingly used for research.

  4. The Danish Stroke Registry

    DEFF Research Database (Denmark)

    Johnsen, Søren Paaske; Ingeman, Annette; Hundborg, Heidi Holmager

    2016-01-01

    AIM OF DATABASE: The aim of the Danish Stroke Registry is to monitor and improve the quality of care among all patients with acute stroke and transient ischemic attack (TIA) treated at Danish hospitals. STUDY POPULATION: All patients with acute stroke (from 2003) or TIA (from 2013) treated...... at Danish hospitals. Reporting is mandatory by law for all hospital departments treating these patients. The registry included >130,000 events by the end of 2014, including 10,822 strokes and 4,227 TIAs registered in 2014. MAIN VARIABLES: The registry holds prospectively collected data on key processes...... of care, mainly covering the early phase after stroke, including data on time of delivery of the processes and the eligibility of the individual patients for each process. The data are used for assessing 18 process indicators reflecting recommendations in the national clinical guidelines for patients...

  5. Recording a diagnosis of stroke, transient ischaemic attack or myocardial infarction in primary healthcare and the association with dispensation of secondary preventive medication: a registry-based prospective cohort study

    Science.gov (United States)

    Dahlgren, Cecilia; Geary, Lukas; Hasselström, Jan; Rehnberg, Clas; Schenck-Gustafsson, Karin; Wändell, Per; von Euler, Mia

    2017-01-01

    Objectives The aim of this study was to explore whether recording in primary care of a previously recorded hospital diagnosis was associated with increased patient utilisation of recommended medications. Design Registry-based prospective cohort study. Setting and participants 19 072 patients with a hospital discharge diagnosis of transient ischaemic attack (TIA), stroke or acute coronary syndrome from hospitals in Stockholm County 2010–2013 were included in the study. Main outcome measure The outcome of the study was medication dispensation as a marker of adherence to recommended medications. Adherence was defined as having had at least two filled prescriptions in the third year following hospital discharge. Results Recording a diagnosis was associated with higher utilisation of all recommended medications with the exception of antihypertensives in patients with TIA. The differences between the groups with and without a recorded diagnosis remained after adjusting for age, sex, index year and visits to private practitioners. Dispensation of antithrombotics was high overall, 80%–90% in patients without a recorded diagnosis and 90%–94% for those with a diagnosis. Women with recorded ischaemic stroke/TIA/acute coronary syndrome were dispensed more statins (56%–71%) than those with no recorded diagnosis (46%–59%). Similarly, 68%–83% of men with a recorded diagnosis were dispensed statins (57%–77% in men with no recorded diagnosis). The rate of diagnosis recording spanned from 15% to 47% and was especially low in TIA (men 15%, women 16%). Conclusion Recording a diagnosis of TIA/stroke or acute coronary syndrome in primary care was found to be associated with higher dispensation of recommended secondary preventive medications. Further study is necessary in order to determine the mechanisms underlying our results and to establish the utility of our findings. PMID:28939569

  6. Heart Attack

    Science.gov (United States)

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  7. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  8. Pooling and expanding registries of familial hypercholesterolaemia to assess gaps in care and improve disease management and outcomes: Rationale and design of the global EAS Familial Hypercholesterolaemia Studies Collaboration.

    Science.gov (United States)

    Vallejo-Vaz, Antonio J; Akram, Asif; Kondapally Seshasai, Sreenivasa Rao; Cole, Della; Watts, Gerald F; Hovingh, G Kees; Kastelein, John J P; Mata, Pedro; Raal, Frederick J; Santos, Raul D; Soran, Handrean; Freiberger, Tomas; Abifadel, Marianne; Aguilar-Salinas, Carlos A; Alnouri, Fahad; Alonso, Rodrigo; Al-Rasadi, Khalid; Banach, Maciej; Bogsrud, Martin P; Bourbon, Mafalda; Bruckert, Eric; Car, Josip; Ceska, Richard; Corral, Pablo; Descamps, Olivier; Dieplinger, Hans; Do, Can T; Durst, Ronen; Ezhov, Marat V; Fras, Zlatko; Gaita, Dan; Gaspar, Isabel M; Genest, Jaques; Harada-Shiba, Mariko; Jiang, Lixin; Kayikcioglu, Meral; Lam, Carolyn S P; Latkovskis, Gustavs; Laufs, Ulrich; Liberopoulos, Evangelos; Lin, Jie; Lin, Nan; Maher, Vincent; Majano, Nelson; Marais, A David; März, Winfried; Mirrakhimov, Erkin; Miserez, André R; Mitchenko, Olena; Nawawi, Hapizah; Nilsson, Lennart; Nordestgaard, Børge G; Paragh, György; Petrulioniene, Zaneta; Pojskic, Belma; Reiner, Željko; Sahebkar, Amirhossein; Santos, Lourdes E; Schunkert, Heribert; Shehab, Abdullah; Slimane, M Naceur; Stoll, Mario; Su, Ta-Chen; Susekov, Andrey; Tilney, Myra; Tomlinson, Brian; Tselepis, Alexandros D; Vohnout, Branislav; Widén, Elisabeth; Yamashita, Shizuya; Catapano, Alberico L; Ray, Kausik K

    2016-12-01

    The potential for global collaborations to better inform public health policy regarding major non-communicable diseases has been successfully demonstrated by several large-scale international consortia. However, the true public health impact of familial hypercholesterolaemia (FH), a common genetic disorder associated with premature cardiovascular disease, is yet to be reliably ascertained using similar approaches. The European Atherosclerosis Society FH Studies Collaboration (EAS FHSC) is a new initiative of international stakeholders which will help establish a global FH registry to generate large-scale, robust data on the burden of FH worldwide. The EAS FHSC will maximise the potential exploitation of currently available and future FH data (retrospective and prospective) by bringing together regional/national/international data sources with access to individuals with a clinical and/or genetic diagnosis of heterozygous or homozygous FH. A novel bespoke electronic platform and FH Data Warehouse will be developed to allow secure data sharing, validation, cleaning, pooling, harmonisation and analysis irrespective of the source or format. Standard statistical procedures will allow us to investigate cross-sectional associations, patterns of real-world practice, trends over time, and analyse risk and outcomes (e.g. cardiovascular outcomes, all-cause death), accounting for potential confounders and subgroup effects. The EAS FHSC represents an excellent opportunity to integrate individual efforts across the world to tackle the global burden of FH. The information garnered from the registry will help reduce gaps in knowledge, inform best practices, assist in clinical trials design, support clinical guidelines and policies development, and ultimately improve the care of FH patients. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  9. Heart Attack

    Science.gov (United States)

    ... pain Fatigue Heart attack Symptoms & causes Diagnosis & treatment Advertisement Mayo Clinic does not endorse companies or products. ... a Job Site Map About This Site Twitter Facebook Google YouTube Pinterest Mayo Clinic is a not- ...

  10. Heart attack

    Science.gov (United States)

    ... heart attack. A stent is a small, metal mesh tube that opens up (expands) inside a coronary ... e228. PMID: 25260718 www.ncbi.nlm.nih.gov/pubmed/25260718 . Anderson JL. ST segment elevation acute myocardial ...

  11. Impact of Frailty and Other Geriatric Syndromes on Clinical Management and Outcomes in Elderly Patients With Non-ST-Segment Elevation Acute Coronary Syndromes: Rationale and Design of the LONGEVO-SCA Registry.

    Science.gov (United States)

    Alegre, Oriol; Ariza-Solé, Albert; Vidán, María T; Formiga, Francesc; Martínez-Sellés, Manuel; Bueno, Héctor; Sanchís, Juan; López-Palop, Ramón; Abu-Assi, Emad; Cequier, Àngel

    2016-07-01

    The incidence of acute coronary syndromes (ACS) is high in the elderly. Despite a high prevalence of frailty and other aging-related variables, little information exists about the optimal clinical management in patients with coexisting geriatric syndromes. The aim of the LONGEVO-SCA registry (Impacto de la Fragilidad y Otros Síndromes Geriátricos en el Manejo y Pronóstico Vital del Anciano con Síndrome Coronario Agudo sin Elevación de Segmento ST) is to assess the impact of aging-related variables on clinical management, prognosis, and functional status in elderly patients with ACS. A series of 500 consecutive octogenarian patients with non-ST-segment elevation ACS from 57 centers in Spain will be included. A comprehensive geriatric assessment will be performed during the admission, assessing functional status (Barthel Index, Lawton-Brody Index), frailty (FRAIL scale, Short Physical Performance Battery), comorbidity (Charlson Index), nutritional status (Mini Nutritional Assessment-Short Form), and quality of life (Seattle Angina Questionnaire). Patients will be managed according to current recommendations. The primary outcome will be the description of mortality and its causes at 6 months. Secondary outcomes will be changes in functional status and quality of life. Results from this study might significantly improve the knowledge about the impact of aging-related variables on management and outcomes of elderly patients with ACS. Clinical management of these patients has become a major health care problem due to the growing incidence of ACS in the elderly and its particularities. © 2016 Wiley Periodicals, Inc.

  12. Post-ICU discharge and outcome: rationale and methods of the The French and euRopean Outcome reGistry in Intensive Care Units (FROG-ICU) observational study.

    Science.gov (United States)

    Mebazaa, Alexandre; Casadio, Maria Chiara; Azoulay, Elie; Guidet, Bertrand; Jaber, Samir; Levy, Bruno; Payen, Didier; Vicaut, Eric; Resche-Rigon, Matthieu; Gayat, Etienne

    2015-10-12

    Previous studies have demonstrated that ICU (intensive care unit) survivors have decreased long-term survival rates compared to the general population. However, knowledge about how to identify ICU survivors with higher risk of death and the adjustable factors associated with mortality is still lacking. The FROG-ICU (the French and European Outcome Registry in Intensive Care Units) study is a prospective, observational, multicenter cohort study where ICU survivors are followed up to one year after ICU discharge. Beside one year survival, the study is designed to assess incidence and identifying risk factors for mortality over the year following discharge from the ICU. All consecutive patients admitted in ICU to the 28 participating centers during the study period will be included. Every subject will undergo an evaluation at admission, throughout the ICU stay and at ICU discharge. The global, especially cardiovascular, assessment of each subject will be performed through a complete clinical exam, instrumental tests (electrocardiogram, echocardiogram) and biological parameters. Blood and urine samples will be collected at admission and at discharge with the primary goal to assess effectiveness of routine and novel cardiovascular, inflammatory and renal biomarkers, with potential interest in risk stratification for patients who survive an ICU stay. The follow up will include a careful tracking of patients through telephone calls and questionnaires at 3, 6 and 12 months after ICU discharge. FROG-ICU aims to identify the clinical and biological phenotype of patients with different levels of probability of death in the year after ICU discharge. FROG-ICU has been designed to better understand long term outcome after ICU discharge as well as risk factors for all-cause and cardiovascular morbidity and associated mortality. It is a large prospective multicenter cohort with a biological (on plasma and urine) collection and one-year follow-up of ICU patients. FROG ICU will

  13. About Heart Attacks

    Science.gov (United States)

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 27,2017 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  14. Stroke Trials Registry

    Science.gov (United States)

    ... News About Neurology Image Library Search The Internet Stroke Center Trials Registry Clinical Trials Interventions Conditions Sponsors ... a clinical trial near you Welcome to the Stroke Trials Registry Our registry of clinical trials in ...

  15. Clinical Case Registries (CCR)

    Data.gov (United States)

    Department of Veterans Affairs — The Clinical Case Registries (CCR) replaced the former Immunology Case Registry and the Hepatitis C Case Registry with local and national databases. The CCR:HIV and...

  16. Converged Registries Solution (CRS)

    Data.gov (United States)

    Department of Veterans Affairs — The Converged Registries platform is a hardware and software architecture designed to host individual patient registries and eliminate duplicative development effort...

  17. Exercise Aboard Attack Submarines: Rationale and New Options

    Science.gov (United States)

    2004-08-18

    experience loss of physical fitness while underway. Bennett and co-workers (2) noted a 7% reduction of maximal oxygen consumption in non-exercising...Inc. designed and built a comprehensive resistance exercise device to help counteract muscle deconditioning during long term space flights (the SX... Physical activity aboard nuclear submarines as measured by pedometry. Groton: Naval Submarine Medical Research Laboratory, Report 1053, 1985, p. 12

  18. EMI Registry Design

    CERN Document Server

    Memon, S

    2011-01-01

    Grid services are the fundamental building blocks of today's Distributed Computing Infrastructures (DCI). The discovery of services in the DCI is a primary function that is a precursor to other tasks such as workload and data management. In this context, a service registry can be used to fulfil such a requirement. Existing service registries, such as the ARC Information Index or UNICORE Registry, are examples that have proven themselves in production environments. Such implementations provide a centralized service registry, however, todays DCIs, such as EGI, are based on a federation model. It is therefore necessary for the service registry to mirror such a model in order for it to seamlessly fit into the operational and management requirements - a DCI built using federated approach. This document presents an architecture for a federated service registry and a prototype based on this architecture, the EMI Registry. Special attention is given to how the federated service registry is robust to environment failu...

  19. Does Design Rationale Enhance Creativity?

    Directory of Open Access Journals (Sweden)

    Jing Wang

    2010-01-01

    Full Text Available Creativity and rationale are often viewed as two contrasting facets in software design. A lack in recognizing the facilitative relationship between creativity and rationale not only underestimates the benefits designers can obtain from rationale practices, but also confines the approaches that support creativity in software design. Our exploratory study provides empirical evidence of the positive correlation between rationale and creativity. Furthermore, we found that the feasibility of design alternatives and the comprehensiveness of tradeoff evaluation are critical to enhancing novelty, persuasiveness, and insightfulness. We also discuss future directions to further understand how these properties, or rationale quality in general, affects design creativity.

  20. Facility Registry Service (FRS)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Facility Registry Service (FRS) provides an integrated source of comprehensive (air, water, and waste) environmental information about facilities across EPA,...

  1. The Qingdao Twin Registry

    DEFF Research Database (Denmark)

    Duan, Haiping; Ning, Feng; Zhang, Dongfeng

    2013-01-01

    In 1998, the Qingdao Twin Registry was initiated as the main part of the Chinese National Twin Registry. By 2005, a total of 10,655 twin pairs had been recruited. Since then new twin cohorts have been sampled, with one longitudinal cohort of adolescent twins selected to explore determinants of me...

  2. The Danish HD Registry

    DEFF Research Database (Denmark)

    Gilling, M.; Budtz-Jorgensen, E.; Boonen, S. E.

    2017-01-01

    The Danish Huntington's Disease Registry (DHR) is a nationwide family registry comprising 14 245 individuals from 445 Huntington's disease (HD) families of which the largest family includes 845 individuals in 8 generations. 1136 DNA and/or blood samples and 18 fibroblast cultures are stored...

  3. The CLARIN Concept Registry

    NARCIS (Netherlands)

    Schuurman, Ineke; Windhouwer, M.; Shkaravska, O.

    2015-01-01

    Since a few months the CLARIN Concept Registry (CCR;www.clarin.eu/conceptregistry) is operational, the open access, OpenSKOS-based registry replacing ISOcat. Although using ISOcat had been encouraged by CLARIN, it had its drawbacks: a rich data model combined with a very open update strategy turned

  4. EMI Registry Development Plan

    CERN Document Server

    Memon, S.; Szigeti, G.; Field, L.

    2012-01-01

    This documents describes the overall development plan of the EMI Registry product, the plan focuses on the realisation of the EMI Registry specification as defined in the document. It is understood that during the course of the development phase the specification will likely evolve and the changes will be fed into the specification document.

  5. Danish Hip Arthroscopy Registry

    DEFF Research Database (Denmark)

    Mygind-Klavsen, Bjarne; Grønbech Nielsen, Torsten; Maagaard, Niels

    2016-01-01

    Danish Hip Arthroscopy Registry (DHAR) was initiated in 2012 as a web-based prospective registry. The purpose of this study was to evaluate and report the epidemiologic and perioperative data of the first 2000 procedures in a Danish hip arthroscopy population and to describe the development of DH...

  6. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  7. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  8. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  9. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  10. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  11. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  12. Rationale Management Challenges in Requirements Engineering

    NARCIS (Netherlands)

    Liang, Peng; Avgeriou, Paris; He, Keqing

    2010-01-01

    Rationale and rationale management have been playing an increasingly prominent role in software system development mainly due to the knowledge demand during system evaluation, maintenance, and evolution, especially for large and complex systems. The rationale management for requirements engineering,

  13. 911 Master PSAP Registry

    Data.gov (United States)

    Federal Communications Commission — Updated as of 5Oct2017. The Registry lists PSAPs by an FCC assigned identification number, PSAP Name, State, County, City, and provides information on any type of...

  14. Data Element Registry Services

    Data.gov (United States)

    U.S. Environmental Protection Agency — Data Element Registry Services (DERS) is a resource for information about value lists (aka code sets / pick lists), data dictionaries, data elements, and EPA data...

  15. Nocturnal panic attacks

    OpenAIRE

    Lopes Fabiana L.; Nardi Antonio E.; Nascimento Isabella; Valença Alexandre M.; Zin Walter A

    2002-01-01

    The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sle...

  16. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  17. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  18. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  19. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  20. Heart attack - discharge

    Science.gov (United States)

    ... attack Heart bypass surgery Heart bypass surgery - minimally invasive Heart pacemaker High blood cholesterol levels High blood pressure Implantable cardioverter-defibrillator Smoking - tips on how to ...

  1. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  2. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses such

  3. Transient Ischemic Attack

    Medline Plus

    Full Text Available Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only ... TIA is that with TIA the blockage is transient (temporary). TIA symptoms occur rapidly and last a ...

  4. The Danish Heart Registry

    DEFF Research Database (Denmark)

    Özcan, Cengiz; Juel, Knud; Lassen, Jens Flensted

    2016-01-01

    AIM: The Danish Heart Registry (DHR) seeks to monitor nationwide activity and quality of invasive diagnostic and treatment strategies in patients with ischemic heart disease as well as valvular heart disease and to provide data for research. STUDY POPULATION: All adult (≥15 years) patients...... undergoing coronary angiography (CAG), percutaneous coronary intervention (PCI), coronary artery bypass grafting, and heart valve surgery performed across all Danish hospitals were included. MAIN VARIABLES: The DHR contains a subset of the data stored in the Eastern and Western Denmark Heart Registries (EDHR...

  5. The Danish Schizophrenia Registry

    Directory of Open Access Journals (Sweden)

    Baandrup L

    2016-10-01

    Full Text Available Lone Baandrup,1 Charlotte Cerqueira,2 Lea Haller,3 Lene Korshøj,3 Inge Voldsgaard,4 Merete Nordentoft5 1Centre for Neuropsychiatric Schizophrenia Research (CNSR and Centre for Clinical Intervention and Neuropsychiatric Schizophrenia Research (CINS, Mental Health Centre Glostrup, Copenhagen University Hospital, Glostrup, 2Registry Support Centre (East – Epidemiology and Biostatistics, Research Centre for Prevention and Health, Capital Region of Denmark, Copenhagen, 3The Danish Clinical Registries, Registry Support Centre for Health Quality and Informatics (KCKS-West, Aarhus, 4Psychosis Ward, Section P, Aarhus University Hospital, Risskov, 5Mental Health Centre Copenhagen, Mental Health Services in the Capital Region of Denmark, University of Copenhagen, Copenhagen, DenmarkAim of database: To systematically monitor and improve the quality of treatment and care of patients with schizophrenia in Denmark. In addition, the database is accessible as a resource for research.Study population: Patients diagnosed with schizophrenia and receiving mental health care in psychiatric hospitals or outpatient clinics. During the first year after the diagnosis, patients are classified as incident patients, and after this period as prevalent patients.Main variables: The registry currently contains 21 clinical quality measures in relation to the following domains: diagnostic evaluation, antipsychotic treatment including adverse reactions, cardiovascular risk factors including laboratory values, family intervention, psychoeducation, postdischarge mental health care, assessment of suicide risk in relation to discharge, and assessment of global functioning.Descriptive data: The recorded data are available electronically for the reporting clinicians and responsible administrative personnel, and they are updated monthly. The registry publishes the national and regional results of all included quality measures in the annual audit reports. External researchers may

  6. Mathematical Attacks on RSA Cryptosystem

    OpenAIRE

    Imad K. Salah; Abdullah Darwish; Saleh Oqeili

    2006-01-01

    In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA) cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  7. Cancer Registry Data

    Centers for Disease Control (CDC) Podcasts

    2017-05-24

    Dr. Loria Pollack, a Senior Medical Epidemiologist, talks about the importance of cancer registry data to understanding how cancer affects the United States–now and in the future.  Created: 5/24/2017 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 5/24/2017.

  8. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  9. The EuroMyositis registry

    DEFF Research Database (Denmark)

    Lilleker, James B; Vencovsky, Jiri; Wang, Guochun

    2018-01-01

    AIMS: The EuroMyositis Registry facilitates collaboration across the idiopathic inflammatory myopathy (IIM) research community. This inaugural report examines pooled Registry data. METHODS: Cross-sectional analysis of IIM cases from 11 countries was performed. Associations between clinical subtyp...

  10. Renal replacement therapy for children throughout the world: the need for a global registry.

    Science.gov (United States)

    Ploos van Amstel, Sophie; Noordzij, Marlies; Warady, Bradley A; Cano, Francisco; Craig, Jonathan C; Groothoff, Jaap W; Ishikura, Kenji; Neu, Alicia; Safouh, Hesham; Xu, Hong; Jager, Kitty J; Schaefer, Franz

    2017-12-22

    To describe the factors affecting the incidence of renal replacement therapy (RRT) among children, information from RRT registries is required. We aimed to give an overview of existing pediatric RRT registries worldwide, identify regions with a need to commence or increase data collection on pediatric RRT, and provide a rationale for developing a global RRT registry. A survey assessing pediatric RRT registry status was sent to International Pediatric Nephrology Associateion (IPNA) members in 127 countries in January 2016. The survey was complemented by a systematic literature search for active pediatric RRT registries. Complete survey responses were retrieved from 94 countries (representing 86.2% of the world childhood population), with 84 (81.2%) having the means to provide RRT to children, given that there are no other limitations such as financial, social, or religious restraints. Fifty-one (35.3%) countries had national registries for both dialysis and transplantation, nine (30.0%) either had a dialysis or a transplant registry, six participated in international registries only (2.7%), and in 18 (13.2%), children on RRT were not followed in any registry. The search identified 92 pediatric RRT registries, primarily national registries located in Europe, North America, and Asia. Although pediatric RRT can be provided in 84 countries representing 81.2% of the world's childhood population, national pediatric RRT registries are unavailable in many countries. To improve knowledge about the incidence and outcomes of pediatric RRT around the globe, an international population-based pediatric RRT registry has recently been initiated.

  11. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  12. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  13. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  14. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  15. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  16. Rationale and design of a study exploring the efficacy of once-daily oral rivaroxaban (X-TRA) on the outcome of left atrial/left atrial appendage thrombus in nonvalvular atrial fibrillation or atrial flutter and a retrospective observational registry providing baseline data (CLOT-AF).

    Science.gov (United States)

    Lip, Gregory Y H; Hammerstingl, Christoph; Marin, Francisco; Cappato, Riccardo; Meng, Isabelle Ling; Kirsch, Bodo; Morandi, Eolo; van Eickels, Martin; Cohen, Ariel

    2015-04-01

    There are still many unresolved issues concerning patient outcomes and prognostic factors in patients with atrial fibrillation (AF) and left atrial/left atrial appendage (LA/LAA) thrombi. Rivaroxaban (Xarelto®), a potent and highly selective oral, direct factor Xa inhibitor, is a new therapeutic option in this setting. The planned study program will consist of a prospective interventional study (X-TRA) and a retrospective observational registry (CLOT-AF). The primary objective of the X-TRA study is to explore the efficacy of rivaroxaban in the treatment of LA/LAA thrombi in patients with nonvalvular AF or atrial flutter, scheduled to undergo cardioversion or AF ablation, in whom an LA/LAA thrombus has been found on transesophageal echocardiography (TEE) before the procedure. The primary end point is the complete LA/LAA thrombus resolution rate at 6 weeks of end of treatment confirmed by TEE. The secondary objectives are to describe categories of thrombus outcome in patients (resolved, reduced, unchanged, larger, or new) confirmed on TEE at the end of treatment (after 6 weeks of treatment), incidence of the composite of stroke and noncentral nervous system systemic embolism at the end of treatment and during follow-up, and incidence of all bleeding at the end of treatment and during follow-up. The objective of the CLOT-AF registry is to provide retrospective thrombus-related patient outcome data after standard-of-care anticoagulant treatment in patients with nonvalvular AF or atrial flutter, who have TEE-documented LA/LAA thrombi. The data will be used as a reference for the prospective X-TRA study. In conclusion, X-TRA and CLOT-AF will provide some answers to the many unresolved issues concerning patient outcomes and prognostic factors in patients with AF and LAA thrombi. Results from this study program would provide the first prospective interventional study (X-TRA) and a large international retrospective observational registry (CLOT-AF) on the prevalence and

  17. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  18. Facial Dog Attack Injuries

    OpenAIRE

    Lin, Wei; Patil, Pavan Manohar

    2013-01-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to succe...

  19. Launch under attack

    Energy Technology Data Exchange (ETDEWEB)

    Steinbruner, J.

    1984-01-01

    The strategy of launch under attack calls for launching nuclear weapons on warning that attacking weapons are on their way. The political pressures for adopting this strategy are symptomatic of an increasing instability in the nuclear balance. The author describes a Brookings Institute model, which indicates that the problems of decentralized control and precise timing could lead to failures in retargeting procedures. The major concern is that the strategy imposes powerful incentives for preemption as the most promising means of conducting nuclear war.

  20. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are c......The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio......-technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  1. The Danish Twin Registry

    Science.gov (United States)

    SKYTTHE, AXEL; KYVIK, KIRSTEN OHM; HOLM, NIELS VILSTRUP; CHRISTENSEN, KAARE

    2012-01-01

    Introduction The Danish Twin Registry is a unique source for studies of genetic, familial and environmental factors on life events, health conditions and diseases. Content More than 85,000 twin pairs born 1870–2008 in Denmark. Validity and coverage Four main ascertainment methods have been employed. Completeness of ascertainment varies according to birth cohorts. For birth cohorts 1870–1930 both twins should survive to age 6 years. From 1931–1968 72% of all twin pairs has been ascertained, with complete ascertainment of all live born twins since 1968. Conclusion Because twins have been identified independent of traits and on a population basis, the Danish Twin Registry is well suited for studies to understand the influence of genetic and environmental factors for a wide variety of diseases and traits. PMID:21775358

  2. The Danish Twin Registry

    DEFF Research Database (Denmark)

    Skytthe, Axel; Ohm Kyvik, Kirsten; Vilstrup Holm, Niels

    2011-01-01

    Introduction: The Danish Twin Registry is a unique source for studies of genetic, familial and environmental factors on life events, health conditions and diseases. Content: More than 85,000 twin pairs born 1870-2008 in Denmark. Validity and coverage: Four main ascertainment methods have been...... employed. Completeness of ascertainment varies according to birth cohorts. For birth cohorts 1870-1930 both twins should survive to age 6 years. From 1931-1968 72% of all twin pairs has been ascertained, with complete ascertainment of all live born twins since 1968. CONCLUSION: Because twins have been...... identified independent of traits and on a population basis, the Danish Twin Registry is well suited for studies to understand the influence of genetic and environmental factors for a wide variety of diseases and traits....

  3. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  4. Evaluation of the short- and long-term safety and therapy outcomes of the everolimus-eluting bioresorbable vascular scaffold system in patients with coronary artery stenosis: Rationale and design of the German–Austrian ABSORB RegIstRy (GABI-R)

    Energy Technology Data Exchange (ETDEWEB)

    Nef, Holger, E-mail: holger.nef@innere.med.uni-giessen.de [University of Giessen, Medizinische Klinik I, Department of Cardiology, Giessen (Germany); Wiebe, Jens [University of Giessen, Medizinische Klinik I, Department of Cardiology, Giessen (Germany); Achenbach, Stefan [University of Erlangen, Medizinische Klinik II, Department of Cardiology, Erlangen (Germany); Münzel, Thomas [Department of Medicine II, University Medical Center, Johannes Gutenberg University Mainz, Mainz (Germany); Naber, Christoph [Klinik für Kardiologie und Angiologie, Elisabeth-Krankenhaus, Essen (Germany); Richardt, Gert [Herzzentrum, Segeberger Kliniken GmbH, Bad Segeberg (Germany); Mehilli, Julinda [Department of Cardiology, Klinikum Großhadern, Ludwig- Maximilian Universität, Munich (Germany); Wöhrle, Jochen [Department of Internal Medicine II, University of Ulm, Ulm (Germany); Neumann, Till; Biermann, Janine [University of Essen, Department of Cardiology, Essen (Germany); Zahn, Ralf [Abteilung für Kardiologie, Herzzentrum Ludwigshafen, Ludwigshafen (Germany); Kastner, Johannes [Department of Cardiology, University of Vienna Medical School, Vienna (Austria); Schmermund, Axel [CCB, Cardioangiologisches Centrum Bethanien, Frankfurt (Germany); Pfannebecker, Thomas [Abbott Vascular Deutschland GmbH, Wetzlar (Germany); Schneider, Steffen; Limbourg, Tobias [Institut für Herzinfarktforschung, Ludwigshafen (Germany); Hamm, Christian W. [University of Giessen, Medizinische Klinik I, Department of Cardiology, Giessen (Germany); Kerckhoff Heart and Thorax Center, Department of Cardiology, Bad Nauheim (Germany)

    2016-01-15

    Background: Third-generation drug-eluting metal stents are the gold standard for treatment of coronary artery disease. The permanent metallic caging of the vessel, however, can result in limited vasomotion, chronic inflammation, and late expansive remodeling, conditions that can lead to late and very late stent thrombosis. The development of bioresorbable scaffolds (BRSs) promises advantages over metal stents due to complete biodegradation within 2–4 years. Theoretically, since vessel scaffolding is temporary and no permanent implant remains in the vessel, BRSs, as opposed to metal stents, once degraded would no longer be potential triggers for stent-related adverse events or side effects. Methods/design: The short- and long-term outcome after implantation of an everolimus-eluting, poly-L-lactic acid-based bioresorbable scaffold system (ABSORB, Abbott Vascular, Santa Clara, CA, USA) in the world-wide greatest all-comers cohort will be evaluated in the prospective, non-interventional, multicenter German–Austrian ABSORB RegIstRy (GABI-R). GABI-R will include over 5000 patients from about 100 study sites in Austria and Germany. Safety endpoints such as cardiac death, myocardial infarction, and clinically driven percutaneous or surgical target lesion and vessel revascularization will be evaluated during hospitalization and in the follow-up period (minimum of 5 years). Conclusion: Although two randomized controlled trials and several registries have documented safety and efficacy as well as non-inferiority of this everolimus-eluting ABSORB device compared with drug-eluting metal stents, the current knowledge regarding clinical application, treatment success, and long-term safety of using this BRS in daily routine is limited. Thus, the goal of GABI-R is to address this lack of information. - Highlights: • The GABI-R addresses a lack of data about bioresorbable scaffolds in daily practice. • 5000 patients with minimal in- and exclusion criteria at 100 sites will

  5. Cooperating attackers in neural cryptography

    Science.gov (United States)

    Shacham, Lanir N.; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the “majority-flipping attacker,” does not decay with the parameters of the model. This attacker’s outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  6. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  7. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  8. The Danish schizophrenia registry

    DEFF Research Database (Denmark)

    Baandrup, Lone; Cerqueira, Charlotte; Haller, Lea

    2016-01-01

    Aim of database: To systematically monitor and improve the quality of treatment and care of patients with schizophrenia in Denmark. In addition, the database is accessible as a resource for research. Study population: Patients diagnosed with schizophrenia and receiving mental health care...... to the data for use in specific research projects by applying to the steering committee. Conclusion: The Danish Schizophrenia Registry represents a valuable source of informative data to monitor and improve the quality of care of patients with schizophrenia in Denmark. However, continuous resources and time...

  9. The Danish Schizophrenia Registry

    DEFF Research Database (Denmark)

    Baandrup, Lone; Cerqueira, Charlotte; Haller, Lea

    2016-01-01

    Aim of database: To systematically monitor and improve the quality of treatment and care of patients with schizophrenia in Denmark. In addition, the database is accessible as a resource for research. Study population: Patients diagnosed with schizophrenia and receiving mental health care...... to the data for use in specific research projects by applying to the steering committee. Conclusion: The Danish Schizophrenia Registry represents a valuable source of informative data to monitor and improve the quality of care of patients with schizophrenia in Denmark. However, continuous resources and time...

  10. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... smolder — that can be destructive. If you think counseling would help your family deal with your heart attack more ... your lifestyle habits through exercise training, education and counseling to ... or with the help of your doctor, nurse, dietitian or other healthcare ...

  11. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. Copyright © 2013 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  12. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  13. BIRD ATTACK OCULAR INJURIES.

    Science.gov (United States)

    Tabatabaei, Seyed Ali; Soleimani, Mohammad; Behrouz, Mahmoud Jabbarvand

    2017-03-29

    To report 30 patients with bird attack-related eye injuries. This study was performed among patients coming to Farabi Eye Hospital, Tehran, Iran, from 2010 to 2015 with a history of bird attack causing eye injury. The inclusion criteria were a history of bird attack by pecking causing eye injury and having treatment and follow-up record for at least 6 months after treatment. The primary eye examinations included a full ophthalmic examination including evaluation of uncorrected visual acuity and best-corrected visual acuity (BCVA), anterior segment slit lamp biomicroscopy, and photography. For all patients with penetrating injury, primary repair was undertaken. Thirty patients (10 females and 20 males) with a mean age of 23.3 ± 18.5 years entered the study. The most common zone of injury was zone 1 (P < 0.001), and lensectomy was not needed in majority of patients (P < 0.001). The most common bird causing the injury was mynah (P < 0.001). Those patients with baseline BCVA of less than 20/200 or those with endophthalmitis had statistically worse final BCVA after treatment. Patients attacked by mynah bird had significantly better pretreatment uncorrected visual acuity and BCVA. The most common bird causing the eye injury among the sample of patients from Iran was mynah, which differs with previous studies indicating the rooster attack as the most common cause of eye injury. The authors also found that the most common zone of injury was zone 1, and the presence of endophthalmitis and lower baseline BCVA were significant risk factors for worse visual outcomes.

  14. Rationale and design of WEBCARE

    DEFF Research Database (Denmark)

    Pedersen, Susanne S.; Spek, Viola; Theuns, Dominic A M J

    2009-01-01

    The implantable cardioverter defibrillator (ICD) is generally well accepted, but 25-33% of patients experience clinical levels of anxiety, depression, and impaired quality of life (QoL) following implantation. Few trials in ICD patients have investigated whether behavioral intervention may mitiga...... the development of these adjustment problems. We present the rationale and study design of the WEB-based distress management program for implantable CARdioverter dEfibrillator patients (WEBCARE) trial....

  15. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  16. eRegistries: Electronic registries for maternal and child health.

    Science.gov (United States)

    Frøen, J Frederik; Myhre, Sonja L; Frost, Michael J; Chou, Doris; Mehl, Garrett; Say, Lale; Cheng, Socheat; Fjeldheim, Ingvild; Friberg, Ingrid K; French, Steve; Jani, Jagrati V; Kaye, Jane; Lewis, John; Lunde, Ane; Mørkrid, Kjersti; Nankabirwa, Victoria; Nyanchoka, Linda; Stone, Hollie; Venkateswaran, Mahima; Wojcieszek, Aleena M; Temmerman, Marleen; Flenady, Vicki J

    2016-01-19

    The Global Roadmap for Health Measurement and Accountability sees integrated systems for health information as key to obtaining seamless, sustainable, and secure information exchanges at all levels of health systems. The Global Strategy for Women's, Children's and Adolescent's Health aims to achieve a continuum of quality of care with effective coverage of interventions. The WHO and World Bank recommend that countries focus on intervention coverage to monitor programs and progress for universal health coverage. Electronic health registries - eRegistries - represent integrated systems that secure a triple return on investments: First, effective single data collection for health workers to seamlessly follow individuals along the continuum of care and across disconnected cadres of care providers. Second, real-time public health surveillance and monitoring of intervention coverage, and third, feedback of information to individuals, care providers and the public for transparent accountability. This series on eRegistries presents frameworks and tools to facilitate the development and secure operation of eRegistries for maternal and child health. In this first paper of the eRegistries Series we have used WHO frameworks and taxonomy to map how eRegistries can support commonly used electronic and mobile applications to alleviate health systems constraints in maternal and child health. A web-based survey of public health officials in 64 low- and middle-income countries, and a systematic search of literature from 2005-2015, aimed to assess country capacities by the current status, quality and use of data in reproductive health registries. eRegistries can offer support for the 12 most commonly used electronic and mobile applications for health. Countries are implementing health registries in various forms, the majority in transition from paper-based data collection to electronic systems, but very few have eRegistries that can act as an integrating backbone for health

  17. Life After a Heart Attack

    Science.gov (United States)

    ... been stable for a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, ... 2009, this project provided six awards at five academic institutions to identify genetic connections to heart, lung, ...

  18. Danish National Lymphoma Registry

    DEFF Research Database (Denmark)

    Arboe, Bente; Josefsson, Pär; Jørgensen, Judit

    2016-01-01

    AIM OF DATABASE: The Danish National Lymphoma Registry (LYFO) was established in order to monitor and improve the diagnostic evaluation and the quality of treatment of all lymphoma patients in Denmark. STUDY POPULATION: The LYFO database was established in 1982 as a seminational database including...... all lymphoma patients referred to the departments of hematology. The database became nationwide on January 1, 2000. MAIN VARIABLES: The main variables include both clinical and paraclinical variables as well as details of treatment and treatment evaluation. Up to four forms are completed for each......-100 years) and a male/female ratio of 1.23:1. Patients can be registered with any of 42 different subtypes according to the World Health Organization classifications. CONCLUSION: LYFO is a nationwide database for all lymphoma patients in Denmark and includes detailed information. This information is used...

  19. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  20. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  1. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  2. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  3. Worldwide variability in deceased organ donation registries

    OpenAIRE

    Rosenblum, Amanda M.; Li, Alvin Ho-ting; Roels, Leo; Stewart, Bryan; Prakash, Versha; Beitel, Janice; Young, Kimberly; Shemie, Sam; Nickerson, Peter; Garg, Amit X.

    2012-01-01

    The variability in deceased organ donation registries worldwide has received little attention. We considered all operating registries, where individual wishes about organ donation were recorded in a computerized database. We included registries which recorded an individual's decision to be a donor (donor registry), and registries which only recorded an individual's objection (non-donor registry). We collected information on 15 characteristics including history, design, use and number of regis...

  4. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  5. The Glider registry.

    Science.gov (United States)

    Secco, Gioel Gabrio; Rittger, Harald; Hoffmann, Stefan; Richardt, Gert; Abdel-Wahab, Mohamed; Reinecke, Holger; Lotan, Chaim; Werner, Gerald; Sievert, Horst; Foin, Nicolas; Di Mario, Carlo

    2017-01-01

    Provisional stenting of the side-branch (SB) is the universally accepted gold standard while there is still controversy on the usefulness of routine dilatation of the SB ostium. Recrossing the struts of a previously deployed stent with a wire and a balloon can prove challenging and is occasionally unsuccessful, mainly because the balloon tip hits a stent strut. This prospective multicenter international registry tested the crossing ability procedural results of a new-dedicated ultrashort balloon specifically designed for side branch dilatation (Glider, TriReme Medical, Pleasanton, CA, USA). One hundred and twenty five patients (for a total of 131 bifurcation lesions) were enrolled in the registry between January 2009 and May 2012. The Glider was used as first choice in alternative to conventional balloon (group I, 72%) or as bail-out after unsuccessful previous attempt at crossing with small conventional low-profile balloons (group II, 28%). Postprocedural coronary artery dissections and in-hospital MACE (death, myocardial infarction and repeat revascularization) were assessed. Technical success was defined as the ability of the Glider to recross the struts of a previously deployed stent while procedural success was defined as less of residual 50% diameter stenosis at the origin of the SB with a final TIMI 3 and/or freedom from in-hospital MACE. Technical success was achieved, respectively, in 92% (group I), and 83% (group II). Clinical and angiographic procedural success was achieved in 98% of the lesions. In Group II, no other balloon of the same size could cross in cases where Glider could not. A total of 13 complications were observed, including nine ostial SB dissection four of which needed a second stent on the SB, one stent loss, two severe coronary spasms, and two by thrombus formation. The unique possibility offered by this short dedicated balloon to orientate its beveled tip provides an effective strategy for recrossing stent struts when conventional low

  6. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  7. Can You Recognize a Heart Attack? Quiz

    Science.gov (United States)

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Can You Recognize a Heart Attack? Updated:Sep 16, ... a Heart Attack Heart Attack Symptoms in Women “Can you recognize a heart attack?” Quiz • Understand Your ...

  8. Iranian Joint Registry (Iranian National Hip and Knee Arthroplasty Registry).

    Science.gov (United States)

    Aslani, Hamidreza; Nourbakhsh, Seyed Taghi; Lahiji, Farivar A; Heydarian, Keykavoos; Jabalameli, Mahmood; Ghazavi, Mohammad Taghi; Tahmasebi, Mohammad Naghi; Fayyaz, Mahmoud Reza; Sazegari, Mohammad Ali; Mohaddes, Maziar; Rajabpour, Mojtaba; Emami, Mohammad; Jazayeri, Seyyed Mohammad; Madadi, Firooz; Farahini, Hossein; Mirzatoloee, Fardin; Gharahdaghi, Mohammad; Ebrahimzadeh, Mohammad Hossein; Ebrahimian, Mohammadreza; Mirvakili, Hossein; Bashti, Kaveh; Almasizadeh, Mohtasham; Abolghasemian, Mansour; Taheriazam, Afshin; Motififard, Mehdi; Yazdi, Hamidreza; Mobarakeh, Mahmood Karimi; Shayestehazar, Masoud; Moghtadae, Mehdi; Siavashi, Babak; Sajjadi, Mohammadreza M; Rasi, Alireza Manafi; Chabok, Seyyed Kazem; Zafarani, Zohreh; Salehi, Shahin; Ahmadi, Monireh; Mohammadi, Amin; Shahsavand, Mohammad Ebrahim

    2016-04-01

    Periodic evaluation and monitoring the health and economic outcome of joint replacement surgery is a common and popular process under the territory of joint registries in many countries. In this article we introduce the methodology used for the foundation of the National Iranian Joint Registry (IJR) with a joint collaboration of the Social Security Organization (SSO) and academic research departments considering the requirements of the Iran's Ministry of Health and Education.

  9. The New ADL Registry. ADL Registry Web Portal Changes

    Science.gov (United States)

    2009-08-19

    Approaches 18 19 Primary ADL Registry Contributors Contributor Records Entry Date Navy eLearning (US Navy) 2,086 08/05/2008 Joint Knowledge Development...custom catalog items (content packages) to multiple environments and platforms 2008 21 U.S. Navy Organizational Challenges  Lack of consistent...ADL Registry  http://adlregistry.adlnet.gov/  Navy eLearning Content Team  https://www.netc.navy.mil/ile  Joint Knowledge Online  http

  10. Respiratory diseases registries in the national registry of rare diseases.

    Science.gov (United States)

    Lara Gallego, Beatriz; Abaitua Borda, Ignacio; Galán Gil, Genaro; Castillo Villegas, Diego; Casanova Espinosa, Álvaro; Cano Jiménez, Esteban; Ojanguren Arranz, Iñigo; Posada de la Paz, Manuel

    2014-09-01

    This report describes the general characteristics, objectives and organizational aspects of the registries of rare respiratory diseases included in the National Registry of Rare Diseases of the Research Institute for Rare Diseases (ISCIII), in order to publicize their existence and encourage the participation of professionals. Information is collected on the following conditions: alpha-1 antitrypsin deficiency, idiopathic tracheal stenosis, adult pulmonary Langerhans' cell histiocytosis, lymphangioleiomyomatosis, alveolar proteinosis, and sarcoidosis. Copyright © 2013 SEPAR. Published by Elsevier Espana. All rights reserved.

  11. The Danish Nephrology Registry.

    Science.gov (United States)

    Heaf, James

    2016-01-01

    The Danish Nephrology Registry's (DNR) primary function is to support the Danish public health authorities' quality control program for patients with end-stage renal disease in order to improve patient care. DNR also supplies epidemiological data to several international organizations and supports epidemiological and clinical research. The study population included patients treated with dialysis or transplantation in Denmark from January 1, 1990 to January 1, 2016, with retrospective data since 1964. DNR registers patient data (eg, age, sex, renal diagnosis, and comorbidity), predialysis specialist treatment, details of eight dialysis modalities (three hemodialysis and five peritoneal dialysis), all transplantation courses, dialysis access at first dialysis, treatment complications, and biochemical variables. The database is complete (nutritional and uremia status. Date and cause of death are also included. Six quality indicators are published annually, and have been associated with improvements in patient results, eg, a reduction in dialysis patient mortality, improved graft survival, and earlier referral to specialist care. Approximately, ten articles, mainly epidemiological, are published each year. DNR contains a complete description of end-stage renal disease patients in Denmark, their treatment, and prognosis. The stated aims are fulfilled.

  12. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  13. Essential Hypotension and Allostasis Registry

    Science.gov (United States)

    2018-02-05

    Blood Pressure; Depression; Panic Attack; Fibromyalgia; POTS; Inappropriate Sinus Tachycardia; Coronary Heart Disease; Acute Coronary Syndrome (ACS); Acute Myocardial Infarction (AMI); Cerebrovascular Disease (CVD); Transient Ischemic Attack (TIA); Atrial Fibrillation; Diabetes Mellitus; Cancer; Systolic Heart Failure; Diastolic Heart Failure; Chronic Fatigue Syndrome; Syncope; Vasovagal Syncope

  14. The Danish Nephrology Registry

    Directory of Open Access Journals (Sweden)

    Heaf J

    2016-10-01

    Full Text Available James Heaf Department of Medicine, Roskilde Hospital, University of Copenhagen, Roskilde, Denmark Aim of database: The Danish Nephrology Registry's (DNR primary function is to support the Danish public health authorities' quality control program for patients with end-stage renal disease in order to improve patient care. DNR also supplies epidemiological data to several international organizations and supports epidemiological and clinical research. Study population: The study population included patients treated with dialysis or transplantation in Denmark from January 1, 1990 to January 1, 2016, with retrospective data since 1964. Main variables: DNR registers patient data (eg, age, sex, renal diagnosis, and comorbidity, predialysis specialist treatment, details of eight dialysis modalities (three hemodialysis and five peritoneal dialysis, all transplantation courses, dialysis access at first dialysis, treatment complications, and biochemical variables. The database is complete (<1% missing data. Patients are followed until death or emigration. Descriptive data: DNR now contains 18,120 patients, and an average of 678 is added annually. Data for each transplantation course include donor details, tissue type, time to onset of graft function, and cause of graft loss. Registered complications include peritonitis in peritoneal dialysis patients, causes of peritoneal dialysis technique failure, and transplant rejections. Fifteen biochemical variables are registered, mainly describing anemia control, mineral and bone disease, nutritional and uremia status. Date and cause of death are also included. Six quality indicators are published annually, and have been associated with improvements in patient results, eg, a reduction in dialysis patient mortality, improved graft survival, and earlier referral to specialist care. Approximately, ten articles, mainly epidemiological, are published each year. Conclusion: DNR contains a complete description of end

  15. Rationale and methods of the EFCOSUM project

    NARCIS (Netherlands)

    Brussaard, J.H.; Johansson, L.; Kearney, J.

    2002-01-01

    Objective: To describe the rationale and methods for a European project (EFCOSUM) to develop a method for a European food consumption survey that delivers internationally comparable data on a set of policy-relevant nutritional indicators. Rationale and methods: Currently Member States are collecting

  16. Conflicting Rationales in Public Organizations

    DEFF Research Database (Denmark)

    Mik-Meyer, Nanna

    Everyday life in public organizations is influenced by conflicting rationales that do not always fit with the norms and ethics of the professions working in these organizations. Scholars use concepts such as ‘organizational professionalism’, ‘hybrid professionalism’, ‘situated professionalism’ etc....... to emphasize the effects of outside factors on professional work. This current paper contributes to this discussion by focusing on three sets of factors of particular importance in welfare work and which originate from the bureaucracy, the market and psychology. Thus, bureaucratic principles and discretion...... often pull in different directions resulting in ambiguous and conflictual conditions for the way professions can conduct their work today. However, and of equal importance, these multiple factors also produce common work conditions for very different professions working in public organizations...

  17. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  18. Tracing Technique for Blaster Attack

    OpenAIRE

    S., Siti Rahayu; Y., Robiah; S., Shahrin; A., Faizal M.; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log...

  19. Attacks on RFID Identification Systems

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-09-01

    Full Text Available This article is about attacks on RFID systems. Currently antivirus developers are not developing systems that protect from viruses that could exist on RFID tags. Such viruses are considered as not existing because the RFID tag memory is very small. Unfortunately such viruses exist. This article is concerned to such viruses and attacks that hackers could do using such viruses. Based on this article methods to prevent RFID-viruses attacks could be developed.

  20. Plasma Exchange in Severe Attacks of Neuromyelitis Optica

    Directory of Open Access Journals (Sweden)

    Mickael Bonnan

    2012-01-01

    Full Text Available Background. Neuromyelitis optica (NMO attacks are poorly controlled by steroids and evolve in stepwise neurological impairments. Assuming the strong humoral response underlying NMO attacks, plasma exchange (PLEX is an appropriate technique in severe NMO attacks. Objective. Presenting an up-to-date review of the literature of PLEX in NMO. Methods. We summarize the rationale of PLEX in relation with the physiology of NMO, the main technical aspects, and the available studies. Results. PLEX in severe attacks from myelitis or optic neuritis are associated with a better outcome, depending on PLEX delay (“time is cord and eyes”. NMO-IgG status has no influence. Finally, we build up an original concept linking the inner dynamic of the lesion, the timing of PLEX onset and the expected clinical results. Conclusion. PLEX is a safe and efficient add-on therapy in NMO, in synergy with steroids. Large therapeutic trials are required to definitely assess the procedure and define the time opportunity window.

  1. Review of patient registries in dermatology.

    Science.gov (United States)

    DiMarco, Gabriella; Hill, Dane; Feldman, Steven R

    2016-10-01

    Patient registries are datasets containing information on patients with a particular disease or patients who are undergoing a specific treatment. Our objective was to search for and catalog the types of registries being used in dermatology and investigate their characteristics and uses. We searched Google, the Registry of Patient Registries, Orphanet, and ClinicalTrials.gov to compile a list of dermatology disease registries. We also conducted a literature review on the uses of dermatology registries using PubMed. We identified 48 dermatology patient registries, with 23 distinct diseases represented. We also identified 11 registries used for postmarketing surveillance of skin disease. Our search was limited to registries in English. Registries are commonly used for the study of rare dermatologic diseases and for postsurveillance monitoring of systemic therapies in more common dermatologic diseases, such as psoriasis. Copyright © 2016 American Academy of Dermatology, Inc. Published by Elsevier Inc. All rights reserved.

  2. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  3. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  4. Attacker profiling in quantitative security assessment based on attack trees

    NARCIS (Netherlands)

    Lenin, Aleksandr; Willemson, Jan; Sari, Dyan Permata

    2014-01-01

    We present the results of research of limiting adversarial budget in attack games, and, in particular, in the failure-free attack tree models presented by Buldas-Stepanenko in 2012 and improved in 2013 by Buldas and Lenin. In the previously presented models attacker’s budget was assumed to be

  5. Danish National Lymphoma Registry

    Directory of Open Access Journals (Sweden)

    Arboe B

    2016-10-01

    Full Text Available Bente Arboe,1 Pär Josefsson,2 Judit Jørgensen,3 Jacob Haaber,4 Paw Jensen,5 Christian Poulsen,6 Dorthe Rønnov-Jessen,7 Robert S Pedersen,8 Per Pedersen,9 Mikael Frederiksen,10 Michael Pedersen,1 Peter de Nully Brown1 1Department of Hematology, Copenhagen University Hospital, Rigshospitalet, 2Department of Hematology, Copenhagen University Hospital, Herlev Hospital, Copenhagen, 3Department of Hematology, Aarhus University Hospital, Aarhus, 4Department of Hematology, Odense University Hospital, Odense, 5Department of Hematology, Aalborg University Hospital, Aalborg, 6Department of Hematology, Roskilde Hospital, Roskilde, 7Department of Hematology, Vejle Hospital, Vejle, 8Department of Hematology, Holstebro Hospital, Holstebro, 9Department of Hematology, Esbjerg Hospital, Esbjerg, 10Department of Hematology, Haderslev Hospital, Haderslev, Denmark Aim of database: The Danish National Lymphoma Registry (LYFO was established in order to monitor and improve the diagnostic evaluation and the quality of treatment of all lymphoma patients in Denmark. Study population: The LYFO database was established in 1982 as a seminational database including all lymphoma patients referred to the departments of hematology. The database became nationwide on January 1, 2000. Main variables: The main variables include both clinical and paraclinical variables as well as details of treatment and treatment evaluation. Up to four forms are completed for each patient: a primary registration form, a treatment form, a relapse form, and a follow-up form. Variables are used to calculate six result quality indicators (mortality 30 and 180 days after diagnosis, response to first-line treatment, and survival estimates 1, 3, and 5 years after the time of diagnosis, and three process quality indicators (time from diagnosis until the start of treatment, the presence of relevant diagnostic markers, and inclusion rate in clinical protocols. Descriptive data: Approximately 23

  6. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  7. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... and Conditions and Privacy Policy Go Red For Women® presents: View our first-ever short film (opens in new window) by Elizabeth Banks and share with the women you love. Heart Attack • Home • About Heart Attacks ...

  8. [Heart-attack in pregnancy].

    Science.gov (United States)

    Výtisková, T; Suchá, D; Fučíková, Z

    To describe hear-attack on crystal meth addicted pregnant woman. Case report. Acute heart-attack during pregnancy means unexpected obstetric complication. The consequences could be fatal for the mother and the fetus. Although good delivery management and treatment could reduce morbidity and mortality to a minimum.

  9. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  10. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  11. Worldwide variability in deceased organ donation registries.

    Science.gov (United States)

    Rosenblum, Amanda M; Li, Alvin Ho-Ting; Roels, Leo; Stewart, Bryan; Prakash, Versha; Beitel, Janice; Young, Kimberly; Shemie, Sam; Nickerson, Peter; Garg, Amit X

    2012-08-01

    The variability in deceased organ donation registries worldwide has received little attention. We considered all operating registries, where individual wishes about organ donation were recorded in a computerized database. We included registries which recorded an individual's decision to be a donor (donor registry), and registries which only recorded an individual's objection (non-donor registry). We collected information on 15 characteristics including history, design, use and number of registrants for 27 registries (68%). Most registries are nationally operated and government-owned. Registrations in five nations expire and require renewal. Some registries provide the option to make specific organ selections in the donation decision. Just over half of donor registries provide legally binding authorization to donation. In all national donor registries, except one, the proportion of adults (15+) registered is modest (donation decision mandatory to obtain a driver's license. Registered objections in non-donor registries are rare (organ donor registries worldwide necessitates public discourse and quality improvement initiatives, to identify and support leading practices in registry use. © 2012 The Authors. Transplant International © 2012 European Society for Organ Transplantation.

  12. Rationale and design of the health economics evaluation registry for remote follow-up: TARIFF.

    Science.gov (United States)

    Ricci, Renato P; D'Onofrio, Antonio; Padeletti, Luigi; Sagone, Antonio; Vicentini, Alfredo; Vincenti, Antonio; Morichelli, Loredana; Cavallaro, Ciro; Ricciardi, Giuseppe; Lombardi, Leonida; Fusco, Antonio; Rovaris, Giovanni; Silvestri, Paolo; Guidotto, Tiziana; Pollastrelli, Annalisa; Santini, Massimo

    2012-11-01

    The aims of the study are to develop a cost-minimization analysis from the hospital perspective and a cost-effectiveness analysis from the third payer standpoint, based on direct estimates of costs and QOL associated with remote follow-ups, using Merlin@home and Merlin.net, compared with standard ambulatory follow-ups, in the management of ICD and CRT-D recipients. Remote monitoring systems can replace ambulatory follow-ups, sparing human and economic resources, and increasing patient safety. TARIFF is a prospective, controlled, observational study aimed at measuring the direct and indirect costs and quality of life (QOL) of all participants by a 1-year economic evaluation. A detailed set of hospitalized and ambulatory healthcare costs and losses of productivity that could be directly influenced by the different means of follow-ups will be collected. The study consists of two phases, each including 100 patients, to measure the economic resources consumed during the first phase, associated with standard ambulatory follow-ups, vs. the second phase, associated with remote follow-ups. Remote monitoring systems enable caregivers to better ensure patient safety and the healthcare to limit costs. TARIFF will allow defining the economic value of remote ICD follow-ups for Italian hospitals, third payers, and patients. The TARIFF study, based on a cost-minimization analysis, directly comparing remote follow-up with standard ambulatory visits, will validate the cost effectiveness of the Merlin.net technology, and define a proper reimbursement schedule applicable for the Italian healthcare system. NCT01075516.

  13. Danish Hip Arthroscopy Registry (DHAR)

    DEFF Research Database (Denmark)

    Lund, Bent; Mygind-Klavsen, Bjarne; Grønbech Nielsen, Torsten

    2017-01-01

    The Danish Hip Arthroscopy Registry (DHAR) was initiated in January 2012 as a web-based prospective registry. The purpose of this study was to evaluate and report the first registry based outcome data of a national population with radiological and clinical femoroacetabular impingement (FAI......) data from DHAR between January 2012 and November 2015 were extracted. Radiological pincer-type FAI was defined as LCE > 35° and cam FAI as alpha-angle > 55°. These data were combined with FAI surgical data such as osteochondroplasty and labral repair or resection. PROMs consisting of HAGOS, EQ-5 D......, HSAS and NRS pain scores were submitted online by the patients pre-operatively and at 1 and 2-years follow-up. 2054 FAI procedures in 1835 patients were included in this study (219 patients had bilateral procedures performed). HAGOS demonstrated significant improvement in all subscales at follow up. EQ...

  14. Bioethics: A Rationale and a Model

    Science.gov (United States)

    Barman, Charles R.; Rusch, John J.

    1978-01-01

    Discusses the rationale for and development of an undergraduate bioethics course. Based on experiences with the course, general suggestions are offered to instructors planning to add bioethics to existing curricula. (MA)

  15. Rationale for Studying a Second Language.

    Science.gov (United States)

    Ansley, Elizabeth

    2003-01-01

    Discusses the rationale for studying a second or foreign language, including increased contact with different cultures and the demand for bilingual workers in the global marketplace and in the government. (Author/VWL)

  16. Environmental Agents Service (EAS) Registry System of Records

    Data.gov (United States)

    Department of Veterans Affairs — The Environmental Agent Service (EAS) Registries is the information system encompassing the Ionizing Radiation Registry (IRR), the Agent Orange Registry (AOR), and...

  17. New Rationales for Women on Boards

    OpenAIRE

    Choudhury, B.

    2014-01-01

    Should measures promoting women to corporate boards be solely justified in terms of economic arguments? Traditionally, such measures have tended to rely on utilitarian arguments, despite the fact that the most prominent of these arguments—the relationship between women’s presence on boards and firm financial performance—is equivocal. Conversely, this article argues that rationales for increasing women on boards should be based on both equality and economics grounds. An equality rationale is n...

  18. Allergens might trigger migraine attacks.

    Science.gov (United States)

    Bektas, Hesna; Karabulut, Hayriye; Doganay, Beyza; Acar, Baran

    2017-03-01

    Migraine is a common primary headache disorder. The mechanisms underlying the onset of a migraine attack are not completely understood. Environmental changes and a number of other factors could induce migraine attacks. The aim of this study was to investigate the relationship between the frequency of migraine attacks and allergens. Migraine patients without aura, and healthy individuals similar in age and gender without a history of headache and allergy were prospectively included in the study. The duration of migraine, the frequency of migraine attacks, the medication history, and the symptoms during attacks were questioned. Migraine disability assessment score (MIDAS) and visual analog scale (VAS) scores were obtained. Allergen extracts including dust, fungi, insect, animal epithelium, pollens, and food allergens were applied for allergy tests. 49 migraine patients and 49 healthy individuals were enrolled in the study. There was no significant difference in terms of age and gender. The median migraine disease duration, the number of attacks in a month, and the duration of attacks were, respectively, 5.5 years (1-44), 4 (1-10) day/month, and 24 (4-72) h. The mean MIDAS grade was 2.45 ± 0.14 (1-4), and mean VAS score was 7.89 ± 0.27 (4-10). The positivity of allergy tests was 55.1 % (27/49) in the migraine group and 32.7 % (16/49) in the control group (p < 0.05). The allergy tests were positive for house dust, red birch, hazel tree, olive tree, nettle, and wheat. The frequency of migraine attacks was higher in allergy-test-positive patients than in negative ones in the migraine group (p = 0.001). The migraine patients who had frequent attacks should be examined for allergies.

  19. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  20. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  1. Army Fixed-Wing Ground Attack Aircraft: A Historical Precedent and Contemporary Rationale

    Science.gov (United States)

    2015-06-12

    Korea. It was probably the most responsive and finest that I could imagine .” American forces became accustomed to overwhelming airborne fire support......he provides a vivid contrast in how far apart the Army and Air Force were on the subject of tactical air support in Korea. Lastly, the difference

  2. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  3. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... interesting quantitative problems, that can be solved through an encoding into Satisfiability Modulo Theories. The flexibility and effectiveness of the approach is demonstrated on the study of a national-scale authentication system, whose attack tree is computed thanks to a Java implementation...

  4. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  5. Macular Edema - Rationale for Therapy.

    Science.gov (United States)

    Wolfensberger, Thomas J

    2017-01-01

    Macular edema represents the end-stage of multiple pathophysiological pathways in a multitude of ocular vascular, inflammatory, and other diseases. The rationale for clinical treatment of macular edema is based on the understanding and the inhibition of these pathophysiological mechanisms. When macular edema is caused by a generalized health problem such as diabetes, high blood pressure, or generalized inflammatory conditions, treatment of these generalized diseases can in many cases cure macular edema directly. In ocular diseases, the local exudation of fluid from blood vessels is governed by Starling's law as well as by intricate cellular mechanisms linked to the tight junctions in the inner and outer blood-retinal barrier. Drugs used in clinical practice, such as nonsteroidal anti-inflammatory drugs, corticosteroids, carbonic anhydrase inhibitors, and anti-vascular endothelial growth factor agents, all act in one way or another through these cellular mechanisms. Novel treatments such as neuroprotective agents like nerve growth factors, somatostatins and antiapoptotic agents like calpain, the glutamate blocker memantine, and different caspase inhibitors may in the future inhibit neuronal cell death in the retina by separate pathways. Using dimmed nocturnal illumination may be an additional novel method to reduce hypoxic stress during dark adaptation of the rod photoreceptors in diabetes. Successful surgical treatment of macular edema using vitrectomy and peeling relies, apart from the evident release of vitreomacular traction, on many other cellular and biochemical mechanisms activated by the surgery such as oxygenation of the inner retina, removal of the posterior hyaloid as a growth factor sink, and possible Müller cell remodeling with fluid redirection after internal limiting membrane peeling. © 2017 S. Karger AG, Basel.

  6. Some legal challenges posed by remote attack

    National Research Council Canada - National Science Library

    William Boothby

    2012-01-01

      Abstract Attacking from a distance is nothing new, but with the advent of certain new technologies, attacks can be undertaken in which the attacker remains very remote from the scene where force will be employed...

  7. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available and is only able to cater for social engineering attacks that use bidirectional communication. Previous research discovered that social engineering attacks can be classified into three different categories, namely attacks that utilise bidirectional...

  8. The Danish Shoulder Arthroplasty Registry

    DEFF Research Database (Denmark)

    Rasmussen, Jeppe; Jakobsen, John; Brorson, Stig

    2012-01-01

    (70% women) were reported to the registry between January 2006 and December 2008. Mean age at surgery was 69 years (SD 12). The most common indications were a displaced proximal humeral fracture (54%) or osteoarthritis (30%). 61% were stemmed hemiarthroplasties, 28% resurfacing hemiarthroplasties, 8...

  9. The Danish Heart Failure Registry

    DEFF Research Database (Denmark)

    Schjødt, Inge; Nakano, Anne; Egstrup, Kenneth

    2016-01-01

    AIM OF DATABASE: The aim of the Danish Heart Failure Registry (DHFR) is to monitor and improve the care of patients with incident heart failure (HF) in Denmark. STUDY POPULATION: The DHFR includes inpatients and outpatients (≥18 years) with incident HF. Reporting to the DHFR is mandatory for the ...

  10. The danish multiple sclerosis registry

    DEFF Research Database (Denmark)

    Brønnum-Hansen, Henrik; Koch-Henriksen, Nils; Stenager, Egon

    2011-01-01

    Introduction: The Danish Multiple Sclerosis (MS) Registry was established in 1956. Content: The register comprises data on all Danes who had MS in 1949 or who have been diagnosed since. Data on new cases and updated information on persons with an MS diagnosis already notified are continuously...

  11. Breast and Colon Cancer Family Registries

    Science.gov (United States)

    The Breast Cancer Family Registry and the Colon Cancer Family Registry were established by the National Cancer Institute as a resource for investigators to use in conducting studies on the genetics and molecular epidemiology of breast and colon cancer.

  12. The Danish Vascular Registry, Karbase

    Directory of Open Access Journals (Sweden)

    Eldrup N

    2016-10-01

    Full Text Available Nikolaj Eldrup,1,2 Charlotte Cerqueira,3 Louise de la Motte,2,4 Lisbet Knudsen Rathenborg,2,4 Allan K Hansen2,5 1Department of Cardiothoracic and Vascular Surgery, Aarhus University Hospital, 2Karbase, The Danish Vascular Registry, Aarhus, 3Registry Support Centre (East – Epidemiology and Biostatistics, Research Centre for Prevention and Health, Capital Region of Denmark, 4Department of Vascular Surgery, Rigshospitalet, Copenhagen University Hospital, Copenhagen, 5Department of Vascular Surgery, Aalborg University Hospital, Aalborg, Denmark Aim: The Danish Vascular Registry (DVR, Karbase, is monitoring arterial and advanced vein interventions conducted at all vascular departments in Denmark. The main aim of the DVR is to improve the quality of treatment for patients undergoing vascular surgery in Denmark by using the registry for quality assessment and research. Study population: All patients undergoing vascular interventions (surgical and endovascular at any vascular department in Denmark are registered in the DVR. The DVR was initiated in 1989, and each year, ~9,000 procedures are added. By January 2016, .180,000 procedures have been recorded. Since 2001, data completeness has been .90% (compared to the Danish National Patient Register. Main variables: Variables include information on descriptive patient data (ie, age, sex, height, and weight and comorbidity (ie, previous cardiovascular disease and diabetes. Process variable includes waiting time (time from event to medical contact and treatment and the type of procedures conducted. Outcome variables for in-hospital complications (ie, wound complications, myocardial infarction, stroke, amputation, respiratory complications, and renal insufficiency and 30-day patency are submitted. Variables for medical treatment (antithrombotic and statin treatment, amputation, and survival are extracted from nationwide, administrative registers. Conclusion: The DVR reports outcome on key indicators for

  13. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  14. What Causes a Heart Attack?

    Science.gov (United States)

    ... heart attack at age 36, it stopped her "dead in her tracks." Jennifer reminds us how heart disease takes too many of our moms, sisters, and friends from us every day. The more we share our stories, the faster ...

  15. What Is a Heart Attack?

    Science.gov (United States)

    ... blood pressure and excess protein in the urine. Preeclampsia is linked to an increased lifetime risk of heart disease, including CHD, heart attack, heart failure , and high blood pressure. Screening and Prevention Lowering your risk factors for coronary heart disease ...

  16. CAS, interdiction, and attack helicopters

    OpenAIRE

    Groenke, Andrew S.

    2005-01-01

    Within days of a major failed strike by attack helicopters during Operation Iraqi Freedom (OIF) analysts were questioning the value of such platforms on the modern battlefield. As OIF moved from combat to stability operations, helicopter losses from enemy action actually increased seemingly strengthening the argument of those who see the helicopter as unsuitable to some combat operations. Attack helicopter operations have diverged into two distinct categories, interdiction and close air sup...

  17. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  18. Clinical registries: governance, management, analysis and applications.

    Science.gov (United States)

    Hickey, Graeme L; Grant, Stuart W; Cosgriff, Rebecca; Dimarakis, Ioannis; Pagano, Domenico; Kappetein, Arie P; Bridgewater, Ben

    2013-10-01

    Clinical registries will have an increasingly important role to play in health-care, with a number already established in cardiac surgery. This review covers the fundamentals of establishing and managing clinical registries, including legal and ethical frameworks along with intellectual property attribution. Also discussed are important issues relating to the processing of data, data extraction and conducting analyses using registry data.

  19. 46 CFR 67.17 - Registry endorsement.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Registry endorsement. 67.17 Section 67.17 Shipping COAST... DOCUMENTATION OF VESSELS Forms of Documentation; Endorsements; Eligibility of Vessel § 67.17 Registry endorsement. (a) A registry endorsement entitles a vessel to employment in the foreign trade; trade with Guam...

  20. The Danish Lung Cancer Registry

    DEFF Research Database (Denmark)

    Jakobsen, Erik; Rasmussen, Torben Riis

    2016-01-01

    AIM OF DATABASE: The Danish Lung Cancer Registry (DLCR) was established by the Danish Lung Cancer Group. The primary and first goal of the DLCR was to improve survival and the overall clinical management of Danish lung cancer patients. STUDY POPULATION: All Danish primary lung cancer patients since...... 2000 are included into the registry and the database today contains information on more than 50,000 cases of lung cancer. MAIN VARIABLES: The database contains information on patient characteristics such as age, sex, diagnostic procedures, histology, tumor stage, lung function, performance...... the results are commented for local, regional, and national audits. Indicator results are supported by descriptive reports with details on diagnostics and treatment. CONCLUSION: DLCR has since its creation been used to improve the quality of treatment of lung cancer in Denmark and it is increasingly used...

  1. The Danish Vascular Registry, Karbase

    DEFF Research Database (Denmark)

    Eldrup, Nikolaj; Cerqueira, Charlotte; de la Motte, Louise

    2016-01-01

    AIM: The Danish Vascular Registry (DVR), Karbase, is monitoring arterial and advanced vein interventions conducted at all vascular departments in Denmark. The main aim of the DVR is to improve the quality of treatment for patients undergoing vascular surgery in Denmark by using the registry...... for quality assessment and research. STUDY POPULATION: All patients undergoing vascular interventions (surgical and endovascular) at any vascular department in Denmark are registered in the DVR. The DVR was initiated in 1989, and each year, ∼9,000 procedures are added. By January 2016, >180,000 procedures...... have been recorded. Since 2001, data completeness has been >90% (compared to the Danish National Patient Register). MAIN VARIABLES: Variables include information on descriptive patient data (ie, age, sex, height, and weight) and comorbidity (ie, previous cardiovascular disease and diabetes). Process...

  2. Rare disease registries: a call to action.

    Science.gov (United States)

    Lacaze, Paul; Millis, Nicole; Fookes, Megan; Zurynski, Yvonne; Jaffe, Adam; Bellgard, Matthew; Winship, Ingrid; McNeil, John; Bittles, Alan H

    2017-09-01

    When registries collect accurate clinical data over time, they can act as fundamental support structures for patients and their families and powerful cost-effective instruments to support clinical trials and translational research to improve quality of care, quality of life and survival. Registries are critical for rare diseases (RD) with low prevalence and propensity for variation in treatment and outcomes. Rare Voices Australia is leading a call for action to the research and clinical community to prioritise RD data collection and develop an integrated RD Registry strategy for Australia. Financial, operational and governance challenges exist for establishing and maintaining RD registries. As a multidisciplinary team whose interests converge on RD, we highlight the need for the establishment of an Australian RD Registry Alliance. This 'umbrella' organisation will: (i) bring together existing RD registries across Australia; (ii) establish National RD Registry Standards to support interoperability and cohesion across registries; (iii) develop strategies to attract sustainable funding from government and other sources to maximise the utility of existing RD registries and support the development of new RD registries. The most important role for the Alliance would be to use the RD registries for translational research to address current knowledge gaps about RD and to improve the care for the over 1.4 million Australians estimated to live with RD. © 2017 Royal Australasian College of Physicians.

  3. Optimizing Outcomes with Clinical Data Registries.

    Science.gov (United States)

    Ishii, Lisa

    2016-12-01

    Clinical data registries are platforms to extract, store, analyze, and disseminate large amounts of clinical data. The type of data contained in clinical data registries varies by the registry, and may include patient demographics, clinical examination findings, imaging and laboratory results, procedures performed, and patient-reported outcomes. When large numbers of participants submit data to a clinical data registry the data can then be analyzed in aggregate to answer new clinical questions. Analyses on the data may be performed to show outcomes over time, compare procedures, evaluate care patterns, among others. With the launch of an otolaryngology-specific clinical data registry, Regent, facial plastic and reconstructive surgeons have the opportunity to participate in a clinical data registry for the first time. Through broad participation in the registry, the specialty has a chance to optimize patient outcomes in a manner never before possible. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  4. Registries in European post-marketing surveillance

    DEFF Research Database (Denmark)

    Bouvy, Jacoline C; Blake, Kevin; Slattery, Jim

    2017-01-01

    in the post-marketing setting. Methodological challenges met in conducting this study highlighted the need for a clarification of definitions and epidemiological concepts around patient registries. The results will inform the EMA Patient Registry initiative to support use of existing patient registries......PURPOSE: Regulatory agencies and other stakeholders increasingly rely on data collected through registries to support their decision-making. Data from registries are a cornerstone of post-marketing surveillance for monitoring the use of medicines in clinical practice. This study was aimed...... for a registry was made as a condition of the marketing authorisation. All centrally authorised products that received a positive opinion of the EMA Committee for Medicinal Products for Human Use between 1 January 2005 and 31 December 2013 were included. Data regarding registry design and experiences were...

  5. [QUASA-the apheresis registry].

    Science.gov (United States)

    Dräger, J; Petzold, S; Ristau, H; Trepte, S

    2003-01-01

    Quality saving measures are required at the execution of extracorporeal LDL apheresis therapy (LDL apheresis) by the NUB guidelines of the national committee of physicians and health insurance. The saving measures apply to specialist, organizational and apparatical conditions for execution and accounting of treatment methods. Furthermore, as a result of the lawful requirements of SGB V, complementary BUB guidelines were introduced in 1999. These ought to engage the therapeutic benefit of a LDL apheresis treatment. Beyond measures for quality assurance at execution a documentation of treatment is explicitly demanded. For two years now the non-profit Quasa gGmbH has been developed the quality assurance registry for LDL apheresis with the background of those requirements. Since March 2003 the apheresis physicians can voluntarily take part in the registry initiative by internet. Beside the clinical patient's medical history, treatment relevant data are recorded. Because of the analysis of the nationally ascertained clinical data, for the first time it will be possible for the medical profession to fulfill the guidelines of quality assurance for LDL apheresis. Moreover the treating apheresis physicians can establish an EDV-based individual patient documentation. All necessary measures of data protection and data security are in process on the technical and logistic realization of this registry initiative. An epidemiological data evaluation is regularly accomplished and the results are provided to the public.

  6. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this paper. The objective of this ontology...

  7. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  8. Time-dependent analysis of attacks

    NARCIS (Netherlands)

    Arnold, Florian; Hermanns, H.; Pulungan, Reza; Stoelinga, Mariëlle Ida Antoinette

    The success of a security attack crucially depends on time: the more time available to the attacker, the higher the probability of a successful attack; when given enough time, any system can be compromised. Insight in time-dependent behaviors of attacks and the evolution of the attacker’s success as

  9. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  10. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang; Cui, Shuguang

    2014-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to evaluate how a complex network responds to random and possibly correlated attacks.

  11. Global trauma registry mapping: a scoping review.

    Science.gov (United States)

    O'Reilly, Gerard M; Cameron, Peter A; Joshipura, Manjul

    2012-07-01

    The burden of injury is very high in developing countries. Trauma systems reduce mortality; the trauma registry is a key driver of improvements in trauma care. Developing countries have begun to develop trauma systems but the level of local trauma registry activity is unclear. The aim of this study was to determine a global estimate of trauma registry activity. A structured review of the literature was performed. All abstracts referring to a trauma registry over a two-year period were included. For the trauma registry described in each abstract, the source country was recorded. An additional search of web pages posted over a one year period was conducted. Those linked to an active trauma registry website were included and the country of the trauma registry was recorded. A selection of trauma registries from countries of different levels of development were identified and compared. 571 abstracts were included in the review. Most articles utilised "general" trauma registries (436(76%)) and were based at a single hospital (279(49%)). Other registries were limited to military or paediatric populations (36(6%) and 35(6%) articles respectively). Most articles sourced registries from the US (288(50%)), followed by Australia (45(8%)), Germany (32(6%)), Canada (27(5%)), UK (13(2%)), China (13(2%)) and Israel (12(2%)). The Americas produced most trauma registry articles and South East Asia the least. The majority of trauma registry articles originated from very highly developed countries 467(82%). Least developed countries had the fewest (5(1%)). The additional search yielded 37 web pages linked to 27 different trauma registry websites. Most of these were based in the US (16(59%)). The basic features of trauma registries, such as inclusion criteria, number and type of variables and injury severity scoring, varied widely depending on the country's level of development. This review, using a combination of the number of trauma registry articles and web pages to locate active

  12. A compositional approach to modelling design rationale

    NARCIS (Netherlands)

    Brazier, F.M.; van Langen, P.H.G.; Treur, J.

    1997-01-01

    Design support systems need to be developed on the basis of an understanding of the human design process, in order to be useful during design. The explicit representation of design history and rationale are of particular importance for explanation and re-use. Within the DESIRE framework for

  13. Rationales for the Lightning Launch Commit Criteria

    Science.gov (United States)

    Willett, John C. (Editor); Merceret, Francis J. (Editor); Krider, E. Philip; O'Brien, T. Paul; Dye, James E.; Walterscheid, Richard L.; Stolzenburg, Maribeth; Cummins, Kenneth; Christian, Hugh J.; Madura, John T.

    2016-01-01

    Since natural and triggered lightning are demonstrated hazards to launch vehicles, payloads, and spacecraft, NASA and the Department of Defense (DoD) follow the Lightning Launch Commit Criteria (LLCC) for launches from Federal Ranges. The LLCC were developed to prevent future instances of a rocket intercepting natural lightning or triggering a lightning flash during launch from a Federal Range. NASA and DoD utilize the Lightning Advisory Panel (LAP) to establish and develop robust rationale from which the criteria originate. The rationale document also contains appendices that provide additional scientific background, including detailed descriptions of the theory and observations behind the rationales. The LLCC in whole or part are used across the globe due to the rigor of the documented criteria and associated rationale. The Federal Aviation Administration (FAA) adopted the LLCC in 2006 for commercial space transportation and the criteria were codified in the FAA's Code of Federal Regulations (CFR) for Safety of an Expendable Launch Vehicle (Appendix G to 14 CFR Part 417, (G417)) and renamed Lightning Flight Commit Criteria in G417.

  14. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  15. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst 24...

  16. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  17. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...

  18. The Danish Heart Failure Registry

    DEFF Research Database (Denmark)

    Schjødt, Inge; Nakano, Anne; Egstrup, Kenneth

    2016-01-01

    AIM OF DATABASE: The aim of the Danish Heart Failure Registry (DHFR) is to monitor and improve the care of patients with incident heart failure (HF) in Denmark. STUDY POPULATION: The DHFR includes inpatients and outpatients (≥18 years) with incident HF. Reporting to the DHFR is mandatory......: The main variables recorded in the DHFR are related to the indicators for quality of care in patients with incident HF: performance of echocardiography, functional capacity (New York Heart Association functional classification), pharmacological therapy (angiotensin converting enzyme/angiotensin II...

  19. Attributing heart attack and stroke to "Old Age": Implications for subsequent health outcomes among older adults.

    Science.gov (United States)

    Stewart, Tara L; Chipperfield, Judith G; Perry, Raymond P; Hamm, Jeremy M

    2016-01-01

    This study assessed the extent to which older adults attribute a recent heart attack/stroke to "old age," and examined consequences for subsequent lifestyle behavior and health-care service utilization. Community-dwelling adults (N = 57, ages 73-98 years) were interviewed about their heart attack/stroke, and an objective health registry provided data on health-care utilization over a 3-year period. Endorsement of "old age" as a cause of heart attack/stroke negatively predicted lifestyle behavior change, and positively predicted frequency of physician visits and likelihood of hospitalization over the subsequent 3 years. Findings suggest the importance of considering "old age" attributions in the context of cardiovascular health events. © The Author(s) 2014.

  20. Trojan Horse Attacking Strategy on Quantum Cryptography

    Science.gov (United States)

    Zeng, Guihua

    2003-08-01

    Trojan horse attacking strategy on quantum cryptography is investigated, three aspects are involved. First, the mechanism for the Trojan horse attacking strategy on quantum cryptography as well as classic cryptography is studied. Then the fragility of the quantum cryptographic algorithm employing EPR pairs as key against the Trojan horse attacking strategy is analyzed. To prevent the Trojan horse attacking strategy, an improvement scheme which makes use of non-orthogonal entangled states is proposed, results show the improvement scheme is robust to the Trojan horse attacking strategy without reducing the security on other kinds of attacking strategies.

  1. School Choice and Educational Opportunity: Rationales, Outcomes and Racial Disparities

    Science.gov (United States)

    Ben-Porath, Sigal

    2012-01-01

    This article examines the rationales for school choice, and the significance of choice mechanisms for racial disparities in educational opportunities and outcomes. It identifies tensions between liberty-based rationales and equality-based rationales, and surveys research findings on the outcomes of school choice policies, especially with regard to…

  2. The Danish Vascular Registry, Karbase

    Science.gov (United States)

    Eldrup, Nikolaj; Cerqueira, Charlotte; de la Motte, Louise; Rathenborg, Lisbet Knudsen; Hansen, Allan K

    2016-01-01

    Aim The Danish Vascular Registry (DVR), Karbase, is monitoring arterial and advanced vein interventions conducted at all vascular departments in Denmark. The main aim of the DVR is to improve the quality of treatment for patients undergoing vascular surgery in Denmark by using the registry for quality assessment and research. Study population All patients undergoing vascular interventions (surgical and endovascular) at any vascular department in Denmark are registered in the DVR. The DVR was initiated in 1989, and each year, ∼9,000 procedures are added. By January 2016, >180,000 procedures have been recorded. Since 2001, data completeness has been >90% (compared to the Danish National Patient Register). Main variables Variables include information on descriptive patient data (ie, age, sex, height, and weight) and comorbidity (ie, previous cardiovascular disease and diabetes). Process variable includes waiting time (time from event to medical contact and treatment) and the type of procedures conducted. Outcome variables for in-hospital complications (ie, wound complications, myocardial infarction, stroke, amputation, respiratory complications, and renal insufficiency) and 30-day patency are submitted. Variables for medical treatment (antithrombotic and statin treatment), amputation, and survival are extracted from nationwide, administrative registers. Conclusion The DVR reports outcome on key indicators for monitoring the quality at all vascular departments in Denmark for the purpose of quality improvement. Furthermore, data are available for research and are being used in international collaborations on changes in clinical practices. PMID:27822118

  3. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    by distributing a large amount of private goods to the selectorate—the cronies—can be termed kleptocracies . Many govern- ments do indeed resemble...where the high-private goods kleptocracy is a good model. Furthermore, while not an example of crony attack to affect policy change (as opposed to...information about those nearest to the leader. The relationships part is only the start. Kleptocracies , like orga- nized crime leaders, are clever

  4. Private provider participation in statewide immunization registries

    Directory of Open Access Journals (Sweden)

    Cowan Anne E

    2006-02-01

    Full Text Available Abstract Background Population-based registries have been promoted as an effective method to improve childhood immunization rates, yet rates of registry participation in the private sector are low. We sought to describe, through a national overview, the perspectives of childhood immunization providers in private practice regarding factors associated with participation or non-participation in immunization registries. Methods Two mailed surveys, one for 264 private practices identified as registry non-participants and the other for 971 identified as registry participants, from 15 of the 31 states with population-based statewide immunization registries. Frequency distributions were calculated separately for non-participants and participants regarding the physician-reported factors that influenced decisions related to registry participation. Pearson chi-square tests of independence were used to assess associations among categorical variables. Results Overall response rate was 62% (N = 756. Among non-participants, easy access to records of vaccines provided at other sites (N = 101, 68% and printable immunization records (N = 82, 55% were most often cited as "very important" potential benefits of a registry, while the most commonly cited barriers to participation were too much cost/staff time (N = 36, 38% and that the practice has its own system for recording and monitoring immunizations (N = 35, 37%. Among registry participants, most reported using the registry to input data on vaccines administered (N = 326, 87% and to review immunization records of individual patients (N = 302, 81%. A minority reported using it to assess their practice's immunization coverage (N = 110, 29% or generate reminder/recall notices (N = 54, 14%. Few participants reported experiencing "significant" problems with the registry; the most often cited was cost/staff time to use the registry (N = 71, 20%. Conclusion Most registry participants report active participation with few

  5. Timing Is Everything with Heart Attacks

    Science.gov (United States)

    ... and certain time periods. The study was published online recently in the American Heart Journal . Previous research has suggested that highly stressful events, such as earthquakes and World Cup soccer games, may trigger heart attacks. Stress-related heart attacks ...

  6. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  7. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... help prevent your first heart attack. Heart-Healthy Lifestyle Changes A heart-healthy lifestyle can help prevent ... to flow to the heart muscle. Heart-Healthy Lifestyle Changes Treatment for a heart attack usually includes ...

  8. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  9. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  10. Southern Saskatchewan Ticagrelor Registry experience

    Directory of Open Access Journals (Sweden)

    Dehghani P

    2014-10-01

    Full Text Available Payam Dehghani,1 Varun Chopra,1 Ali Bell,2 Sheila Kelly,1 Lori Zulyniak,2 Jeff Booker,1 Rodney Zimmermann,1 William Semchuk,2 Asim N Cheema,3 Andrea J Lavoie1 1Prairie Vascular Research Network, University of Saskatchewan, Regina, SK, 2Regina Qu’Appelle Health Region, Regina, SK, 3St Michael’s Hospital, University of Toronto, Toronto, ON, Canada Background: As ticagrelor enters into clinical use for acute coronary syndrome, it is ­important to understand patient/physician behavior in terms of appropriate use, adherence, and event rates. Methods: The Saskatchewan Registry is a prospective, observational, multicenter cohort study that identifies consecutive patients started on ticagrelor. We aimed to evaluate both on- and off-label use, identify characteristics of patients who prematurely stop ticagrelor, and describe patient/physician behavior contributing to inappropriate stoppage of this medication. Results: From April 2012 to September 2013, 227 patients were initiated on ticagrelor, with a mean age of 62.2±12.1 years. The participants were 66% men and had a mean follow up of 157.4±111.7 days. Seventy-four patients (32.4% had off-label indications. Forty-seven patients (20.7% prematurely stopped ticagrelor and were more likely to be older, women, nonwhite, present with shock, and complain of dyspnea. Twenty-six of the 47 patients stopped ticagrelor inappropriately because of patient nonadherence (18 patients and physician advice (eight patients. A composite outcome event of death from vascular causes, myocardial infarction, or stroke occurred in 8.8% of the entire cohort and was more likely to occur in those older then 65 years, those presenting with cardiogenic shock, and those who prematurely stopped ticagrelor. Conclusion: In this real-world registry of patients started on ticagrelor, a third have off-label indications and a fifth prematurely stop the medication. Premature discontinuation was an independent predictor of major

  11. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission.

  12. Network Attack Reference Data Set

    Science.gov (United States)

    2004-12-01

    fingerprinting tools include QueSO [10] (literally translates to “what OS”) and nmap [11], however there are a number of additional tools available for...Network Attack Reference Data Set J. McKenna and J. Treurniet Defence R&D Canada √ Ottawa TECHNICAL...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources

  13. Joint Direct Attack Munition (JDAM)

    Science.gov (United States)

    2015-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-503 Joint Direct Attack Munition (JDAM) As of FY 2017 President’s Budget Defense Acquisition...Mission and Description 6 Executive Summary 7 Threshold Breaches 8 Schedule 9 Performance 12 Track to Budget 14 Cost and Funding...15 Low Rate Initial Production 26 Foreign Military Sales 27 Nuclear Costs 29 Unit Cost 30 Cost Variance 33 Contracts 36

  14. Dual Stage SQL Injection Attacks

    OpenAIRE

    Eve, Martin Paul

    2009-01-01

    I came across quite an interesting SQL Injection scenario today. The software in which the vulnerability resides will remain anonymous until fixed, but an abstracted version of the scenario can safely be outlined below.\\ud \\ud The objective of the software is to restrict user accounts to certain IP addresses when accessing a bulletin board. This shows how this can be bypassed using a dual-stage SQL injection attack.

  15. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin, S.; Faizal, M. A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  16. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ). ?Spear Phishing? refers to targeted social engineering-type email attacks (Jagatic, 2007). ?Physical? refers to manual methods to gain access, for example physically removing the hard drive or breaking the access door to enter a secure server room... the size and utility of the target. The "Target" class is the physical device or entity targeted by an attack. The "Vulnerability" class describes a target vulnerability used by the attacker. The "Phase" class represents an attack model that subdivides...

  17. Terror attacks influence driving behavior in Israel

    Science.gov (United States)

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  18. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  19. Distance hijacking attacks on distance bounding protocols

    OpenAIRE

    Cremers, Cas; Rasmussen, Kasper Bonne; Čapkun, Srdjan

    2011-01-01

    Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define a fourth main type of attacks on distance bounding protocols, called Distance Hijacking attacks. We show that many proposed distance bounding protocols are vulnerable to these attacks, and we propose solutions to make these protocols resilient to Distance Hijacking. Additionally, we generalize Distance Hijacking to Location Hijacking, to which ...

  20. Service registry design: an information service approach

    NARCIS (Netherlands)

    Ferreira Pires, Luis; Wang, J.; van Oostrum, Arjen; Wijnhoven, Alphonsus B.J.M.

    2010-01-01

    A service registry is a Service-Oriented Architecture (SOA) component that keeps a ‘catalogue’ of available services. It stores service specifications so that these specifications can be found by potential users. Discussions on the design of service registries currently focus on technical issues,

  1. The Danish National Chronic Lymphocytic Leukemia Registry

    DEFF Research Database (Denmark)

    da Cunha-Bang, Caspar; Geisler, Christian Hartmann; Enggaard, Lisbeth

    2016-01-01

    AIM: In 2008, the Danish National Chronic Lymphocytic Leukemia Registry was founded within the Danish National Hematology Database. The primary aim of the registry is to assure quality of diagnosis and care of patients with chronic lymphocytic leukemia (CLL) in Denmark. Secondarily, to evaluate...

  2. 50 CFR 600.1410 - Registry process.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Registry process. 600.1410 Section 600.1410 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC... United States § 600.1410 Registry process. (a) A person may register through the NMFS web site at www...

  3. 27 CFR 24.115 - Registry number.

    Science.gov (United States)

    2010-04-01

    ... be shown where required on labels and markings of containers or cases filled at the wine premises... OF THE TREASURY LIQUORS WINE Establishment and Operations Application § 24.115 Registry number. Upon..., bonded wine cellar, or taxpaid wine bottling house. The registry number will be used in all...

  4. Space Data Network: Concept and rationale

    Science.gov (United States)

    Schulz, Klaus-Juergen

    1991-10-01

    An introduction to the concept and rationale of the Space Data Network (SDN) is given. SDN is a conceptual network, which extends from ground via relay satellites to spacecraft. Due to the heterogeneity of the employed network technologies and the needs of spacecraft operation, it provides a serious technological challenge in the fields of interconnection of transmission systems, networks and service management, and uplink data control.

  5. Early childhood intervention : rationale, timing, and efficacy

    OpenAIRE

    Orla Doyle; Richard E. Tremblay; Colm Harmon; James J. Heckman

    2007-01-01

    This paper provides a brief review of the economic rationale for investing in early childhood. It discusses the optimal timing of intervention, with reference to recent work in developmental neuroscience, and asks how early is early? It motivates the need for early intervention by providing an overview of the impact of adverse factors during the antenatal and early childhood period on outcomes later in life. Early childhood interventions, even poorly designed ones, are costly to implement,...

  6. A rationale for intra-party democracy

    OpenAIRE

    Zudenkova, Galina

    2012-01-01

    This paper provides a rationale for intra-party democracy within a political agency model with moral hazard. The focus is on the party's internal procedures for policy determination. I show that democratizing those procedures benefits the party leadership, which seeks to maximize joint reelection chances of the party's incumbents. The reason is that under intra-party democracy, the voters adopt less demanding reappointment rules and reelect the party's incumbents more often than under leaders...

  7. The Danish adult diabetes registry

    DEFF Research Database (Denmark)

    Jørgensen, Marit Eika; Kristensen, Jette K.; Husted, Gitte Reventlov

    2016-01-01

    Aim of the database: The aim of the Danish Adult Diabetes Registry (DADR) is to provide data from both the primary health care sector (general practice [GP]) and the secondary sector (specialized outpatient clinics) to assess the quality of treatment given to patients with diabetes. The indicators...... represent process and outcome indicators selected from the literature. Study population: The total diabetes population in Denmark is estimated to be ∼300,000 adult diabetes patients. Approximately 10% have type 1 diabetes, which is managed mainly in the secondary sector, and 90% have type 2 diabetes......, glucose-, blood pressure-, and lipid-lowering treatment (yes/no), insulin pump treatment (yes/ no), and date of last eye and foot examination. Descriptive data: In 2014, the annual report included data regarding over 38,000 patients from outpatient clinics, which is assumed to have included almost all...

  8. The Danish Heart Failure Registry

    DEFF Research Database (Denmark)

    Schjødt, Inge; Nakano, Anne; Egstrup, Kenneth

    2016-01-01

    AIM OF DATABASE: The aim of the Danish Heart Failure Registry (DHFR) is to monitor and improve the care of patients with incident heart failure (HF) in Denmark. STUDY POPULATION: The DHFR includes inpatients and outpatients (≥18 years) with incident HF. Reporting to the DHFR is mandatory......: The main variables recorded in the DHFR are related to the indicators for quality of care in patients with incident HF: performance of echocardiography, functional capacity (New York Heart Association functional classification), pharmacological therapy (angiotensin converting enzyme/angiotensin II...... antagonist inhibitors, beta-blockers, and mineralocorticoid receptor antagonist), nonpharmacological therapy (physical training, patient education), 4-week readmission rate, and 1-year mortality. Furthermore, basic patient characteristics and prognostic factors (eg, smoking and alcohol) are recorded...

  9. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  10. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  11. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  12. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  13. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like personal... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612...

  14. Windows registry forensics advanced digital forensic analysis of the Windows registry

    CERN Document Server

    Carvey, Harlan

    2011-01-01

    Harlan Carvey brings readers an advanced book on Windows Registry - the most difficult part of Windows to analyze in forensics! Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. This book also has a DVD containing tools, instructions and videos.

  15. On Domain Registries and Website Content

    DEFF Research Database (Denmark)

    Schwemer, Sebastian Felix

    2018-01-01

    The link of lawful domain names to unlawful content is a phenomenon that until recently has not been very topical. Traditionally, domain registries have been off the radar of content-related debates. Enforcement efforts, public discourse and academic research have focused on other intermediaries...... such as Internet access service providers, hosting platforms, and websites that link to content. This article shows that in recent years, however, that the (secondary) liability of domain registries and registrars, and more specifically country code top-level domain registries (ccTLDs) for website content, has...... been tested in several EU Member States. The article investigates tendencies in the national lower-court jurisprudence and explores to what extent the liability exemption regime of the E-Commerce Directive applies to domain registries. The analysis concludes that whereas domain registries fall under...

  16. IVOA Registry Interfaces Version 1.0

    Science.gov (United States)

    Benson, Kevin; Plante, Ray; Auden, Elizabeth; Graham, Matthew; Greene, Gretchen; Hill, Martin; Linde, Tony; Morris, Dave; O`Mullane, Wil; Rixon, Guy; Stébé, Aurélien; Andrews, Kona; Benson, Kevin; Plante, Ray

    2009-11-01

    Registries provide a mechanism with which VO applications can discover and select resources--e.g. data and services--that are relevant for a particular scientific problem. This specification defines the interfaces that support interactions between applications and registries as well as between the registries themselves. It is based on a general, distributed model composed of so-called searchable and publishing registries. The specification has two main components: an interface for searching and an interface for harvesting. All interfaces are defined by a standard Web Service Description Language (WSDL) document; however, harvesting is also supported through the existing Open Archives Initiative Protocol for Metadata Harvesting, defined as an HTTP REST interface. Finally, this specification details the metadata used to describe registries themselves as resources using an extension of the VOResource metadata schema.

  17. Central registry in psychiatry: A structured review

    Directory of Open Access Journals (Sweden)

    Jyoti Prakash

    2014-01-01

    Full Text Available Background: Central registry in psychiatry is being practiced in few countries and has been found useful in research and clinical management. Role of central registry has also expanded over the years. Materials and Methods: All accessible internet database Medline, Scopus, Embase were accessed from 1990 till date. Available data were systematically reviewed in structured manner and analyzed. Results: Central registry was found useful in epidemiological analysis, association studies, outcome studies, comorbidity studies, forensic issue, effective of medication, qualitative analysis etc., Conclusion: Central registry proves to be effective tool in quantitative and qualitative understanding of psychiatry practice. Findings of studies from central registry can be useful in modifying best practice and evidence based treatment in psychiatry.

  18. The Danish National Chronic Lymphocytic Leukemia Registry.

    Science.gov (United States)

    da Cunha-Bang, Caspar; Geisler, Christian Hartmann; Enggaard, Lisbeth; Poulsen, Christian Bjørn; de Nully Brown, Peter; Frederiksen, Henrik; Bergmann, Olav Jonas; Pulczynski, Elisa Jacobsen; Pedersen, Robert Schou; Nielsen, Linda Højberg; Christiansen, Ilse; Niemann, Carsten Utoft

    2016-01-01

    In 2008, the Danish National Chronic Lymphocytic Leukemia Registry was founded within the Danish National Hematology Database. The primary aim of the registry is to assure quality of diagnosis and care of patients with chronic lymphocytic leukemia (CLL) in Denmark. Secondarily, to evaluate adherence to national guidelines and to provide source data for research purposes. All patients diagnosed with CLL in Denmark from 2008 onward are included in the registry. Patients are followed in one of nine hematology centers. All centers participate in the registry and are all obliged to collect data. Predefined data are collected at the time of diagnosis, and follow-up at the time of significant events: treatment, progression, transplantation, and death. Parameters included in the International Workshop on Chronic Lymphocytic Leukaemia criteria for diagnosis, and for decision on treatment initiation as well as characteristics included in the CLL International Prognostic Index are collected. To ensure full coverage of Danish CLL patients in the registry, both continuous queries in case of missing data, and cross-referencing with the Danish National Patient Registry are performed. Data from the registry are published in an annual report summarizing the collected data, the overall survival for yearly cohorts, and the degree of data coverage. Per year approximately 450 new patients with CLL are registered in the registry, cumulative as of July 1, 2015, 3,082 patients have been registered. The Danish National CLL Registry is based within the Danish National Hematology Database. The registry covers a cohort of all patients diagnosed with CLL in Denmark since 2008. It forms the basis for quality assessment of CLL treatment in Denmark and offers a unique opportunity for population-based research.

  19. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  20. Who's minding the shop? The role of Canadian research ethics boards in the creation and uses of registries and biobanks

    Directory of Open Access Journals (Sweden)

    Schwartz Lisa

    2008-11-01

    Full Text Available Abstract Background The amount of research utilizing health information has increased dramatically over the last ten years. Many institutions have extensive biobank holdings collected over a number of years for clinical and teaching purposes, but are uncertain as to the proper circumstances in which to permit research uses of these samples. Research Ethics Boards (REBs in Canada and elsewhere in the world are grappling with these issues, but lack clear guidance regarding their role in the creation of and access to registries and biobanks. Methods Chairs of 34 REBS and/or REB Administrators affiliated with Faculties of Medicine in Canadian universities were interviewed. Interviews consisted of structured questions dealing with diabetes-related scenarios, with open-ended responses and probing for rationales. The two scenarios involved the development of a diabetes registry using clinical encounter data across several physicians' practices, and the addition of biological samples to the registry to create a biobank. Results There was a wide range of responses given for the questions raised in the scenarios, indicating a lack of clarity about the role of REBs in registries and biobanks. With respect to the creation of a registry, a minority of sites felt that consent was not required for the information to be entered into the registry. Whether patient consent was required for information to be entered into the registry and the duration for which the consent would be operative differed across sites. With respect to the creation of a biobank linked to the registry, a majority of sites viewed biobank information as qualitatively different from other types of personal health information. All respondents agreed that patient consent was needed for blood samples to be placed in the biobank but the duration of consent again varied. Conclusion Participants were more attuned to issues surrounding biobanks as compared to registries and demonstrated a higher

  1. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  2. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  3. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  4. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Aneurysm More Coronary Artery Dissection: Not Just a Heart Attack Updated:Oct 4,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  5. A systematic review of cardiac rehabilitation registries.

    Science.gov (United States)

    Poffley, Alison; Thomas, Emma; Grace, Sherry L; Neubeck, Lis; Gallagher, Robyn; Niebauer, Josef; O'Neil, Adrienne

    2017-10-01

    Introduction Despite cardiac rehabilitation being recommended in clinical practice guidelines internationally these services are underutilised, programmes are not standardised and quality improvement methods and outcomes are rarely published. National registries are an important strategy to characterise service delivery, quality and outcomes, yet the number, type and components of national cardiac rehabilitation registries have not been reported. Aims To identify and describe national and international cardiac rehabilitation registries, and summarise their key features. Methods We systematically reviewed the literature reporting on cardiac rehabilitation registries at a national and international level. A search of four databases was conducted in July 2016, with two reviewers independently screening titles/abstracts and full texts for inclusion. Data were extracted from included studies, independently checked by a second reviewer and synthesised qualitatively. Results Eleven articles were included in the review comprising seven national registries and one international registry (of 12 European countries) for a total sample of 265,608 patients. Data were most commonly provided to the registry by a web-based application, and included individual-level data (i.e. sociodemographic characteristics, medical history, and clinical measurements). When reported, service-level data most commonly included wait times, programme enrolment and completion. The overarching governance, funding modes (e.g. industry ( n = 2), government ( n = 1)), and incentives for registry participation (e.g. benchmarking, financial reimbursement, or mandatory requirement) varied widely. Conclusion The use of national and international registries for characterising cardiac rehabilitation and providing a benchmark for quality improvement is in its early stages but shows promise for national and global benchmarking.

  6. Development of a neuroscience research registry.

    Science.gov (United States)

    Li, Laura; Koranne, Rahul

    2014-05-01

    There is little data on the long-term health outcomes of patients with neurological conditions treated at long-term acute care specialty hospitals. In order to learn more about these patients and the most effective way to care for them, Bethesda Hospital in St. Paul created a neuroscience research registry. The registry's target population is patients with complex neurological conditions such as aneurysm or intracranial bleed, stroke, seizures, delirium and confusion and traumatic brain injury. This article describes the development of the registry, which has enrolled 857 patients thus far, and what is being learned about those patients.

  7. [Hoogendoorn and the medical registry].

    Science.gov (United States)

    van Gijn, Jan; Gijselhart, Joost P

    2012-01-01

    Dirk Hoogendoorn (1914-1990) was a solo general practitioner in the village of Wijhe (eastern part of the Netherlands) from 1941, during the time of the German occupation, until 1971. From the very beginning, he combined his practice with the recording of disease patterns. He first concentrated on infectious diseases, especially whooping cough, which was the subject of his doctoral thesis. He later set up registries in two regional hospitals. When his initiative expanded to a national organisation, he became its advisor. He nonetheless continued to produce statistics on a variety of disorders as well as on surgical procedures, even more so after his retirement. The subjects ranged from traffic accidents and tonsillectomies to the discrepancy between increased body height and the unchanging height of the tennis net, but he had the most affinity with the practice of obstetrics. He stirred up much emotion by showing that a decrease in perinatal mortality was proceeding slower in the Netherlands than in other European countries, especially by suggesting a causal relationship between this lag and the high rate of Dutch home deliveries. This debate has continued to this day.

  8. Treating functional non-epileptic attacks - Should we consider acceptance and commitment therapy?

    Science.gov (United States)

    Cope, Sarah R; Poole, Norman; Agrawal, Niruj

    2017-08-01

    Patients who experience functional non-epileptic attacks (FNEA) are frequently seen in Neurology clinics. Diagnosis alone can result in cessation of attacks for some patients, but many patients require further treatment. There is evidence that certain psychological therapies, like cognitive-behavioral therapy (CBT) and psychodynamic interpersonal therapy (PIT) can be beneficial. Acceptance and commitment therapy (ACT) is a type of CBT that has been found to be effective at treating other somatic disorders, like epilepsy and chronic pain. In this paper, we explain what ACT is, the current evidence-base for its use, and the rationale for why it may be a beneficial treatment for patients who experience FNEA. We conclude that ACT is a potential treatment option for FNEA, and further research is required. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. Shoulder injuries from attacking motion

    Science.gov (United States)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  10. Pilot Aircraft Interface Objectives/Rationale

    Science.gov (United States)

    Shively, Jay

    2010-01-01

    Objective: Database and proof of concept for guidelines for GCS compliance a) Rationale: 1) Provide research test-bed to develop guidelines. 2) Modify GCS for NAS Compliance to provide proof of concept. b) Approach: 1) Assess current state of GCS technology. 2) Information Requirements Definition. 3) SME Workshop. 4) Modify an Existing GCS for NAS Compliance. 5) Define exemplar UAS (choose system to develop prototype). 6) Define Candidate Displays & Controls. 7) Evaluate/ refine in Simulations. 8) Demonstrate in flight. c) Deliverables: 1) Information Requirements Report. 2) Workshop Proceedings. 3) Technical Reports/ papers on Simulations & Flight Demo. 4) Database for guidelines.

  11. EPA Facility Registry Service (FRS): Power Plants

    Science.gov (United States)

    This GIS dataset contains data on power plants, based on the Energy Information Administration's EIA-860 dataset and supplemented with data from EPA's Facility Registry Service (FRS) compiled from various EPA programs.

  12. EPA Facility Registry Service (FRS): TRI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  13. EPA Facility Registry Service (FRS): BIA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  14. Veterans Affairs Central Cancer Registry (VACCR)

    Data.gov (United States)

    Department of Veterans Affairs — The Veterans Affairs Central Cancer Registry (VACCR) receives and stores information on cancer diagnosis and treatment constraints compiled and sent in by the local...

  15. Linking Medicare, Medicaid, and Cancer Registry Data...

    Data.gov (United States)

    U.S. Department of Health & Human Services — Linking Medicare, Medicaid, and Cancer Registry Data to Study the Burden of Cancers in West Virginia In the United States, the elderly carry an unequal burden of...

  16. EPA Facility Registry Service (FRS): LANDFILL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of non-hazardous waste...

  17. EPA Facility Registry Service (FRS): RADINFO

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  18. EPA Facility Registry Service (FRS): RCRA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of hazardous waste...

  19. EPA Facility Registry Service (FRS): OIL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link to the Oil...

  20. EPA Facility Registry Service (FRS): RMP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  1. EPA Facility Registry Service (FRS): SDWIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  2. Deployment of the Planetary Data Tool Registry

    Science.gov (United States)

    Hardman, S.; Hughes, J. S.; Joyner, R.; Crichton, D.; Law, E.

    2017-06-01

    The PDS Tool Registry enables search and discovery of tools, services, and APIs for working with data following the PDS standards. Tools and services have been submitted from the broad PDS community and multiple institutions.

  3. EPA Facility Registry Service (FRS): ACRES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of sites that link to...

  4. EPA Facility Registry System (FRS): NCES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  5. Validation of defibrillator lead performance registry data

    DEFF Research Database (Denmark)

    Kristensen, Anders Elgaard; Larsen, Jacob Moesgaard; Nielsen, Jens Cosedis

    2017-01-01

    AIMS: The validity of registry data on defibrillator lead performance is described only sparsely, despite its clinical importance. This study investigated the validity of defibrillator lead performance registry data in a nationwide and population-based registry. METHODS AND RESULTS: We identified.......9% (95% CI: 85.2-90.2%) with a κ value of 0.82 (95% CI:0.78-0.86) representing an almost perfect match. CONCLUSION: The validity of data on defibrillator lead performance recorded in the DPIR is excellent for the specific types of lead intervention and good for the specific reasons for defibrillator lead...... intervention. The validity of the less detailed overall reasons for lead interventions commonly used to report lead performance is also excellent. These findings indicate high registry data quality appropriate for scientific analysis and industry-independent post-marketing surveillance....

  6. EPA Facility Registry Service (FRS): NEI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  7. EPA Facility Registry Service (FRS): ICIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  8. EPA Facility Registry Service (FRS): CAMDBS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  9. Assessing Ontario's Personal Support Worker Registry

    Directory of Open Access Journals (Sweden)

    Audrey Laporte

    2013-08-01

    Full Text Available In response to the growing role of personal support workers (PSWs in the delivery of health care services to Ontarians, the Ontario government has moved forward with the creation of a PSW registry. This registry will be mandatory for all PSWs employed by publicly funded health care employers, and has the stated objectives of better highlighting the work that PSWs do in Ontario, providing a platform for PSWs and employers to more easily access the labour market, and to provide government with information for human resources planning. In this paper we consider the factors that brought the creation of a PSW registry onto the Ontario government’s policy agenda, discuss how the registry is being implemented, and provide an analysis of the strengths and weaknesses of this policy change.

  10. Substance Identification Information from EPA's Substance Registry

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Substance Registry Services (SRS) is the authoritative resource for basic information about substances of interest to the U.S. EPA and its state and tribal...

  11. EPA Facility Registry Service (FRS): RBLC

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  12. EPA Facility Registry System (FRS): NEPT

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  13. EPA Facility Registry Service (FRS): NCDB

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  14. Airborne Hazards and Open Burn Pit Registry

    Science.gov (United States)

    ... the registry questionnaire. You may try a different browser, or you may try from a different computer. You may also see this problem if you are in a high security environment where this is disabled by a network ...

  15. EPA Facility Registry Service (FRS): BRAC

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  16. Patient registries for substance use disorders

    OpenAIRE

    Tai B; Hu L; Ghitza UE; Sparenborg S; VanVeldhuisen P; Lindblad R

    2014-01-01

    Betty Tai,1 Lian Hu,2 Udi E Ghitza,1 Steven Sparenborg,1 Paul VanVeldhuisen,2 Robert Lindblad2 1Center for the Clinical Trials Network, National Institute on Drug Abuse, National Institutes of Health, Bethesda, MD, USA; 2The EMMES Corporation, Rockville, MD, USA Abstract: This commentary discusses the need for developing patient registries of substance use disorders (SUD) in general medical settings. A patient registry is a tool that documents the natural history of target diseases. Clinicia...

  17. Alaska Native Parkinson’s Disease Registry

    Science.gov (United States)

    2013-07-01

    Parkinson’s Institute Sunnyvale, CA 94085-2934 This registry initiates a program of epidemiological assessments of PS among...Center. Alaska Native; Parkinson’s disease; Registry; Etiology; Epidemiology ; Ascertainment 8 23 June 2012 - 22 June 2013AnnualJuly 2013 ctanner...Investigator 4 A. Introduction Parkinsonism (PS) is a syndrome characterized by tremor , rigidity, slowness of movement, and problems with walking and

  18. Definition, epidemiology and registries of pulmonary hypertension.

    Science.gov (United States)

    Awdish, R; Cajigas, H

    2016-05-01

    Pulmonary arterial hypertension (PAH) is a subcategory of pulmonary hypertension (PH) that comprises a group of disorders with similar pulmonary vascular pathology. Though PH is common, the estimated incidence of IPAH is 1-3 cases per million, making it a rare disease. The hemodynamic definition of PAH is a mean pulmonary artery pressure at rest >OR = 25 mm Hg in the presence of a pulmonary capillary wedge pressure registries. These registries have been indispensable in the characterization and mapping of the natural history of the disease. Equations and risk calculators derived from registries have given clinicians a basis for risk stratification and prognostication. The sequential accumulation of data since the registries began in the 1980s allows for comparisons to be made. Patients who are differentiated by treatment eras and environments can be contrasted. Variability among inclusion criteria similarly allows for comparisons of these subpopulations. This article provides an overview of available registries, highlights insights provided by each and discusses key issues around the interpretation and extrapolation of data from PAH registries. Registries have allowed us to appreciate the improvement in survival afforded by modern therapy and enhanced detection of this disease. Moving forward, a more global approach to registries is needed, as is enhanced collaboration and centralization.

  19. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  20. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  1. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  2. Patient registries for substance use disorders

    Directory of Open Access Journals (Sweden)

    Tai B

    2014-07-01

    Full Text Available Betty Tai,1 Lian Hu,2 Udi E Ghitza,1 Steven Sparenborg,1 Paul VanVeldhuisen,2 Robert Lindblad2 1Center for the Clinical Trials Network, National Institute on Drug Abuse, National Institutes of Health, Bethesda, MD, USA; 2The EMMES Corporation, Rockville, MD, USA Abstract: This commentary discusses the need for developing patient registries of substance use disorders (SUD in general medical settings. A patient registry is a tool that documents the natural history of target diseases. Clinicians and researchers use registries to monitor patient comorbidities, care procedures and processes, and treatment effectiveness for the purpose of improving care quality. Enactments of the Affordable Care Act 2010 and the Mental Health Parity and Addiction Equity Act 2008 open opportunities for many substance users to receive treatment services in general medical settings. An increased number of patients with a wide spectrum of SUD will initially receive services with a chronic disease management approach in primary care. The establishment of computer-based SUD patient registries can be assisted by wide adoption of electronic health record systems. The linkage of SUD patient registries with electronic health record systems can facilitate the advancement of SUD treatment research efforts and improve patient care. Keywords: substance use disorders, primary care, registry, electronic health records, chronic care model

  3. PCCR: Pancreatic Cancer Collaborative Registry

    Science.gov (United States)

    Sherman, Simon; Shats, Oleg; Ketcham, Marsha A.; Anderson, Michelle A.; Whitcomb, David C.; Lynch, Henry T.; Ghiorzo, Paola; Rubinstein, Wendy S.; Sasson, Aaron R.; Grizzle, William E.; Haynatzki, Gleb; Feng, Jianmin; Sherman, Alexander; Kinarsky, Leo; Brand, Randall E.

    2011-01-01

    The Pancreatic Cancer Collaborative Registry (PCCR) is a multi-institutional web-based system aimed to collect a variety of data on pancreatic cancer patients and high-risk subjects in a standard and efficient way. The PCCR was initiated by a group of experts in medical oncology, gastroenterology, genetics, pathology, epidemiology, nutrition, and computer science with the goal of facilitating rapid and uniform collection of critical information and biological samples to be used in developing diagnostic, prevention and treatment strategies against pancreatic cancer. The PCCR is a multi-tier web application that utilizes Java/JSP technology and has Oracle 10 g database as a back-end. The PCCR uses a “confederation model” that encourages participation of any interested center, irrespective of its size or location. The PCCR utilizes a standardized approach to data collection and reporting, and uses extensive validation procedures to prevent entering erroneous data. The PCCR controlled vocabulary is harmonized with the NCI Thesaurus (NCIt) or Systematized Nomenclature of Medicine-Clinical Terms (SNOMED-CT). The PCCR questionnaire has accommodated standards accepted in cancer research and healthcare. Currently, seven cancer centers in the USA, as well as one center in Italy are participating in the PCCR. At present, the PCCR database contains data on more than 2,700 subjects (PC patients and individuals at high risk of getting this disease). The PCCR has been certified by the NCI Center for Biomedical Informatics and Information Technology as a cancer Biomedical Informatics Grid (caBIG®) Bronze Compatible product. The PCCR provides a foundation for collaborative PC research. It has all the necessary prerequisites for subsequent evolution of the developed infrastructure from simply gathering PC-related data into a biomedical computing platform vital for successful PC studies, care and treatment. Studies utilizing data collected in the PCCR may engender new approaches

  4. Distance hijacking attacks on distance bounding protocols

    OpenAIRE

    Cremers, Cas; Rasmussen, Kasper Bonne; Čapkun, Srdjan

    2011-01-01

    Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main type of attack on distance bounding protocols, called Distance Hijacking. We show that many proposed distance bounding protocols are vulnerable to this type of attack, and we propose solutions to make these protocols resilient to Distance Hijacking. We further show that verifying distance bounding protocols using exist...

  5. Snow fall and heart attacks.

    Science.gov (United States)

    Persinger, M A; Ballance, S E; Moland, M

    1993-03-01

    Total numbers of daily hospital admissions for cardiac emergencies were obtained from 3 hospitals within the Sudbury Basin in Canada for November through March for each of 4 consecutive years (1983-1986). Major diagnostic categories were also differentiated. No statistically significant correlations were found between the amount of snowfall during the day of or the days before or after admissions for the major categories of cardiac emergency. Specific analyses, conducted to reveal possible recondite associations between extreme or cumulative snowfalls and the most extreme days of cardiac emergencies, indicated a chance association. We conclude that the occurrence of heart attacks is independent of snowfall but that, when they occur, they are attributed to shoveling if there has been a recent major snow storm.

  6. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  7. Cued Panic Attacks in Body Dysmorphic Disorder

    Science.gov (United States)

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  8. Generating attacks in SysML activity diagrams by detecting attack surfaces

    NARCIS (Netherlands)

    Ouchani, Samir; Lenzini, Gabriele

    In the development process of a secure system is essential to detect as early as possible the system’s vulnerable points, the so called attack surfaces, and to estimate how feasible it would be that known attacks breach through them. Even if attack surfaces can be sometimes detected automatically,

  9. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  10. The Danish Cerebral Palsy Registry. A registry on a specific impairment

    DEFF Research Database (Denmark)

    Uldall, P; Michelsen, Susan Ishøy; Topp, M

    2001-01-01

    Cerebral palsy (CP) is the commonest disabling impairment in childhood, with a prevalence of 2-3 per 1000 live births. The Danish Cerebral Palsy Registry is a research registry that contains cases of CP from birth year 1925 and has estimated the birth prevalence since 1950. Data on children with ...

  11. Linked Registries: Connecting Rare Diseases Patient Registries through a Semantic Web Layer.

    Science.gov (United States)

    Sernadela, Pedro; González-Castro, Lorena; Carta, Claudio; van der Horst, Eelke; Lopes, Pedro; Kaliyaperumal, Rajaram; Thompson, Mark; Thompson, Rachel; Queralt-Rosinach, Núria; Lopez, Estrella; Wood, Libby; Robertson, Agata; Lamanna, Claudia; Gilling, Mette; Orth, Michael; Merino-Martinez, Roxana; Posada, Manuel; Taruscio, Domenica; Lochmüller, Hanns; Robinson, Peter; Roos, Marco; Oliveira, José Luís

    2017-01-01

    Patient registries are an essential tool to increase current knowledge regarding rare diseases. Understanding these data is a vital step to improve patient treatments and to create the most adequate tools for personalized medicine. However, the growing number of disease-specific patient registries brings also new technical challenges. Usually, these systems are developed as closed data silos, with independent formats and models, lacking comprehensive mechanisms to enable data sharing. To tackle these challenges, we developed a Semantic Web based solution that allows connecting distributed and heterogeneous registries, enabling the federation of knowledge between multiple independent environments. This semantic layer creates a holistic view over a set of anonymised registries, supporting semantic data representation, integrated access, and querying. The implemented system gave us the opportunity to answer challenging questions across disperse rare disease patient registries. The interconnection between those registries using Semantic Web technologies benefits our final solution in a way that we can query single or multiple instances according to our needs. The outcome is a unique semantic layer, connecting miscellaneous registries and delivering a lightweight holistic perspective over the wealth of knowledge stemming from linked rare disease patient registries.

  12. Rationale for Student Dress Codes: A Review of School Handbooks

    Science.gov (United States)

    Freeburg, Elizabeth W.; Workman, Jane E.; Lentz-Hees, Elizabeth S.

    2004-01-01

    Through dress codes, schools establish rules governing student appearance. This study examined stated rationales for dress and appearance codes in secondary school handbooks; 182 handbooks were received. Of 150 handbooks containing a rationale, 117 related dress and appearance regulations to students' right to a non-disruptive educational…

  13. The credibility of exposure therapy: Does the theoretical rationale matter?

    Science.gov (United States)

    Arch, Joanna J; Twohig, Michael P; Deacon, Brett J; Landy, Lauren N; Bluett, Ellen J

    2015-09-01

    Little is understood about how the public perceives exposure-based therapy (ET) for treating anxiety and trauma-related disorders or how ET rationales affect treatment credibility. Distinct approaches to framing ET are practiced, including those emphasized in traditional cognitive behavioral therapy, acceptance and commitment therapy, and the more recent inhibitory learning model. However, their relative effect on ET's credibility remains unknown. A final sample of 964 U.S. adults provided baseline views of ET. Participants rated ET treatment credibility following a simple ET definition (pre-rationale) and following randomization to rationale modules addressing ET goals, fear, and cognitive strategies from distinct theoretical perspectives (post-rationale). Baseline ET views, symptoms, and sociodemographic characteristics were examined as putative moderators and predictors. At baseline, the majority had never heard of ET. From pre- to post-rationale, ET treatment credibility significantly increased but the rationales' theoretical perspective had little impact. More negative baseline ET views, specific ethnic/racial minority group status, and lower education moderated or predicted greater increases in treatment credibility following the rationale. ET remains relatively unknown as a treatment for anxiety or trauma, supporting the need for direct-to-consumer marketing. Diverse theory-driven rationales similarly increased ET credibility, particularly among those less likely to use ET. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. "Socialized Music": Historical Formations of Community Music through Social Rationales

    Science.gov (United States)

    Yerichuk, Deanna

    2014-01-01

    This article traces the formation of community music through professional and scholarly articles over the last century in North America, and argues that community music has been discursively formed through social rationales, although the specific rationales have shifted. The author employs an archaeological framework inspired by Michel Foucault to…

  15. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  16. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  17. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  18. Micromechanics of high temperature hydrogen attack

    NARCIS (Netherlands)

    Schlögl, Sabine M.; Giessen, Erik van der

    1999-01-01

    Hydrogen attack is a material degradation process that occurs at elevated temperatures in hydrogen-rich environments, such as found in petro-chemical installations. Weldments in components such as reactor vessels are particularly susceptible to hydrogen attack. This paper discusses a multi-scale

  19. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  20. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  1. Revisiting attacker model for smart vehicles

    NARCIS (Netherlands)

    Petit, Jonathan; Feiri, Michael; Kargl, Frank

    Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this

  2. Terror attacks increases the risk of vascular injuries

    Directory of Open Access Journals (Sweden)

    Eitan eHeldenberg

    2014-05-01

    Full Text Available Objectives: Extensive literature exists about military trauma as opposed to the very limited literature regarding terror-related civilian trauma. However, terror-related vascular trauma (VT, as a unique type of injury, is yet to be addressed.Methods: A retrospective analysis of the Israeli National Trauma Registry was performed. All patients in the registry from 09/2000 to 12/2005 were included. The subgroup of patients with documented vascular trauma (VT (N=1,545 was analyzedand further subdivided into those suffering from Terror-related Vascular Trauma (TVT and Non-Terror related Vascular Trauma (NTVT. Both groups were analyzed according to mechanism of trauma, type and severity of injury and treatment.Results: Out of 2,446 terror related trauma admissions 243 sustained TVT (9.9% compared to 1302 VT patients from Non Terror trauma (1.1%. TVT injuries tend to be more complex and most patients were operated on. ICU admissions and hospitallength of stay was higher in the TVT group. Penetrating trauma was the prominent cause of injury among the TVT group. TVT group had a higher proportion of patients with severe injuries (ISS>16 and mortality. Thorax injuries were more frequent in the TVT group. Extremity injuries were the most prevalent vascular injuries in both groups; however NTVT group had more upper extremity injuries, while the TVT group had significantly more lower extremity injuries.Conclusion: Vascular injuries are remarkably more common among terror attack victims than among non-terror trauma victims and the injuries of terror casualties tend to be more complex. The presence of a vascular surgeon will ensure a comprehensive clinical care.

  3. Terror attacks increase the risk of vascular injuries.

    Science.gov (United States)

    Heldenberg, Eitan; Givon, Adi; Simon, Daniel; Bass, Arie; Almogy, Gidon; Peleg, Kobi

    2014-01-01

    Extensive literature exists about military trauma as opposed to the very limited literature regarding terror-related civilian trauma. However, terror-related vascular trauma (VT), as a unique type of injury, is yet to be addressed. A retrospective analysis of the Israeli National Trauma Registry was performed. All patients in the registry from 09/2000 to 12/2005 were included. The subgroup of patients with documented VT (N = 1,545) was analyzed and further subdivided into those suffering from terror-related vascular trauma (TVT) and non-terror-related vascular trauma (NTVT). Both groups were analyzed according to mechanism of trauma, type and severity of injury and treatment. Out of 2,446 terror-related trauma admissions, 243 sustained TVT (9.9%) compared to 1302 VT patients from non-terror trauma (1.1%). TVT injuries tend to be more complex and most patients were operated on. Intensive care unit admissions and hospital length of stay was higher in the TVT group. Penetrating trauma was the prominent cause of injury among the TVT group. TVT group had a higher proportion of patients with severe injuries (ISS ≥ 16) and mortality. Thorax injuries were more frequent in the TVT group. Extremity injuries were the most prevalent vascular injuries in both groups; however NTVT group had more upper extremity injuries, while the TVT group had significantly much lower extremity injuries. Vascular injuries are remarkably more common among terror attack victims than among non-terror trauma victims and the injuries of terror casualties tend to be more complex. The presence of a vascular surgeon will ensure a comprehensive clinical care.

  4. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  5. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  6. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...... but not the computation. Such weaker model can still be practically useful and moreover, may provide nice building-blocks to tackle full-fledged tampering in future. In this dissertation we study different models of memory-tampering and provide a number of solutions with different flavors. Mainly we took two different...

  7. Two Improved Multiple-Differential Collision Attacks

    Directory of Open Access Journals (Sweden)

    An Wang

    2014-01-01

    Full Text Available In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementation. Furthermore, we improve the ternary voting test of Bogdanov, which can improve the experiment efficiency markedly. Our experiments show that the number of power traces required in our attack is only a quarter of the requirement of traditional attack. Finally, some alternative countermeasures against our attacks are discussed.

  8. Systematic Review of Cerebral Palsy Registries/Surveillance Groups: Relationships between Registry Characteristics and Knowledge Dissemination

    Science.gov (United States)

    Hurley, Donna S; Sukal-Moulton, Theresa; Gaebler-Spira, Deborah; Krosschell, Kristin J; Pavone, Larissa; Mutlu, Akmer; Dewald, Julius PA; Msall, Michael E

    2016-01-01

    The aims of this study were to provide a comprehensive summary of the body of research disseminated by Cerebral Palsy (CP) registries and surveillance programs from January 2009 through May 2014 in order to describe the influence their results have on our overall understanding of CP. Secondly, registries/surveillance programs and the work they produced were evaluated and grouped using standardized definitions and classification systems. Method A systematic review search in PubMed, CINAH and Embase for original articles published from 1 January 2009 to 20 May 2014 originating from or supported by population based CP registries and surveillance programs or population based national registries including CP were included. Articles were grouped by 2009 World CP Registry Congress aim, registry/surveillance program classification, geographical region, and the International Classification of Function, Disability and Health (ICF) domain. Registry variables were assessed using the ICF-CY classification. Results Literature searches returned 177 articles meeting inclusion criteria. The majority (69%) of registry/surveillance program productivity was related to contributions as a Resource for CP Research. Prevention (23%) and Surveillance (22%) articles were other areas of achievement, but fewer articles were published in the areas of Planning (17%) and Raising the Profile of CP (2%). There was a range of registry/surveillance program classifications contributing to this productivity, and representation from multiple areas of the globe, although most of the articles originated in Europe, Australia, and Canada. The domains of the ICF that were primarily covered included body structures and function at the early stages of life. Encouragingly, a variety of CP registry/surveillance program initiatives included additional ICF domains of participation and environmental and personal factors. Interpretation CP registries and surveillance programs, including novel non-traditional ones

  9. The Western Denmark Cardiac Computed Tomography Registry

    DEFF Research Database (Denmark)

    Nielsen, Lene Hüche; Nørgaard, Bjarne Linde; Tilsted, Hans-Henrik

    2014-01-01

    BACKGROUND: As a subregistry to the Western Denmark Heart Registry (WDHR), the Western Denmark Cardiac Computed Tomography Registry (WDHR-CCTR) is a clinical database established in 2008 to monitor and improve the quality of cardiac computed tomography (CT) in Western Denmark. OBJECTIVE: We...... examined the content, data quality, and research potential of the WDHR-CCTR. METHODS: We retrieved 2008-2012 data to examine the 1) content; 2) completeness of procedure registration using the Danish National Patient Registry as reference; 3) completeness of variable registration comparing observed vs...... expected numbers; and 4) positive predictive values as well as negative predictive values of 19 main patient and procedure variables. RESULTS: By December 31, 2012, almost 22,000 cardiac CTs with up to 40 variables for each procedure have been registered. Of these, 87% were coronary CT angiography...

  10. The Danish National Acute Leukemia Registry

    DEFF Research Database (Denmark)

    Østgård, Lene Sofie Granfeldt; Nørgaard, Jan Maxwell; Raaschou-Jensen, Klas Kræsten

    2016-01-01

    AIM OF DATABASE: The main aim of the Danish National Acute Leukemia Registry (DNLR) was to obtain information about the epidemiology of the hematologic cancers acute myeloid leukemia (AML), acute lymphoblastic leukemia (ALL), and myelodysplastic syndrome (MDS). STUDY POPULATION: The registry...... was established in January 2000 by the Danish Acute Leukemia Group and has been expanded over the years. It includes adult AML patients diagnosed in Denmark since 2000, ALL patients diagnosed since 2005, and MDS patients diagnosed since 2010. The coverage of leukemia patients exceeds 99%, and the coverage of MDS...... years. To ensure this high coverage, completeness, and quality of data, linkage to the Danish Civil Registration System and the Danish National Registry of Patients, and several programmed data entry checks are used. CONCLUSION: The completeness and positive predictive values of the leukemia data have...

  11. Common variables in European pancreatic cancer registries

    DEFF Research Database (Denmark)

    De Leede, E. M.; Sibinga Mulder, B. G.; Bastiaannet, E.

    2016-01-01

    Care, is a platform aiming to harmonize cancer data collection and improve cancer care by feedback. After the prior launch of the projects on colorectal, breast and upper GI cancer, EURECCA's newest project is collecting data on pancreatic cancer in several European countries. Methods National cancer...... registries, as well as specific pancreatic cancer audits/registries, were invited to participate in EURECCA Pancreas. Participating countries were requested to share an overview of their collected data items. Of the received datasets, a shared items list was made which creates insight in similarities between...... data. Conclusions A list of 25 shared items on pancreatic cancer coming from eleven participating registries was created, providing a basis for future prospective data collection in pancreatic cancer treatment internationally....

  12. Establishing an institutional therapeutic apheresis registry.

    Science.gov (United States)

    Mann, Steven A; McCleskey, Brandi; Marques, Marisa B; Adamski, Jill

    2016-12-01

    Apheresis was first performed as a therapeutic procedure in the 1950s. The first national therapeutic apheresis (TA) registry was established in Canada in 1981 and other national registries followed, including two attempts at establishing an international TA registry. There is no national registry in the United States. Our large, academic, tertiary hospital has a very active TA service. We created a TA database to track all procedures performed by the apheresis service by transferring data from paper appointment logs and the electronic medical records into a Microsoft Access database. Retrospective data from each TA procedure performed at UAB from January 1, 2003 through December 31, 2012 were entered, including the type of procedure, indication, date, and patient demographics. Microsoft Excel was used for data analysis. During the 10-year period, our TA service treated 1,060 patients and performed 11,718 procedures. Of these patients, 70% received therapeutic plasma exchange (TPE), 21% received extracorporeal photopheresis (ECP), 4.5% received red cell exchange (RCE), 4.2% received leukocytapheresis, and 0.6% underwent platelet depletion. Among the procedures, 54% were TPEs, 44% were ECPs, 1.3% were RCEs, 0.5% were leukocytaphereses, and 0.1% were platelet depletions. According to the current literature, national and international TA use is underreported. We believe that the UAB TA registry provides useful information about TA practices in our region and can serve as a model for other institutions. Furthermore, data from multiple institutional registries can be used for clinical research to increase the available evidence for the role of TA in various conditions. J. Clin. Apheresis 31:516-522, 2016. © 2015 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  13. The Western Denmark Cardiac Computed Tomography Registry

    DEFF Research Database (Denmark)

    Nielsen, Lene Hüche; Nørgaard, Bjarne Linde; Tilsted, Hans-Henrik

    2014-01-01

    BACKGROUND: As a subregistry to the Western Denmark Heart Registry (WDHR), the Western Denmark Cardiac Computed Tomography Registry (WDHR-CCTR) is a clinical database established in 2008 to monitor and improve the quality of cardiac computed tomography (CT) in Western Denmark. OBJECTIVE: We......-CCTR, showed that coronary CT angiographies accounted for only 23% of all nonregistered cardiac CTs, indicating >90% completeness of coronary CT angiographies in the WDHR-CCTR. The completeness of individual variables varied substantially (range: 0%-100%), but was >85% for more than 70% of all variables. Using......, making it a valuable tool for clinical epidemiological research....

  14. A web-based, patient driven registry for Angelman syndrome: the global Angelman syndrome registry.

    Science.gov (United States)

    Napier, Kathryn R; Tones, Megan; Simons, Chloe; Heussler, Helen; Hunter, Adam A; Cross, Meagan; Bellgard, Matthew I

    2017-08-01

    Angelman syndrome (AS) is a rare neurodevelopmental disorder that is characterised by severe global developmental delays, ataxia, loss of speech, epilepsy, sleep disorders, and a happy disposition. There is currently no cure for AS, though several pharmaceutical companies are anticipating drug trials for new therapies to treat AS. The Foundation for Angelman Therapeutics (FAST) Australia therefore identified a need for a global AS patient registry to identify patients for recruitment for clinical trials.The Global AS Registry was deployed in September 2016 utilising the Rare Disease Registry Framework, an open-source tool that enables the efficient creation and management of patient registries. The Global AS Registry is web-based and allows parents and guardians worldwide to register, provide informed consent, and enter data on individuals with AS. 286 patients have registered in the first 8 months since deployment.We demonstrate the successful deployment of the first patient-driven global registry for AS. The data generated from the Global AS Registry will be crucial in identifying patients suitable for clinical trials and in informing research that will identify treatments for AS, and ultimately improve the lives of individuals and their families living with AS.

  15. Protecting complex infrastructures against multiple strategic attackers

    Science.gov (United States)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  16. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  17. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    Science.gov (United States)

    ... Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT Most heart ... to the hospital immediately. Learn more about stroke CARDIAC ARREST WARNING SIGNS SUDDEN LOSS OF RESPONSIVENESS No response ...

  18. The economic characteristics of registries and their policy implications.

    Science.gov (United States)

    Connelly, Luke B

    2009-02-01

    The discipline of economics supplies principles that may contribute to the discourse about investments in trauma registries and the role of the public sector, as well as the optimal use of the datasets those investments create. Principles from production economics, information economics, and public economics are employed to explore the reasons that trauma registries may be prone to underfunding, relative to their value, and to describe a threat to value maximization. The typical production activities and cost structures of registries are analyzed, along with the way registries generate social benefits. Assuming that the purpose of a trauma registry is to maximize the value or social good it creates, a number of investment, governance, and pricing principles are then proposed. Trauma registries are multiproduct enterprises. They are generally characterized by large and indivisible fixed, joint costs, and relatively low marginal costs. This implies that registries are subject to strong economies of scale and scope. Additionally, because registry data are not depleted by use, the registry's output is, technically, nonrival in consumption. The value created by registries may be maximized when a marginal-cost pricing policy is adopted. This means that the optimal price schedule for access to trauma registry data are likely to be zero, or close to zero, for some users. The economic principles presented here complement the contributions from other disciplines in discussions about the establishment of new registries or about improving some aspects of existing registries.

  19. Rationales behind the choice of administration form with fentanyl

    DEFF Research Database (Denmark)

    Jacobsen, Ramune; Møldrup, Claus; Christrup, Lona

    2010-01-01

    BACKGROUND AND AIM: The aim of this study was to describe the rationale behind the choice of fentanyl administration forms among Danish general practitioners (GPs). METHODS: Thirty-eight Danish GPs were contacted via an Internet survey system to perform a Delphi survey. In the brainstorming phase...... for not choosing OTFCs were intolerance to fentanyl and price. The most important possible rationale to choose fentanyl nasal spray was easy administration. The most important possible reasons to not choose fenanyl nasal spray were application side effects. CONCLUSIONS: The rationale behind the choice...

  20. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  1. The Danish National Chronic Myeloid Neoplasia Registry

    DEFF Research Database (Denmark)

    Bak, Marie; Ibfelt, Else Helene; Stauffer Larsen, Thomas

    2016-01-01

    AIM: The Danish National Chronic Myeloid Neoplasia Registry (DCMR) is a population-based clinical quality database, introduced to evaluate diagnosis and treatment of patients with chronic myeloid malignancies. The aim is to monitor the clinical quality at the national, regional, and hospital...

  2. Costing Tool for International Cancer Registries

    Centers for Disease Control (CDC) Podcasts

    2016-11-21

    A health economist at CDC talks about a new tool for estimating how much it costs to run cancer registries in developing countries.  Created: 11/21/2016 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 11/21/2016.

  3. The Danish National Acute Leukemia Registry.

    Science.gov (United States)

    Østgård, Lene Sofie Granfeldt; Nørgaard, Jan Maxwell; Raaschou-Jensen, Klas Kræsten; Pedersen, Robert Schou; Rønnov-Jessen, Dorthe; Pedersen, Per Troellund; Dufva, Inge Høgh; Marcher, Claus Werenberg; Nielsen, Ove Juul; Severinsen, Marianne Tang; Friis, Lone Smidstrup

    2016-01-01

    The main aim of the Danish National Acute Leukemia Registry (DNLR) was to obtain information about the epidemiology of the hematologic cancers acute myeloid leukemia (AML), acute lymphoblastic leukemia (ALL), and myelodysplastic syndrome (MDS). The registry was established in January 2000 by the Danish Acute Leukemia Group and has been expanded over the years. It includes adult AML patients diagnosed in Denmark since 2000, ALL patients diagnosed since 2005, and MDS patients diagnosed since 2010. The coverage of leukemia patients exceeds 99%, and the coverage of MDS patients is currently 90%. Approximately, 250 AML patients, 25 ALL patients, and 230 MDS patients are registered in the DNLR every year. In January 2015, the registry included detailed patient characteristics, disease characteristics, treatment characteristics, and outcome data on more than 3,500 AML, 300 ALL, and 1,100 MDS patients. Many of the included prognostic variables have been found to be of high quality including positive predictive values and completeness exceeding 90%. These variables have been used in prognostic observational studies in the last few years. To ensure this high coverage, completeness, and quality of data, linkage to the Danish Civil Registration System and the Danish National Registry of Patients, and several programmed data entry checks are used. The completeness and positive predictive values of the leukemia data have been found to be high. In recent years, the DNLR has shown to be an important high-quality resource for clinical prognostic research.

  4. An active registry for bioinformatics web services.

    NARCIS (Netherlands)

    Pettifer, S.; Thorne, D.; McDermott, P.; Attwood, T.; Baran, J.; Bryne, J.C.; Hupponen, T.; Mowbray, D.; Vriend, G.

    2009-01-01

    SUMMARY: The EMBRACE Registry is a web portal that collects and monitors web services according to test scripts provided by the their administrators. Users are able to search for, rank and annotate services, enabling them to select the most appropriate working service for inclusion in their

  5. An international registry for primary ciliary dyskinesia

    DEFF Research Database (Denmark)

    Werner, Claudius; Lablans, Martin; Ataian, Maximilian

    2016-01-01

    Primary ciliary dyskinesia (PCD) is a rare autosomal recessive disorder leading to chronic upper and lower airway disease. Fundamental data on epidemiology, clinical presentation, course and treatment strategies are lacking in PCD. We have established an international PCD registry to realise an u...

  6. The Savant Syndrome Registry: A Preliminary Report.

    Science.gov (United States)

    Treffert, Darold A; Rebedew, David L

    2015-08-01

    A registry has been established to document certain characteristics on a sizeable worldwide sample of individuals with savant syndrome, a rare but remarkable condition in which persons with developmental disabilities, brain injury, or brain disease have some spectacular "islands" of skill or ability that stand in jarring, marked contrast to overall handicap. Of the 319 savants included in the registry, 90% are congenital savants, while 10% are acquired savants. The registry includes individuals from 33 countries, with 70% from the United States or Canada. Sex distribution was 79% male vs. 21% female (4:1). This report summarizes the findings in the congenital savant syndrome category of the registry. Among the individuals with congenital savant syndrome, the most common underlying disability was Autistic Spectrum Disorder (75%); various other central nervous system (CNS) disorders were present in the other 25%. Fifty-five percent possessed a single special skill, while 45% had multiple skills. Music was the most frequent principal skill followed by art, memory, mathematics, calendar calculating, language, visual-spatial/mechanical, athletic, computer, extrasensory perception, and other skills.

  7. [History of the cancer registry in Mexico].

    Science.gov (United States)

    Allende-López, Aldo; Fajardo-Gutiérrez, Arturo

    2011-01-01

    A cancer registry is to record the data which let us to know the epidemiology of neoplasm, but led us take a decision in medical policy about this health problem that benefit patients. In this paper we did a brief historical review about models and attempts for having a cancer registry in Mexico. However, since 1940 "the fight against cancer" was declared, we have not had a confident cancer registry today validated and built with data from whole the country. In 1982, the Registro Nacional del Cancer was created. The design and validation of a registration card in four hospitals were the main results. In 1988, the Registro Nacional del Cancer was reinforced with a computerized system for facilitation the data capture. In 1994, it was signed the first interinstitutional agreement that led to Registro Histopatol6gico de Neoplasias Malignas. In 1996, the Instituto Mexicano del Seguro Social established a cancer registry in children in Mexico with the intention to have data from this population.

  8. Educational Rationale Metadata for Learning Objects

    Directory of Open Access Journals (Sweden)

    Tom Carey

    2002-10-01

    Full Text Available Instructors searching for learning objects in online repositories will be guided in their choices by the content of the object, the characteristics of the learners addressed, and the learning process embodied in the object. We report here on a feasibility study for metadata to record process-oriented information about instructional approaches for learning objects, though a set of Educational Rationale [ER] tags which would allow authors to describe the critical elements in their design intent. The prototype ER tags describe activities which have been demonstrated to be of value in learning, and authors select the activities whose support was critical in their design decisions. The prototype ER tag set consists descriptors of the instructional approach used in the design, plus optional sub-elements for Comments, Importance and Features which implement the design intent. The tag set was tested by creators of four learning object modules, three intended for post-secondary learners and one for K-12 students and their families. In each case the creators reported that the ER tag set allowed them to express succinctly the key instructional approaches embedded in their designs. These results confirmed the overall feasibility of the ER tag approach as a means of capturing design intent from creators of learning objects. Much work remains to be done before a usable ER tag set could be specified, including evaluating the impact of ER tags during design to improve instructional quality of learning objects.

  9. Rationale for a Program in Community Ophthalmology

    Science.gov (United States)

    Bath, Patricia E.

    1979-01-01

    The high incidence of eye abnormalities among blacks, coupled with the relative unavailability of ophthalmic services, has resulted in excessive rates of blindness otherwise preventable or curable. As a consequence, incidence rates for blindness are higher for the black population than the white population. Statistics show that black children requiring eyeglasses are less likely to receive eyeglasses than similar age-matched white children. In virtually every state surveyed, blacks were more frequently and severely afflicted with eye diseases and were less likely to receive treatment than whites. Yet, no programs exist in any state specifically targeted to promote eye care among blacks and reverse the ever-worsening trend. Additional data characterizing the scope of the problem shall be presented. An initial strategy for approaching the problem, namely, community ophthalmology, has been developed. Community ophthalmology represents a new discipline promoting eye health and blindness prevention through programs utilizing methodologies of public health, community medicine, and ophthalmology. Basically, the use of community ophthalmology strategies is critical to positive out-come, when given a population composed of blacks and other minorities who are chronically underserved with regard to all sectors of health. The evolution and rationale for these concepts are discussed from national, as well as international, perspectives. PMID:423288

  10. Rationale for Antioxidant Supplementation in Hemodialysis Patients

    Directory of Open Access Journals (Sweden)

    Morena Marion

    2001-01-01

    Full Text Available Oxidative stress, which results from an imbalance between reactive oxygen species (ROS production and antioxidant defense mechanisms, is now a well recognized pathogenic process in hemodialysis (HD patients that could be involved in dialysis-related pathologies such as accelerated atherosclerosis, amyloidosis and anemia. This review is aimed at evaluating the rationale for preventive intervention against oxidative damage during HD as well as the putative causal factors implicated in this imbalance. The antioxidant system is severely impaired in uremic patients and impairment increases with the degree of renal failure. HD further worsens this condition mainly by losses of hydrophilic unbound small molecular weight substances such as vitamin C, trace elements and enzyme regulatory compounds. Moreover, inflammatory state due to the hemo-incompatibility of the dialysis system plays a critical role in the production of oxidants contributing further to aggravate the pro-oxidant status of uremic patients. Prevention of ROS overproduction can be achieved by improvement of dialysis biocompatibility, a main component of adequate dialysis, and further complimented by antioxidant supplementation. This could be achieved either orally or via the extracorporeal circuit. Antioxidants such as vitamin E could be bound on dialyzer membranes. Alternatively, hemolipodialysis consisting of loading HD patients with vitamin C or E via an ancillary circuit made of vitamin E-rich liposomes may be used.

  11. Telemetry: Summary of concept and rationale

    Science.gov (United States)

    1987-12-01

    This report presents the concept and supporting rationale for the telemetry system developed by the Consultative Committee for Space Data Systems (CCSDS). The concepts, protocols and data formats developed for the telemetry system are designed for flight and ground data systems supporting conventional, contemporary free-flyer spacecraft. Data formats are designed with efficiency as a primary consideration, i.e., format overhead is minimized. The results reflect the consensus of experts from many space agencies. An overview of the CCSDS telemetry system introduces the notion of architectural layering to achieve transparent and reliable delivery of scientific and engineering sensor data (generated aboard space vehicles) to users located in space or on earth. The system is broken down into two major conceptual categories: a packet telemetry concept and a telemetry channel coding concept. Packet telemetry facilitates data transmission from source to user in a standardized and highly automated manner. It provides a mechanism for implementing common data structures and protocols which can enhance the development and operation of space mission systems. Telemetry channel coding is a method by which data can be sent from a source to a destination by processing it in such a way that distinct messages are created which are easily distinguishable from one another. This allows construction of the data with low error probability, thus improving performance of the channel.

  12. Transcatheter intraarterial therapies: rationale and overview.

    Science.gov (United States)

    Lewandowski, Robert J; Geschwind, Jean-Francois; Liapi, Eleni; Salem, Riad

    2011-06-01

    Transcatheter intraarterial therapies have proved valuable in the battle against primary and secondary hepatic malignancies. The unique aspects of all such therapies are their reduced toxicity profiles and highly effective tumor responses. These unique characteristics coupled with their minimally invasive nature provide an attractive therapeutic option in patients who may have previously had few alternatives. The concept of all catheter-based intraarterial therapies is to selectively deliver anticancer treatment to tumor(s). These therapies, which include transarterial embolization, intraarterial chemoinfusion, transarterial chemoembolization with or without drug-eluting beads, and radioembolization with use of yttrium 90, inflict lethal insult to tumors while preserving normal hepatic parenchyma. This is possible because hepatic neoplasms preferentially derive their blood supply from an arterial source while the majority of noncancerous liver is supplied by the portal vein. As part of the interventional oncology review series, in this article we describe the rationale behind each of these transcatheter therapies and provide a review of the existing medical literature. RSNA, 2011

  13. Outdoor Air Pollution, Heart Attack and Stroke

    Science.gov (United States)

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  14. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  15. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... heart attack at age 36, it stopped her "dead in her tracks." Jennifer reminds us how heart disease takes too many of our moms, sisters, and friends from us every day. The more we share our stories, the faster ...

  16. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... heart attack at age 36, it stopped her "dead in her tracks." Jennifer reminds us how heart disease takes too many of our moms, sisters, and friends from us every day. The more we share our stories, the faster ...

  17. Transient ischemic attack: definition and natural history.

    Science.gov (United States)

    Caplan, Louis R

    2006-07-01

    The standard definition of a transient ischemic attack--"a cerebral dysfunction of an ischemic nature lasting no longer than 24 hours with a tendency to recur"--was arrived at arbitrarily and is no longer tenable. Experience shows that attacks are much briefer, usually less than an hour, and many are associated with brain infarction. A newer definition, more consonant with the data, is preferred--"transient ischemic attack is a brief episode of neurological dysfunction caused by focal brain or retinal ischemia, with clinical symptoms typically lasting less than an hour, and without evidence of acute infarction." Patients with transient ischemic attacks require urgent evaluation that includes brain and vascular imaging, blood tests, and often cardiac investigations. Treatment will depend on the nature of the causative cervico-cranial vascular, cardiac, and hematologic abnormalities found on investigation.

  18. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  19. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  20. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  1. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  2. Being active after your heart attack

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/patientinstructions/000093.htm Being active after your heart attack To use the sharing ... urac.org). URAC's accreditation program is an independent audit to verify that A.D.A.M. follows ...

  3. [Cardiomyopathy and ion channel diseases registry: the Szeged CardioGen Registry].

    Science.gov (United States)

    Blazsó, Péter; Kákonyi, Kornél; Forster, Tamás; Sepp, Róbert

    2017-01-01

    The Szeged cardiomyopathy and ion channel diseases registry aims to establish a representative disease-specific registry based on the recruitment of patients with different cardiomyopathies and ion channel diseases followed at the Cardiology Center, University of Szeged. The registry collects patient data on the main forms of primary cardiomyopathies (hypertrophic, dilated, restrictive, arrhythmogenic right ventricular, left ventricular non-compact, tako-tsubo cardiomyopathy) and ion channel diseases (long QT syndrome, short QT syndrome, Brugada syndrome, catecholaminergic polymorphic ventricular tachycardia). Patients with hypertrophic cardiomyopathy (388 patients) make up the largest group of patients in the registry. Patients with dilated cardiomyopathy (310 patients) and patients with the long QT syndrome (111 patients) form two other sizable groups. Analyzed data of the group of patients with hypertrophic cardiomyopathy indicate similar figures with regard to disease related mortality and morbidity and clinical parameters. Orv. Hetil., 2017, 158(3), 101-105.

  4. Clinical Case Registries: simultaneous local and national disease registries for population quality management.

    Science.gov (United States)

    Backus, Lisa I; Gavrilov, Sergey; Loomis, Timothy P; Halloran, James P; Phillips, Barbara R; Belperio, Pamela S; Mole, Larry A

    2009-01-01

    The Department of Veterans Affairs (VA) has a system-wide, patient-centric electronic medical record system (EMR) within which the authors developed the Clinical Case Registries (CCR) to support population-centric delivery and evaluation of VA medical care. To date, the authors have applied the CCR to populations with human immunodeficiency virus (HIV) and hepatitis C virus (HCV). Local components use diagnosis codes and laboratory test results to identify patients who may have HIV or HCV and support queries on local care delivery with customizable reports. For each patient in a local registry, key EMR data are transferred via HL7 messaging to a single national registry. From 128 local registry systems, over 60,000 and 320,000 veterans in VA care have been identified as having HIV and HCV, respectively, and entered in the national database. Local and national reports covering demographics, resource usage, quality of care metrics and medication safety issues have been generated.

  5. Attack by Pyemotes johnmoseri (Acari: Pyemotidae)

    Science.gov (United States)

    Tulin Askit; Ibrahim Cakmak; John Moser

    2007-01-01

    The Aegean Region of Turkey is one of the largest dried fig producers in the world. A Turkish cultivar sarilop (Ficus carica cv. Calimyrna L.) possesses good qualities for drying process, and has been grown extensively for many years in Turkey. Hypoborus ficus is the most common xylophagous insect attacking fig trees in Aydin (Aks¸it et al. 2003). This pest attacks...

  6. Panic attack history and smoking topography.

    Science.gov (United States)

    Farris, Samantha G; Brown, Lily A; Goodwin, Renee D; Zvolensky, Michael J

    2017-02-01

    Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Participants (n=124, Mage=43.9, SD=9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n=35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  7. Panic Attack History and Smoking Topography

    Science.gov (United States)

    Farris, Samantha G.; Brown, Lily A.; Goodwin, Renee D.; Zvolensky, Michael J.

    2016-01-01

    Background Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Method Participants (n = 124, Mage = 43.9, SD = 9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n = 35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Results Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Discussion Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. PMID:28033542

  8. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  9. The Multicenter Pediatric and Adult Congenital EP Quality (MAP-IT) Initiative-rationale and design: report from the pediatric and congenital electrophysiology society's MAP-IT taskforce.

    Science.gov (United States)

    Seslar, Stephen P; Kugler, John; Batra, Anjan S; Collins, Kathryn K; Crosson, Jane; Dubin, Anne M; Etheridge, Susan; Kanter, Ronald; Papez, Andrew; Radbill, Andrew E; Serwer, Gerald A; Tanel, Ronn E; Tsao, Sabrina; Webster, Gregory; Saarel, Elizabeth V

    2013-01-01

    Multicenter clinical registries are increasingly recognized as valuable tools for establishing benchmarks, facilitating patient-centered quality improvement and research. In 2010, the Pediatric and Congenital Electrophysiology Society convened a taskforce of its members to design, construct, and implement a clinical registry known as the Multicenter Pediatric and Adult Congenital EP Quality (MAP-IT) Initiative. The present aim of the MAP-IT Initiative is to create an infrastructure by which we can measurably improve patient-centered outcomes and reduce complications associated with electrophysiology studies and catheter ablation in pediatric and congenital heart disease patients. The purpose of this writing is to report the progress to date from three of the four subcommittees of the MAP-IT taskforce. Specifically, we present our initial set of key data elements and definitions, recommended database table structure, and considerations regarding wide-scale implementation of the registry. Development of a risk/complexity score for use in the MAP-IT registry is presented in a separate companion manuscript. It is our intent that these manuscripts will serve to introduce the electrophysiology and pediatric cardiology community to the MAP-IT initiative and provide a rationale for its design and recommended implementation strategy. © 2013 Wiley Periodicals, Inc.

  10. Iranian Joint Registry(Iranian National Hip and Knee Arthroplasty Registry

    Directory of Open Access Journals (Sweden)

    Hamidreza Aslani

    2016-04-01

    Full Text Available Periodic evaluation and monitoring the health and economic outcome of joint replacement surgery is a common and popular process under the territory of joint registries in many countries. In this article we introduce the methodology used for the foundation of the National Iranian Joint Registry (IJR with a joint collaboration of the Social Security Organization (SSO and academic research departments considering the requirements of the Iran’s Ministry of Health and Education.

  11. Differences in the Korea Acute Myocardial Infarction Registry Compared with Western Registries

    OpenAIRE

    Sim, Doo Sun; Jeong, Myung Ho

    2017-01-01

    The Korea Acute Myocardial Infarction Registry (KAMIR) is the first nationwide registry that reflects current therapeutic approaches and acute myocardial infarction (AMI) management in Korea. The results of the KAMIR demonstrated different risk factors and responses to medical and interventional treatments. The results indicated that the incidence of ST-elevation myocardial infarction (STEMI) was relatively high, and that the prevalence of dyslipidemia was relatively low with higher triglycer...

  12. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  13. A New Approach of the Metatheory of Correct Programming. Rationale

    CERN Document Server

    Novitsky, V V

    2001-01-01

    This is first of a series of four papers, which are forming a foundation of a mathematical theory and metamathematics of correct computer programming. This papers contains the rationale of the choosing concepts in following three papers.

  14. An oracle-based attack on CAPTCHAs protected against oracle attacks

    OpenAIRE

    Hernández-Castro, Carlos Javier; R-Moreno, María D.; David F. Barrero; Li, Shujun

    2017-01-01

    CAPTCHAs/HIPs are security mechanisms that try to prevent automatic abuse of services. They are susceptible to learning attacks in which attackers can use them as oracles. Kwon and Cha presented recently a novel algorithm that intends to avoid such learning attacks and "detect all bots". They add uncertainties to the grading of challenges, and also use trap images designed to detect bots. The authors suggest that a major IT corporation is studying their proposal for mainstream implementation....

  15. Arizona Alzheimer's Registry: Strategy and Outcomes of a Statewide Research Recruitment Registry.

    Science.gov (United States)

    Saunders, K T; Langbaum, J B; Holt, C J; Chen, W; High, N; Langlois, C; Sabbagh, M; Tariot, P N

    2014-09-01

    The Arizona Alzheimer's Consortium (AAC) created the Arizona Alzheimer's Registry, a screening and referral process for people interested in participating in Alzheimer's disease related research. The goals of the Registry were to increase awareness of Alzheimer's disease research and accelerate enrollment into AAC research studies. Participation was by open invitation to adults 18 and older. Those interested provided consent and completed a written questionnaire. A subset of Registrants underwent an initial telephone cognitive assessment. Referral to AAC sites was based on medical history, telephone cognitive assessment, and research interests. A total of 1257 people consented and 1182 underwent an initial cognitive screening. Earned media (38.7%) was the most effective recruitment strategy. Participants had a mean age of 68.1 (SD 10.6), 97% were Caucasian, had 15.2 (SD 2.7) mean years of education, and 60% were female. 30% reported a family history of dementia and 70% normal cognition. Inter-rater agreement between self-reported memory status and the initial telephone cognitive assessment had a kappa of 0.31-0.43. 301 were referred to AAC sites. IThe Registry created an infrastructure and process to screen and refer a high volume of eager Registrants. These methods were found to be effective at prescreening individuals for studies, which facilitated AAC research recruitment. The established infrastructure and experiences gained from the Registry have served as the prototype for the web-based Alzheimer's Prevention Registry, a national registry focusing on Alzheimer's disease prevention research.

  16. Nordic registry-based cohort studies: Possibilities and pitfalls when combining Nordic registry data.

    Science.gov (United States)

    Maret-Ouda, John; Tao, Wenjing; Wahlin, Karl; Lagergren, Jesper

    2017-07-01

    All five Nordic countries (Denmark, Finland, Iceland, Norway and Sweden) have nationwide registries with similar data structure and validity, as well as personal identity numbers enabling linkage between registries. These resources provide opportunities for medical research that is based on large registry-based cohort studies with long and complete follow-up. This review describes practical aspects, opportunities and challenges encountered when setting up all-Nordic registry-based cohort studies. Relevant articles describing registries often used for medical research in the Nordic countries were retrieved. Further, our experiences of conducting this type of study, including planning, acquiring permissions, data retrieval and data cleaning and handling, and the possibilities and challenges we have encountered are described. Combining data from the Nordic countries makes it possible to create large and powerful cohorts. The main challenges include obtaining all permissions within each country, usually in the local language, and retrieving the data. These challenges emphasise the importance of having experienced collaborators within each country. Following the acquisition of data, data management requires the understanding of the differences between the variables to be used in the various countries. A concern is the long time required between initiation and completion. Nationwide Nordic registries can be combined into cohorts with high validity and statistical power, but the considerable expertise, workload and time required to complete such cohorts should not be underestimated.

  17. The rationale for early intervention in schizophrenia and related disorders

    DEFF Research Database (Denmark)

    Nordentoft, Merete; Jeppesen, Pia; Petersen, Lone

    2009-01-01

    Abstract Aim: To examine the rationale and evidence supporting an early intervention approach in schizophrenia. Methods: A selective literature review was conducted. Results: During the onset of schizophrenia, there is often a significant delay between the emergence of psychotic symptoms and the ......Abstract Aim: To examine the rationale and evidence supporting an early intervention approach in schizophrenia. Methods: A selective literature review was conducted. Results: During the onset of schizophrenia, there is often a significant delay between the emergence of psychotic symptoms...

  18. Inferring Rationales from Choice : Identification for Rational Shortlist Methods

    OpenAIRE

    Rohan Dutta; Sean Horan

    2013-01-01

    A wide variety of choice behavior inconsistent with preference maximization can be explained by Manzini and Mariotti's Rational Shortlist Methods. Choices are made by sequentially applying a pair of asymmetric binary relations (rationales) to eliminate inferior alternatives. Manzini and Mariotti's axiomatic treatment elegantly describes which behavior can be explained by this model. However, it leaves unanswered what can be inferred, from observed behavior, about the underlying rationales. Es...

  19. 42 CFR 483.156 - Registry of nurse aides.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Registry of nurse aides. 483.156 Section 483.156... That Must Be Met by States and State Agencies: Nurse Aide Training and Competency Evaluation, and Paid Feeding Assistants § 483.156 Registry of nurse aides. (a) Establishment of registry. The State must...

  20. 15 CFR 995.21 - Registry of data users.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Registry of data users. 995.21 Section 995.21 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued... § 995.21 Registry of data users. (a) CED or CEVAD shall maintain a registry of customers receiving NOAA...

  1. 37 CFR 201.25 - Visual Arts Registry.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Visual Arts Registry. 201.25... AND PROCEDURES GENERAL PROVISIONS § 201.25 Visual Arts Registry. (a) General. This section prescribes the procedures relating to the submission of Visual Arts Registry Statements by visual artists and...

  2. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  3. Rationale, development and implementation of the Resuscitation Outcomes Consortium Epistry-Cardiac Arrest.

    Science.gov (United States)

    Morrison, Laurie J; Nichol, Graham; Rea, Thomas D; Christenson, Jim; Callaway, Clifton W; Stephens, Shannon; Pirrallo, Ronald G; Atkins, Dianne L; Davis, Daniel P; Idris, Ahamed H; Newgard, Craig

    2008-08-01

    To describe the development, design and consequent scientific implications of the Resuscitation Outcomes Consortium (ROC) population-based registry; ROC Epistry-Cardiac Arrest. The ROC Epistry--Cardiac Arrest is designed as a prospective population-based registry of all Emergency Medical Services (EMSs)-attended 9-1-1 calls for patients with out-of-hospital cardiac arrest occurring in the geographical area described by the eight US and three Canadian regions. The dataset was derived by an North American interdisciplinary steering committee. Enrolled cases include individuals of all ages who experience cardiac arrest outside the hospital, with evaluation by organized EMS personnel and: (a) attempts at external defibrillation (by lay responders or emergency personnel), or chest compressions by organized EMS personnel; (b) were pulseless but did not receive attempts to defibrillate or CPR by EMS personnel. Selected data items are categorized as mandatory or optional and undergo revisions approximately every 12 months. Where possible all definitions are referenced to existing literature. Where a common definition did not exist one was developed. Optional items include standardized CPR process data elements. It is anticipated the ROC Epistry--Cardiac Arrest will enroll between approximately 9000 and 13,500 treated all rhythm arrests and 4000 and 5000 ventricular fibrillation arrests annually and approximately 8000 EMS-attended but untreated arrests. We describe the rationale, development, design and future implications of the ROC Epistry--Cardiac Arrest. This paper will serve as the reference for subsequent ROC manuscripts and for the common data elements captured in both ROC Epistry--Cardiac Arrest and the ROC trials.

  4. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the

  5. Towards a national trauma registry for the United Arab Emirates

    Directory of Open Access Journals (Sweden)

    Barka Ezedin

    2010-07-01

    Full Text Available Abstract Background Trauma is a major health problem in the United Arab Emirates (UAE as well as worldwide. Trauma registries provide large longitudinal databases for analysis and policy improvement. We aim in this paper to report on the development and evolution of a national trauma registry using a staged approach by developing a single-center registry, a two-center registry, and then a multi-center registry. The three registries were established by developing suitable data collection forms, databases, and interfaces to these databases. The first two registries collected data for a finite period of time and the third is underway. The steps taken to establish these registries depend on whether the registry is intended as a single-center or multi-center registry. Findings Several issues arose and were resolved during the development of these registries such as the relational design of the database, whether to use a standalone database management system or a web-based system, and the usability and security of the system. The inclusion of preventive medicine data elements is important in a trauma registry and the focus on road traffic collision data elements is essential in a country such as the UAE. The first two registries provided valuable data which has been analyzed and published. Conclusions The main factors leading to the successful establishment of a multi-center trauma registry are the development of a concise data entry form, development of a user-friendly secure web-based database system, the availability of a computer and Internet connection in each data collection center, funded data entry personnel well trained in extracting medical data from the medical record and entering it into the computer, and experienced personnel in trauma injuries and data analysis to continuously maintain and analyze the registry.

  6. Effects of Role and Assignment Rationale on Attitudes Formed During Peer Tutoring.

    Science.gov (United States)

    Bierman, Karen Linn; Furman, Wyndol

    1981-02-01

    This study examined the role of contextual factors, such as assignment rationale, on the attitudinal effects of peer tutoring. Fourth-grade children engaged in brief tutoring experiences as either a tutor or tutee. Subjects received four rationales for being selected as tutor or tutee: (a) a competence rationale, (b) a physical characteristic rationale, (c) a chance rationale, or (d) no rationale. As predicted, tutors had more positive attitudes than tutees when they had been given a competence or physical characteristic rationale but not when the tutors were provided a chance rationale or no rationale. Additionally, the tutors' and tutees' attitudes were enhanced when no rationale was provided. Results are discussed in terms of their implications for a role-theory analysis of tutoring and their implications for applied programs.

  7. The Danish Multiple Sclerosis Registry. History, data collection and validity

    DEFF Research Database (Denmark)

    Koch-Henriksen, N; Rasmussen, S; Stenager, E

    2001-01-01

    The Danish Multiple Sclerosis Registry was formally established in 1956 but started operating in 1949 with a nationwide prevalence survey. Since then, the Registry has continued collecting data on new and old cases of multiple sclerosis (MS) or suspected MS from multiple sources. The Registry...... has formerly been estimated at about 90%, higher for cohorts with older onset and lower for cohorts with onset close to follow-up. The estimated validity of the diagnosis for autopsy cases classified as definite MS in the Registry is 94%. A long-term nationwide Registry has proved to be a valuable...

  8. The Italian Registry of kernicterus and hyperbilirubinaemia.

    Science.gov (United States)

    Pratesi, Simone; Dani, Carlo; Raimondi, Francesco; Romagnoli, Costantino

    2012-10-01

    to monitor the incidence of cases of kernicterus and severe hyperbilirubinemia in Italy over time, and to describe each single registered event with sufficient information in order to identify one or more possible failures in the management of jaundice. the Task Force on hyperbilirubinemia of the Italian Society of Neonatology will draw up national guidelines for management of jaundice in the newborn and a national registry of kernicterus and hyperbilirubinemia for newborns with a gestational age greater than 34. the choice of the inclusion criteria for the registry and the minimum information necessary to describe each single event registered are reported and will be discussed at the national congress of the Italian Society of Neonatology next October 2012.

  9. The Danish Neuro-Oncology Registry

    DEFF Research Database (Denmark)

    Hansen, Steinbjørn; Nielsen, Jan; Laursen, René J

    2016-01-01

    BACKGROUND: The Danish Neuro-Oncology Registry (DNOR) is a nationwide clinical cancer database that has prospectively registered data on patients with gliomas since January 2009. The purpose of this study was to describe the establishment of the DNOR and further to evaluate the database...... Pathology Registry. The data validity of important clinical variables was evaluated by a random sample of 100 patients from the DNOR using the medical records as reference. RESULTS: A total of 2241 patients were registered in the DNOR by December 2014 with an overall patient completeness of 92 %, which...... of patient registration was very high (92 %) and the validity of the most important patient data was good. The DNOR is a newly established national database, which is a reliable source for future scientific studies and clinical quality assessments among patients with gliomas....

  10. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  11. Power analysis attacks revealing the secrets of smart cards

    CERN Document Server

    Mangard, Stefan; Popp, Thomas

    2008-01-01

    A comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. It discusses simple and differential power analysis as well as advanced techniques like template attacks.

  12. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  13. Fault Analysis Attacks and Its Countermeasure using Elliptic Curve Cryptography

    OpenAIRE

    M. Prabu; R. Shanmugalakshmi

    2010-01-01

    In the last decade, many researchers had published the overall analysis attacks of cryptographic devices against implementation on elliptic curve attacks. Usually such type of information is not sufficient to learn about the individual attacks. Now in this article, we indisputably concentrated on fault analysis attack and its countermeasure.

  14. Modelling Social-Technical Attacks with Timed Automata

    NARCIS (Netherlands)

    David, Nicolas; David, Alexandre; Hansen, René Rydhof; Larsen, K.G.; Legay, Axel; Olesen, Mads Chr.; Probst, Christian W.

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In

  15. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked...

  16. An active registry for bioinformatics web services.

    Science.gov (United States)

    Pettifer, S; Thorne, D; McDermott, P; Attwood, T; Baran, J; Bryne, J C; Hupponen, T; Mowbray, D; Vriend, G

    2009-08-15

    The EMBRACE Registry is a web portal that collects and monitors web services according to test scripts provided by the their administrators. Users are able to search for, rank and annotate services, enabling them to select the most appropriate working service for inclusion in their bioinformatics analysis tasks. Web site implemented with PHP, Python, MySQL and Apache, with all major browsers supported. (www.embraceregistry.net).

  17. Development of a PTSD Population Registry

    Science.gov (United States)

    2012-09-01

    experience in design of clinical trials and observational studies, and has published more than 200 articles in peer-review journals. He has served on...Statistics Team Leader at the DCC. She is also currently the Principal Investigator of the Pediatric Cardiomyopathy Registry (PCMR) Data Coordinating...PsycINFO database for articles related to the prevalence, epidemiology, or screening of PTSD among armed forces personnel and veterans. We identified

  18. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  19. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  20. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  1. Infective endocarditis in the real world: the Italian Registry of Infective Endocarditis (Registro Italiano Endocardite Infettiva - RIEI).

    Science.gov (United States)

    Cecchi, Enrico; Imazio, Massimo; De Rosa, Francesco Giuseppe; Chirillo, Fabio; Enia, Francesco; Pavan, Daniela; Cecconi, Moreno; Squeri, Angelo; Trinchero, Rita

    2008-05-01

    In the last 30 years, major improvements have been made in understanding the pathogenesis, diagnosis and treatment of infective endocarditis. Nevertheless, mortality still remains high, close to 30-40% at 1 year, and its reduction remains the main challenge. Moreover, important epidemiological changes have been recorded. Social changes in Western countries have led to an increase in the mean length of life, and thus in degenerative valvular diseases, whereas rheumatic heart disease has almost disappeared. Increasing medicalization has led to a rise in complications and diseases related to longer hospital stay, surgical therapies and other invasive interventions. At the same time, there is an increase in immunosuppressive therapies, diseases such as cancer, diabetes mellitus and renal insufficiency that may enhance the disease. Further knowledge is needed for specific subgroups to improve both treatment and prognosis. Nevertheless, randomized trials are lacking to guide the management of the disease, and the role and indications of antibiotic prophylaxis are still the subject of debate. International multicenter studies are providing new important findings based on the experience of tertiary centers; these results may reflect referral biases. The proposal of an Italian national registry on infective endocarditis (RIEI) will overcome these limitations and provide a wide picture of the national presentation of the disease. The aim of the registry is to improve the management of infective endocarditis, through a better understanding of demographic, clinical, therapeutic and prognostic features of the disease in the real world. The background, rationale, aims and expected results of the registry are reviewed.

  2. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    2017-01-01

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  3. Policymaking through healthcare registries in Sweden.

    Science.gov (United States)

    Örnerheim, Mattias

    2016-09-04

    Healthcare registries, otherwise known in Sweden as national quality registries (NQRs), have progressed from being a patient-focused system supporting medical results to become the basis of a health policy steering instrument called regional comparisons (RCs). This article seeks to explain RCs as an unintended consequence of the NQR development, by utilizing the concepts of policy entrepreneurs and streams of impact: the problem stream (problem perceived), the policy stream (what is valid), and the political stream (governmental objectives). The empirical contribution lies in insights on how the RCs have developed as an unintended consequence of entrepreneurial deliberate action in the process of creating NQRs. These findings are based on documents, interviews, and previous research in the social sciences. The article also argues for a critical understanding of public knowledge management (PKM) related to experiences in the development of NQRs regarding how to use knowledge in healthcare government. This article highlights how knowledge generated in quality systems based on registries could imply a stronger role for authorities in exerting control over the medical profession. It also discusses the potential use of research evidence on NQRs as a base for more efficient policymaking. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  4. Forensic Analysis of the Windows 7 Registry

    Directory of Open Access Journals (Sweden)

    Khawla Abdulla Alghafli

    2010-12-01

    Full Text Available The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic analysis process and the recovery of digital evidence may take less time than would otherwise be required. In this paper, the Registry structure of Windows 7 is discussed together with several elements of information within the Registry of Windows 7 that may be valuable to a forensic investigator. These elements were categorized into five groups which are system, application, networks, attached devices and the history lists. We have discussed the values of identified elements to a forensic investigator. Also, a tool was implemented to perform the function of extracting these elements and presents them in usable form to a forensics investigator.

  5. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  6. Climate Model Ensemble Methodology: Rationale and Challenges

    Science.gov (United States)

    Vezer, M. A.; Myrvold, W.

    2012-12-01

    A tractable model of the Earth's atmosphere, or, indeed, any large, complex system, is inevitably unrealistic in a variety of ways. This will have an effect on the model's output. Nonetheless, we want to be able to rely on certain features of the model's output in studies aiming to detect, attribute, and project climate change. For this, we need assurance that these features reflect the target system, and are not artifacts of the unrealistic assumptions that go into the model. One technique for overcoming these limitations is to study ensembles of models which employ different simplifying assumptions and different methods of modelling. One then either takes as reliable certain outputs on which models in the ensemble agree, or takes the average of these outputs as the best estimate. Since the Intergovernmental Panel on Climate Change's Fourth Assessment Report (IPCC AR4) modellers have aimed to improve ensemble analysis by developing techniques to account for dependencies among models, and to ascribe unequal weights to models according to their performance. The goal of this paper is to present as clearly and cogently as possible the rationale for climate model ensemble methodology, the motivation of modellers to account for model dependencies, and their efforts to ascribe unequal weights to models. The method of our analysis is as follows. We will consider a simpler, well-understood case of taking the mean of a number of measurements of some quantity. Contrary to what is sometimes said, it is not a requirement of this practice that the errors of the component measurements be independent; one must, however, compensate for any lack of independence. We will also extend the usual accounts to include cases of unknown systematic error. We draw parallels between this simpler illustration and the more complex example of climate model ensembles, detailing how ensembles can provide more useful information than any of their constituent models. This account emphasizes the

  7. A Rationale for Writing Rationales: Advice to (and Comments on) Teachers Who Don't See Any Point in Writing Rationales.

    Science.gov (United States)

    Donelson, Ken

    1982-01-01

    Reasons are discussed for requiring high school English teachers to write rationales justifying the inclusion of all books (controversial or not) assigned and read in the classroom. The reasons include communicating with students and parents, providing evidence of the teachers's concern and knowledge, and preparing for censorship disagreements.…

  8. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property......In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...

  9. Limb-shaking transient ischemic attack

    Directory of Open Access Journals (Sweden)

    Abhijit Das

    2013-01-01

    Full Text Available Limb shaking Transient Ischemic Attack is a rare manifestation of carotid-occlusive disease. The symptoms usually present with seizure like activity and often misdiagnosed as focal seizures. Only on careful history the important clinical clues-which may help in differentiating from seizure-are revealed: Lack of Jacksonian march or aura; precipitation by maneuvers that lead to carotid compression. We present the case of an elderly gentleman with recurrent limb shaking transient ischemic attacks that was initially diagnosed as a case of epilepsy. His symptoms responded to optimization of blood pressure. The case report highlights the importance of accurate diagnosis as the treatment of the associated carotid artery occlusion may not only abolish the attacks but also reduce the risk of future stroke.

  10. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... twisted polynomials from Ore rings as forgery polynomials. We show how to construct sparse forgery polynomials with full control over the sets of roots. We also achieve complete and explicit disjoint coverage of the key space by these polynomials. We furthermore leverage this new construction...

  11. Conditional beam splitting attack on quantum key distribution

    OpenAIRE

    Calsamiglia, John; Barnett, Stephen M.; Lütkenhaus, Norbert

    2001-01-01

    We present a novel attack on quantum key distribution based on the idea of adaptive absorption [calsam01]. The conditional beam splitting attack is shown to be much more efficient than the conventional beam spitting attack, achieving a performance similar to the, powerful but currently unfeasible, photon number splitting attack. The implementation of the conditional beam splitting attack, based solely on linear optical elements, is well within reach of current technology.

  12. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    Science.gov (United States)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  13. Viden: Attacker Identification on In-Vehicle Networks

    OpenAIRE

    Cho, Kyong-Tak; Shin, Kang

    2017-01-01

    Various defense schemes --- which determine the presence of an attack on the in-vehicle network --- have recently been proposed. However, they fail to identify which Electronic Control Unit (ECU) actually mounted the attack. Clearly, pinpointing the attacker ECU is essential for fast/efficient forensic, isolation, security patch, etc. To meet this need, we propose a novel scheme, called Viden (Voltage-based attacker identification), which can identify the attacker ECU by measuring and utilizi...

  14. Survival of child after lion attack

    OpenAIRE

    Carlos F Dabdoub; Dabdoub, Carlos B.; Chavez, Mario; Molina, Felipe

    2013-01-01

    Background: Injuries to humans caused by attacks from large predators are very rare, especially in the United States, Europe, or Latin America. A few cases were reported on accidents in zoos or animal farms, being very uncommon in children. The purposes of this report include describing the case of a child who sustained an attack by a lion named ?Bang-Bang?, which resulted in injuries to the head, chest, and abdomen, as well as the subsequent neurosurgical treatment and providing a review of ...

  15. Clinical patient registry recruitment and retention: a survey of patients in two chronic disease registries

    Directory of Open Access Journals (Sweden)

    Daniel H. Solomon

    2017-04-01

    Full Text Available Abstract Background The collection of routine clinical data in the setting of research registries can serve an important role in understanding real world care. However, relatively little is known about the patient experience in registries, motivating us to survey patients enrolled in two chronic disease registries. Methods We conducted similar surveys in two disease-based registries based at one academic medical center in the US. One group of patients with rheumatoid arthritis (RA had been enrolled in a registry, and we focused on retention factors. In a second group of patients with inflammatory bowel disease (IBD recently enrolled or considering enrollment, we examined factors that would influence their enrollment and willingness to answer frequent questionnaires and give biospecimens. The surveys were analyzed using descriptive statistics and the two cohorts were compared using nonparametric and chi-square tests. Results We received 150 (50% completed surveys from RA and 169 (63% from IBD patients. Mean age of subjects was 62 years in RA and 43 in IBD with more women respondents with RA (83% than IBD (62%. The two groups described very similar factors as the top three motivations for participation: desire to help others, desire to improve care of own disease, and ease of volunteering. Preferred methods of surveying included mail, e-mail, but telephone was not favored; age was an important correlate of this preference. Respondents preferred surveys either every 1–3 months (28.7% RA and 55.0% IBD or every 4–6 months (50.7% RA and 29.0% IBD. They differed in the preference for payment for answering surveys with 68.0% with RA answering that no payment was necessary but only 36.1% with IBD felt similarly. Conclusions Patients engaged in clinical registries demonstrate a high level of commitment to improve care and many report a willingness to answer questions relatively frequently.

  16. Clinical patient registry recruitment and retention: a survey of patients in two chronic disease registries.

    Science.gov (United States)

    Solomon, Daniel H; Shadick, Nancy A; Weinblatt, Michael E; Frits, Michelle; Iannaccone, Christine; Zak, Agnes; Korzenik, Joshua R

    2017-04-17

    The collection of routine clinical data in the setting of research registries can serve an important role in understanding real world care. However, relatively little is known about the patient experience in registries, motivating us to survey patients enrolled in two chronic disease registries. We conducted similar surveys in two disease-based registries based at one academic medical center in the US. One group of patients with rheumatoid arthritis (RA) had been enrolled in a registry, and we focused on retention factors. In a second group of patients with inflammatory bowel disease (IBD) recently enrolled or considering enrollment, we examined factors that would influence their enrollment and willingness to answer frequent questionnaires and give biospecimens. The surveys were analyzed using descriptive statistics and the two cohorts were compared using nonparametric and chi-square tests. We received 150 (50%) completed surveys from RA and 169 (63%) from IBD patients. Mean age of subjects was 62 years in RA and 43 in IBD with more women respondents with RA (83%) than IBD (62%). The two groups described very similar factors as the top three motivations for participation: desire to help others, desire to improve care of own disease, and ease of volunteering. Preferred methods of surveying included mail, e-mail, but telephone was not favored; age was an important correlate of this preference. Respondents preferred surveys either every 1-3 months (28.7% RA and 55.0% IBD) or every 4-6 months (50.7% RA and 29.0% IBD). They differed in the preference for payment for answering surveys with 68.0% with RA answering that no payment was necessary but only 36.1% with IBD felt similarly. Patients engaged in clinical registries demonstrate a high level of commitment to improve care and many report a willingness to answer questions relatively frequently.

  17. Recent trends in population-based cancer registries in Japan: the Act on Promotion of Cancer Registries and drastic changes in the historical registry.

    Science.gov (United States)

    Matsuda, Tomohiro; Sobue, Tomotaka

    2015-02-01

    Cancer registration in Japan has a long history spanning over 60 years; the first population-based cancer registry was established in Miyagi prefecture in 1951. The progress made in the regional population-based cancer registries in terms of standardization and quality improvement during the 10 years of the third comprehensive strategy for cancer control was highlighted in the history of cancer registration in Japan. However, there were still weak points regarding local government-oriented cancer registries that remained, e.g., the reporting of cancer cases to the population-based cancer registries was not a mandatory task for medical institutions. After the Cancer Control Act in 2006, the Act on Promotion of Cancer Registries was finally enacted in Japan on December 6, 2013. According to that Act, hospital managers must report information on any primary cancer that was first diagnosed in their institutions from January 1, 2016 to the prefectural governors. Given the increasing number of cases and amount of information recorded, it would have been almost impossible to maintain our cancer registries using the same system, and changes were required to obtain reliable cancer statistics. This was particularly important in Japan, because the country is facing a hyper-aging society, with two to three million cancer patients requiring entry of detailed information. We appreciate the long history of the Japanese cancer registry, but it is necessary to make dramatic changes to bring the registry up to date and to be able to track the increasing amount of information.

  18. Rationale-Augmented Convolutional Neural Networks for Text Classification.

    Science.gov (United States)

    Zhang, Ye; Marshall, Iain; Wallace, Byron C

    2016-11-01

    We present a new Convolutional Neural Network (CNN) model for text classification that jointly exploits labels on documents and their constituent sentences. Specifically, we consider scenarios in which annotators explicitly mark sentences (or snippets) that support their overall document categorization, i.e., they provide rationales. Our model exploits such supervision via a hierarchical approach in which each document is represented by a linear combination of the vector representations of its component sentences. We propose a sentence-level convolutional model that estimates the probability that a given sentence is a rationale, and we then scale the contribution of each sentence to the aggregate document representation in proportion to these estimates. Experiments on five classification datasets that have document labels and associated rationales demonstrate that our approach consistently outperforms strong baselines. Moreover, our model naturally provides explanations for its predictions.

  19. [The medical rationale category and a new epistemology in health].

    Science.gov (United States)

    do Nascimento, Marilene Cabral; de Barros, Nelson Filice; Nogueira, Maria Inês; Luz, Madel Therezinha

    2013-12-01

    This article is an analytical report on the 20-year trajectory of the 'medical rationale' category that emerged in the early 1990s in the area of Social and Human Sciences in Health in the field of Public Health. Its objective was to study complex and therapeutic medical systems and traditional, complementary and alternative medicines. Based on a critical review of the literature, it presents some aspects of the cultural, political, institutional and social context of its emergence, as well as its main contributions and developments on a theoretical level and on social policies and practices in health. The southern epistemology concept of Boaventura de Sousa Santos is used to reflect upon the contribution of the 'medical rationale' category to the critique of the post-modern scientific rationale and to the creation of a new epistemology in health.

  20. Collaborative Design Rationale And Social Creativity In Cultures Of Participation

    Directory of Open Access Journals (Sweden)

    Gerhard Fischer

    2011-01-01

    Full Text Available The rise in social computing has facilitated a shift from consumer cultures, focused on producing finished media to be consumed passively, to cultures of participation, where people can access the means to participate actively in personally meaningful problems. These developments represent unique and fundamental opportunities and challenges for rethinking and reinventing design rationale and creativity, as people acclimate to taking part in computer-mediated conversations of issues and their solutions. Grounded in our long-term research exploring these topics, this paper articulates arguments, describes and discusses conceptual frameworks and system developments (in the context of three case studies, and provides evidence that design rationale and creativity need not be at odds with each other. Coordinating and integrating collective design rationale and social creatively provide new synergies and opportunities, particularly amid complex, open-ended, and ill-defined design problems requiring contributions and collaboration of multiple stakeholders supported by socio-technical environments in cultures of participation.

  1. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz. Exit from Hell? Re- ducing the Impact of Amplification DDoS Attacks. In Proceedings of...Revisiting Network Protocols for DDoS Abuse. In 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA

  2. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available -1 International Journal of Cyber Warfare and Terrorism, vol. 6(3), 65-78 Using an Ontology for Network Attack Planning Renier van Heerden1,2, Peter Chan2 , Louise Leenen2,3 Jacques Theron4 1 Nelson Mandela Metropolitan University, South Africa 2...

  3. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  4. Cyber Attack! Crime or Act of War?

    Science.gov (United States)

    2011-04-13

    informational, or economic.54 Other legal scholars concur in this interpretation, one using the term ― agressive force‖ in lieu of ―armed force‖ but...distributed whiteboard to determine legal responses to online cyber attacks. Internet Research 16, no. 5, (October 20): 475-490. http

  5. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  6. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  7. Management of an acute asthma attack.

    Science.gov (United States)

    Barnard, Amanda

    2005-07-01

    Despite a more proactive approach to asthma management, which includes an increased range of drugs, wide dissemination of guidelines, and the use of asthma action plans, an acute severe asthma attack is one of the most common emergencies a general practitioner will encounter. This article discusses the management of an acute asthma attack in the general practice setting. Assessment of severity is vital and can be ascertained quite quickly with a brief history and rapid physical examination. It is important to remember that wheeze is an unreliable indicator of the severity of attack and may be absent in severe asthma. The cornerstones of treatment are oxygen and inhaled beta 2 agonists. Beta 2 agonists can be given continuously in severe life threatening asthma. Early administration of systemic steroids is important. Patients discharged to home after treatment of an asthma attack require close follow up including beta 2 agonists for symptom control, review of medications including a consideration of a short course of oral steroids, a written asthma action plan and detailed advice about what to do in case of deterioration in the next 24 hours. They should be reviewed in 24-48 hours.

  8. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... other risk factors. Overweight and obese adults with risk factors for cardiovascular disease such as high blood pressure, high cholesterol, ... over 40, or if you have multiple risk factors, work especially closely with ... cardiovascular disease. Heart attack prevention should begin early in ...

  9. Afghanistan: Green-on-Blue Attacks

    Science.gov (United States)

    2013-05-02

    spike-insider-attacks- stress- ramadan - fasting , 24 August 2012 37 Yousafzai, Sami and Moreau, Ron, http://www.thedailybeast.com/newsweek/2012/08/26...Ramazan.” “And so the daily pressures that are on some of these [Afghan] troops, compounded by the sacrifice associated with fasting , the nature of

  10. Survival of child after lion attack

    Science.gov (United States)

    Dabdoub, Carlos F.; Dabdoub, Carlos B.; Chavez, Mario; Molina, Felipe

    2013-01-01

    Background: Injuries to humans caused by attacks from large predators are very rare, especially in the United States, Europe, or Latin America. A few cases were reported on accidents in zoos or animal farms, being very uncommon in children. The purposes of this report include describing the case of a child who sustained an attack by a lion named “Bang-Bang”, which resulted in injuries to the head, chest, and abdomen, as well as the subsequent neurosurgical treatment and providing a review of the literature. Case Description: We report the case of an 8-year-old boy who was attacked by a lion during a circus show. The patient underwent an emergent neurosurgical procedure, including parietal craniectomy, cleaning, and extensive surgical debridement of the wounds. Despite open severe head trauma with brain damage as well as thorax and abdomen trauma, the child survived, with minimal neurological sequelae. Conclusions: Human injury resulting from encounters with nondomesticated animals is increasingly rising throughout the world. This case highlights the potentially violent and aggressive nature of wild mammals held in captivity. Unusual wild animal attacks and the complex injuries that result may pose a challenge to surgeons practicing in resource-limited settings. In this sense, the best treatment in the mentioned case is the prevention of human injuries by these animals. In addition, to attend to these infrequent cases, the authors emphasize the importance of a multidisciplinary approach to achieve the best cosmetic and functional results. PMID:23869277

  11. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  12. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  13. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  14. Plant defences against herbivore and insect attack

    Science.gov (United States)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  15. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  16. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  17. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  18. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  19. National registry of hemoglobinopathies in Spain (REPHem).

    Science.gov (United States)

    Cela, Elena; Bellón, José M; de la Cruz, María; Beléndez, Cristina; Berrueco, Rubén; Ruiz, Anna; Elorza, Izaskun; Díaz de Heredia, Cristina; Cervera, Aurea; Vallés, Griselda; Salinas, J Antonio; Coll, M Teresa; Bermúdez, Mar; Prudencio, Marta; Argilés, Bienvenida; Vecilla, Cruz

    2017-07-01

    Although highly prevalent throughout the world, the accurate prevalence of hemoglobinopathies in Spain is unknown. This study presents data on the national registry of hemoglobinopathies of patients with thalassemia major (TM), thalassemia intermedia (TI), and sickle cell disease (SCD) in Spain created in 2014. Fifty centers reported cases retrospectively. Data were registered from neonatal screening or from the first contact at diagnosis until last follow-up or death. Data of the 715 eligible patients were collected: 615 SCD (497 SS, 64 SC, 54 SBeta phenotypes), 73 thalassemia, 9 CC phenotype, and 18 other variants. Most of the SCD patients were born in Spain (65%), and 51% of these were diagnosed at newborn screening. Median age at the first diagnosis was 0.4 years for thalassemia and 1.0 years for SCD. The estimated incidence was 0.002 thalassemia cases and 0.03 SCD cases/1,000 live births. Median age was 8.9 years (0.2-33.7) for thalassemia and 8.1 years (0.2-32.8) for SCD patients. Stroke was registered in 16 SCD cases. Transplantation was performed in 43 TM and 23 SCD patients at a median age of 5.2 and 7.8 years, respectively. Twenty-one patients died (3 TM, 17 SCD, 1 CC) and 200 were lost to follow-up. Causes of death were related to transplantation in three patients with TM and three patients with SCD. Death did not seem to be associated with SCD in six patients, but nine patients died secondary to disease complications. Overall survival was 95% at 15 years of age. The registry provides data about the prevalence of hemoglobinopathies in Spain and will permit future cohort studies and the possibility of comparison with other registries. © 2016 Wiley Periodicals, Inc.

  20. Danish Registry of Childhood and Adolescent Diabetes

    Directory of Open Access Journals (Sweden)

    Svensson J

    2016-10-01

    Full Text Available Jannet Svensson,1 Charlotte Cerqueira,2 Per Kjærsgaard,3 Lene Lyngsøe,4 Niels Thomas Hertel,5 Mette Madsen,6 Henrik B Mortensen,1 Jesper Johannesen1 1Pediatric and Adolescent Department, Copenhagen University Hospital, Herlev and Gentofte, Herlev, 2Registry Support Centre (East – Epidemiology and Biostatistics, Research Centre for Prevention and Health, Capital Region of Denmark, Glostrup, 3Pediatric Department, County Hospital Herning, Herning, 4Pediatric and Adolescent Department, Nordsjællands Hospital, Hillerød, 5HC Andersen Childrens Hospital, Odense University Hospital, Odense, 6Pediatric Department, Aalborg University Hospital, Aalborg, Denmark Aim: The aims of the Danish Registry of Childhood and Adolescent Diabetes (DanDiabKids are to monitor and improve the quality of care for children and adolescents with diabetes in Denmark and to follow the incidence and prevalence of diabetes. Study population: The study population consists of all children diagnosed with diabetes before the age of 15 years since 1996. Since 2015, every child followed up at a pediatric center (<18 years of age will be included. Main variables: The variables in the registry are the quality indicators, demographic variables, associated conditions, diabetes classification, family history of diabetes, growth parameters, self-care, and treatment variables. The quality indicators are selected based on international consensus of measures of good clinical practice. The indicators are metabolic control as assessed by HbA1c, blood pressure, albuminuria, retinopathy, neuropathy, number of severe hypoglycemic events, and hospitalization with ketoacidosis. Descriptive data: The number of children diagnosed with diabetes is increasing with ~3% per year mainly for type 1 diabetes (ie, 296 new patients <15 years of age were diagnosed in 2014. The disease management has changed dramatically with more children treated intensively with multiple daily injections, insulin pumps

  1. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  2. The Italian registry of cystic echinococcosis (RIEC): the first prospective registry with a European future.

    Science.gov (United States)

    Tamarozzi, F; Rossi, P; Galati, F; Mariconti, M; Nicoletti, G J; Rinaldi, F; Casulli, A; Pozio, E; Brunetti, E

    2015-05-07

    Cystic echinococcosis (CE), a worldwide zoonosis, is highly endemic in southern and eastern Europe. Its actual prevalence is unknown due to the lack of efficient reporting systems designed to take into account the particular features of the disease. Neglect of CE makes diagnosis and clinical management difficult outside referral centres, with inconsistencies in clinical practice and often unnecessary procedures carried out that have associated risks and costs. The Italian registry of CE (RIEC) is a prospective multicentre registry of CE patients seen from January 2012 in Italian health centres; data are voluntarily submitted to the registry. Its aims are to show the prevalence of CE in Italy, bring the importance of this infection to the attention of health authorities, encourage public health policies towards its control, and stimulate biological, epidemiological and clinical research on CE. From January 2012 to February 2014, a total 346 patients were enrolled in 11 centres, outnumbering national reports of many CE-endemic European countries. We discuss preliminary data and challenges of the RIEC, template for the European registry of CE, which has been implemented within the Seventh Framework Programme project HERACLES (Human cystic Echinococcosis ReseArch in CentraL and Eastern Societies) since September 2014.

  3. eRegistries: governance for electronic maternal and child health registries.

    Science.gov (United States)

    Myhre, Sonja L; Kaye, Jane; Bygrave, Lee A; Aanestad, Margunn; Ghanem, Buthaina; Mechael, Patricia; Frøen, J Frederik

    2016-09-23

    The limited availability of maternal and child health data has limited progress in reducing mortality and morbidity among pregnant women and children. Global health agencies, leaders, and funders are prioritizing strategies that focus on acquiring high quality health data. Electronic maternal and child health registries (eRegistries) offer a systematic data collection and management approach that can serve as an entry point for preventive, curative and promotive health services. Due to the highly sensitive nature of reproductive health information, careful consideration must be accorded to privacy, access, and data security. In the third paper of the eRegistries Series, we report on the current landscape of ethical and legal governance for maternal and child health registries in developing countries. This research utilizes findings from two web-based surveys, completed in 2015 that targeted public health officials and health care providers in 76 countries with high global maternal and child mortality burden. A sample of 298 public health officials from 64 countries and 490 health care providers from 59 countries completed the online survey. Based on formative research in the development of the eRegistries Governance Guidance Toolkit, the surveys were designed to investigate topics related to maternal and child health registries including ethical and legal issues. According to survey respondents, the prevailing legal landscape is characterized by inadequate data security safeguards and weak support for core privacy principles. Respondents from the majority of countries indicated that health information from medical records is typically protected by legislation although legislation dealing specifically or comprehensively with data privacy may not be in place. Health care provider trust in the privacy of health data at their own facilities is associated with the presence of security safeguards. Addressing legal requirements and ensuring that privacy and data security

  4. Compliance with the stroke education performance measure in the Michigan Paul Coverdell National Acute Stroke Registry.

    Science.gov (United States)

    Nickles, Adrienne; Fiedler, Jay; Roberts, Stacey; Lyon-Callo, Sarah; Hurst, Rochelle; Reeves, Mathew

    2013-05-01

    Stroke education, 1 of 8 endorsed stroke performance measures, consists of 5 specific subcomponents: risk factors, stroke warning signs, emergency medical service activation, physician follow-up, and discharge medications. We identified predictors of stroke education performance measure compliance in the Michigan Paul Coverdell National Acute Stroke Registry. Data were collected on 9609 acute stroke admissions to 20 registry hospitals during 2008 and 2009. Predictors of measure compliance (delivery of all 5 subcomponents) were determined using multivariable logistic regression. Overall compliance with the stroke education measure was 61.8% (hospital-level compliance ranged between 16% and 93%). Compliance with individual subcomponents were risk factors (65.5%), stroke warning signs (68.9%), emergency medical service activation (66.8%), physician follow-up (92.9%), and discharge medications (91.5%). Age, gender, stroke subtype, prestroke ambulation, discharge destination, and hospital size were all significant independent predictors of compliance. Stroke education was delivered less often to patients who were ≥ 70 years of age, nonambulatory prestroke, not discharged to home, had transient ischemic attack, or hemorrhagic stroke. Only 60% of patients received stroke education consistent with the endorsed performance measures. Strategies to increase stroke education, including the impact of incorporating stroke-specific education measures into hospital care protocols, should be explored.

  5. Evaluating the completeness of the national ALS registry, United States.

    Science.gov (United States)

    Kaye, Wendy E; Wagner, Laurie; Wu, Ruoming; Mehta, Paul

    2017-10-11

    Our objective was to evaluate the completeness of the United States National ALS Registry (Registry). We compared persons with ALS who were passively identified by the Registry with those actively identified in the State and Metropolitan Area ALS Surveillance project. Cases in the two projects were matched using a combination of identifiers, including, partial social security number, name, date of birth, and sex. The distributions of cases from the two projects that matched/did not match were compared and Chi-square tests conducted to determine statistical significance. There were 5883 ALS cases identified by the surveillance project. Of these, 1116 died before the Registry started, leaving 4767 cases. We matched 2720 cases from the surveillance project to those in the Registry. The cases identified by the surveillance project that did not match cases in the Registry were more likely to be non-white, Hispanic, less than 65 years of age, and from western states. The methods used by the Registry to identify ALS cases, i.e. national administrative data and self-registration, worked well but missed cases. These findings suggest that developing strategies to identify and promote the Registry to those who were more likely to be missing, e.g. non-white and Hispanic, could be beneficial to improving the completeness of the Registry.

  6. HEREDITARY COLORECTAL CANCER REGISTRY: A CLEVELAND CLINIC FOUNDATION EXPERIENCE

    Directory of Open Access Journals (Sweden)

    J Church, MBCHB

    2017-07-01

    SUMMARY: the Cleveland Clinic approach to hereditary colorectal cancer is described. This is multidisciplinary, involving several specialties and both genetic counseling and mental health services within the registry.

  7. Words Mean Things: The Case for Information System Attack and Control System Attack

    Science.gov (United States)

    2008-10-31

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Words Mean Things: The Case for Information System Attack and Control System...Standard Form 298 (Rev. 8-98) NAVAL WAR COLLEGE Newport, R.I. WORDS MEAN THINGS: THE CASE FOR INFORMATION SYSTEM ATTACK AND... words , the DepSecDef definition acknowledges the existence of a new domain, but strongly implies the accepted definition of CNO is sufficient to

  8. Chosen-name attacks: An overlooked class of type-flaw attacks

    OpenAIRE

    Ceelen, Pieter; Mauw, Sjouke; Radomirovic, Sasa

    2008-01-01

    In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all significant protocol verification frameworks based on formal methods. We identify and classify new type-flaw attacks arising from this capability. Several examples of protocols that are vulnerable to this type of attack are given, including Lowe’s modification of KSL. The consequences for automa...

  9. The Danish National Multiple Myeloma Registry.

    Science.gov (United States)

    Gimsing, Peter; Holmström, Morten O; Klausen, Tobias Wirenfelt; Andersen, Niels Frost; Gregersen, Henrik; Pedersen, Robert Schou; Plesner, Torben; Pedersen, Per Trøllund; Frederiksen, Mikael; Frølund, Ulf; Helleberg, Carsten; Vangsted, Annette; de Nully Brown, Peter; Abildgaard, Niels

    2016-01-01

    The Danish National Multiple Myeloma Registry (DMMR) is a population-based clinical quality database established in January 2005. The primary aim of the database is to ensure that diagnosis and treatment of plasma cell dyscrasia are of uniform quality throughout the country. Another aim is to support research. Patients are registered with their unique Danish personal identification number, and the combined use of DMMR, other Danish National registries, and the Danish National Cancer Biobank offers a unique platform for population-based translational research. All newly diagnosed patients with multiple myeloma (MM), smoldering MM, solitary plasmacytomas, and plasma cell leukemia in Denmark are registered annually; ~350 patients. Amyloid light-chain amyloidosis, POEMS syndrome (polyneuropathy, organomegaly, endocrinopathy, monoclonal gammopathy, and skin changes syndrome), monoclonal gammopathy of undetermined significance and monoclonal gammopathy of undetermined significance with polyneuropathy have been registered since 2014. The main registered variables at diagnosis are patient demographics, baseline disease characteristics, myeloma-defining events, clinical complications, prognostics, first- and second-line treatments, treatment responses, progression free, and overall survival. Up to June 2015, 2,907 newly diagnosed patients with MM, 485 patients with smoldering MM, 64 patients with plasma cell leukemia, and 191 patients with solitary plasmacytomas were registered. Registration completeness of new patients is ~100%. A data validation study performed in 2013-2014 by the Danish Myeloma Study Group showed >95% data correctness. The DMMR is a population-based data validated database eligible for clinical, epidemiological, and translational research.

  10. EPA Facility Registry Service (FRS): CAMDBS

    Science.gov (United States)

    This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link to the Clean Air Markets Division Business System (CAMDBS). Administered by the EPA Clean Air Markets Division, within the Office of Air and Radiation, CAMDBS supports the implementation of market-based air pollution control programs, including the Acid Rain Program and regional programs designed to reduce the transport of ozone. FRS identifies and geospatially locates facilities, sites or places subject to environmental regulations or of environmental interest. Using vigorous verification and data management procedures, FRS integrates facility data from EPA's national program systems, other federal agencies, and State and tribal master facility records and provides EPA with a centrally managed, single source of comprehensive and authoritative information on facilities. This data set contains the subset of FRS integrated facilities that link to CAMDBS facilities once the CAMDBS data has been integrated into the FRS database. Additional information on FRS is available at the EPA website https://www.epa.gov/enviro/facility-registry-service-frs.

  11. Thyroid Cancer and Tumor Collaborative Registry (TCCR).

    Science.gov (United States)

    Shats, Oleg; Goldner, Whitney; Feng, Jianmin; Sherman, Alexander; Smith, Russell B; Sherman, Simon

    2016-01-01

    A multicenter, web-based Thyroid Cancer and Tumor Collaborative Registry (TCCR, http://tccr.unmc.edu) allows for the collection and management of various data on thyroid cancer (TC) and thyroid nodule (TN) patients. The TCCR is coupled with OpenSpecimen, an open-source biobank management system, to annotate biospecimens obtained from the TCCR subjects. The demographic, lifestyle, physical activity, dietary habits, family history, medical history, and quality of life data are provided and may be entered into the registry by subjects. Information on diagnosis, treatment, and outcome is entered by the clinical personnel. The TCCR uses advanced technical and organizational practices, such as (i) metadata-driven software architecture (design); (ii) modern standards and best practices for data sharing and interoperability (standardization); (iii) Agile methodology (project management); (iv) Software as a Service (SaaS) as a software distribution model (operation); and (v) the confederation principle as a business model (governance). This allowed us to create a secure, reliable, user-friendly, and self-sustainable system for TC and TN data collection and management that is compatible with various end-user devices and easily adaptable to a rapidly changing environment. Currently, the TCCR contains data on 2,261 subjects and data on more than 28,000 biospecimens. Data and biological samples collected by the TCCR are used in developing diagnostic, prevention, treatment, and survivorship strategies against TC.

  12. The Danish Knee Ligament Reconstruction Registry

    Directory of Open Access Journals (Sweden)

    Rahr-Wagner L

    2016-10-01

    Full Text Available Lene Rahr-Wagner, Martin Lind Department of Orthopaedic Surgery, Division of Sports Surgery, Aarhus University Hospital, Aarhus, Denmark Abstract: The Danish Knee Ligament Reconstruction Registry was established in 2005 as a web-based nationwide clinical database with the purpose of improving the monitoring and quality of both primary and revision knee ligament reconstructions in Denmark. All primary and revision anterior and posterior cruciate ligament reconstructions as well as collateral ligament and multiligament reconstructions are recorded. Main variables include sex, age, cause of injury, objective ligament instability, and surgical data, such as affected ligament, graft- and implant choice, operation technique among other things. The operating surgeon prospectively collects the data. Hence, detailed preoperative, intraoperative, and 1-year follow-up data are recorded by the operating surgeon using a standardized form and a secured Internet portal. The number of procedures registered in the database each year is ~2,500 and the first 9 years, in total, 22,775 procedures have been registered. Since the beginning of the database multiple papers have been published in international peer-reviewed journals, improving the knowledge of patients treated with knee ligament reconstruction surgery. This paper reviews the content, organization, and published research from the Danish Knee Ligament Reconstruction Registry. Keywords: ligament reconstruction, anterior cruciate ligament, operation technique, database, graft choice, femoral tunnel drilling, patient-reported outcome measure

  13. Protecting buildings from a biological or chemical attack: Actions to take before or during a release

    Energy Technology Data Exchange (ETDEWEB)

    Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

    2003-01-29

    This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

  14. Karl Popper and Jean Piaget: A Rationale for Constructivism

    Science.gov (United States)

    Harlow, Steve; Cummings, Rhoda; Aberasturi, Suzanne M.

    2006-01-01

    The current faddish use of the term constructivism has taken on as many different definitions as the number of people attempting to define it. This essay clarifies the meaning of constructivism through an examination of Karl Popper's and Jean Piaget's theories. The authors provide a rationale for the use of Popper's paradigm of "Three Worlds" and…

  15. Rationale for the Cultural Construction of School Mental Health Programming

    Science.gov (United States)

    Arora, Prerna G.; Nastasi, Bonnie K.; Leff, Stephen S.

    2017-01-01

    The implementation of evidence-based psychological programming to meet the needs of a global population has been impeded by the translation of theories and research findings across populations and settings without due consideration of cultural factors. The purpose of this article is to discuss the rationale for use of partnership-based methods in…

  16. Building "Applied Linguistic Historiography": Rationale, Scope, and Methods

    Science.gov (United States)

    Smith, Richard

    2016-01-01

    In this article I argue for the establishment of "Applied Linguistic Historiography" (ALH), that is, a new domain of enquiry within applied linguistics involving a rigorous, scholarly, and self-reflexive approach to historical research. Considering issues of rationale, scope, and methods in turn, I provide reasons why ALH is needed and…

  17. Introducing ICT in Schools in England: Rationale and Consequences

    Science.gov (United States)

    Hammond, Michael

    2014-01-01

    This paper provides a critical perspective on the attempts to promote the use of information and communication technology (ICT) in teaching and learning in England. It describes the rationale given for the introduction of ICT in terms of its potential to impact on educational standards to contribute to developing a curriculum which has more…

  18. The rationale of scored tablets as dosage form.

    NARCIS (Netherlands)

    Rodenhuis, N.; Smet, P.A.G.M. de; Barends, D.M.

    2004-01-01

    The aim of the study was to get insight into the rationale of scored tablets. This was pursued by studying patient's reasons for subdividing ("breaking") scored and unscored tablets. Patients who picked up their prescriptions in 5 community pharmacies in The Netherlands were questioned. Two-hundred

  19. Investing in Livestock to Drive Economic Growth in Africa: Rationale ...

    African Journals Online (AJOL)

    Investing in Livestock to Drive Economic Growth in Africa: Rationale and Priorities. S Nouala, U Pica-Ciamarra, J Otte, A N'guetta. Abstract. No Abstract. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL... for Researchers ...

  20. Rationale of Early Adopters of Fossil Fuel Divestment

    Science.gov (United States)

    Beer, Christopher Todd

    2016-01-01

    Purpose: This research uses the social science perspectives of institutions, ecological modernization and social movements to analyze the rationale used by the early-adopting universities of fossil fuel divestment in the USA. Design/methodology/approach: Through analysis of qualitative data from interviews with key actors at the universities that…

  1. Genomewide association studies: history, rationale, and prospects for psychiatric disorders.

    NARCIS (Netherlands)

    Franke, B.; Buitelaar, J.K.; Cichon, S.; Craddock, N.; Daly, M.; Faraone, S.V.; Gejman, P.V.; Kelsoe, J.; Lehner, T.; Levinson, D.F.; Moran, A.; Sklar, P.; Sullivan, P.F.

    2009-01-01

    OBJECTIVE: The authors conducted a review of the history and empirical basis of genomewide association studies (GWAS), the rationale for GWAS of psychiatric disorders, results to date, limitations, and plans for GWAS meta-analyses. METHOD: A literature review was carried out, power and other issues

  2. Rationale and scientific support for health claims on foods

    African Journals Online (AJOL)

    Nicky

    Rationale and scientific support for health claims on foods. The role of diet and physical activity in health has been increasingly documented and pinpointed as a major target for health-promoting strategies. The supply, availability, marketing and price of food products have a strong impact on consumers' diets.1 Therefore,.

  3. The biologic rationale for the use of lasers in dentistry.

    Science.gov (United States)

    Convissar, Robert A

    2004-10-01

    Dentists have a variety of wavelengths to choose from when purchasing a laser. Each wavelength has a unique interaction with the target tissues of the oral cavity. This article gives a rationale, grounded in sound biologic principles, for the use of different wavelengths in the oral cavity. Advantages and disadvantages of the various wavelengths for specific procedures are discussed.

  4. Oral Health Promotion in Schools: Rationale and Evaluation

    Science.gov (United States)

    Kizito, Alex; Caitlin, Meredith; Wang, Yili; Kasangaki, Arabat; Macnab, Andrew J.

    2014-01-01

    Purpose: The purpose of this paper is to explain the rationale and potential for the WHO health promoting schools (HPS) to improve children's oral health, and describe validated quantitative methodologies and qualitative approaches to measure program impact. Design/Methodology/Approach: Critical discussion of the impact of poor oral health and…

  5. Invitation to the Birthday Party: Rationale and Description

    Science.gov (United States)

    Ginsburg, Herbert P.; Pappas, Sandra

    2016-01-01

    Educators in many countries around the world have a strong interest in improving early childhood mathematics education, one component of which is formative assessment. Unlike summative assessment, this approach can provide teachers with information useful for understanding and teaching individual children. This paper describes the rationale for…

  6. "ComPost": A Writing Program Newsletter and Its Rationale.

    Science.gov (United States)

    Hall, Dennis R.

    1993-01-01

    Discusses the development and rationale of "ComPost," a weekly newsletter of the Composition Program at the University of Louisville. Suggests that a vehicle like ComPost can promote the communications that contribute to accomplishing collegiality and genuine program consensus. (RS)

  7. The Economic Rationale of Recycling Hybrid Seeds in Northern ...

    African Journals Online (AJOL)

    A survey of 126 farmers was conducted with the objective of evaluating the economic rationale for recycling hybrid maize seed in northern Tanzania. About 80% of the sample farmers recycled hybrid and open pollinated maize seeds for three to six years as response to cash constraint and to hedge against production and ...

  8. Architectural Knowledge and Rationale – Issues, Trends, Challenges

    NARCIS (Netherlands)

    Avgeriou, Paris; Kruchten, Philippe; Lago, Patricia; Grisham, Paul; Perry, Dewayne

    2007-01-01

    The second workshop on Sharing and Reusing Architectural Knowledge (SHARK) and Architecture rationale and Design intent (ADI) was held jointly with ICSE 2007 in Minneapolis. This report presents the themes of the workshop, summarizes the results of the discussions held, and suggests some topics for

  9. Meeting a Moral Imperative: A Rationale for Teaching the Holocaust

    Science.gov (United States)

    Lindquist, David H.

    2011-01-01

    A primary rationale for studying the Holocaust (Shoah) involves the opportunity to consider the moral implications that can be drawn from examining the event. Studying the Shoah forces students to consider what it means to be human and humane by examining the full continuum of individual behavior, from "ultimate evil" to "ultimate good". This…

  10. Implications for registry-based vaccine effectiveness studies from an evaluation of an immunization registry: A cross-sectional study

    Directory of Open Access Journals (Sweden)

    Shea Kimberly M

    2008-05-01

    Full Text Available Abstract Background Population-based electronic immunization registries create the possibility of using registry data to conduct vaccine effectiveness studies which could have methodological advantages over traditional observational studies. For study validity, the base population would have to be clearly defined and the immunization status of members of the population accurately recorded in the registry. We evaluated a city-wide immunization registry, focusing on its potential as a tool to study pertussis vaccine effectiveness, especially in adolescents. Methods We conducted two evaluations – one in sites that were active registry participants and one in sites that had implemented an electronic medical record with plans for future direct data transfer to the registry – of the ability to match patients' medical records to registry records and the accuracy of immunization records in the registry. For each site, records from current pediatric patients were chosen randomly. Data regarding pertussis-related immunizations, clinic usage, and demographic and identifying information were recorded; for 11–17-year-old subjects, information on MMR, hepatitis B, and varicella immunizations was also collected. Records were then matched, when possible, to registry records. For records with a registry match, immunization data were compared. Results Among 350 subjects from sites that were current registry users, 307 (87.7% matched a registry record. Discrepancies in pertussis-related data were common for up-to-date status (22.6%, number of immunizations (34.7%, dates (10.2%, and formulation (34.4%. Among 442 subjects from sites that planned direct electronic transfer of immunization data to the registry, 393 (88.9% would have matched a registry record; discrepancies occurred frequently in number of immunizations (11.9%, formulation (29.1%, manufacturer (94.4%, and lot number (95.1%. Inability to match and immunization discrepancies were both more common

  11. Use of administrative hospital registry data and a civil registry to measure survival and other outcomes after cancer

    Directory of Open Access Journals (Sweden)

    Sørensen HT

    2011-07-01

    Full Text Available Henrik Toft Sørensen, Timothy L LashDepartment of Clinical Epidemiology, Aarhus University Hospital, DK-8000 Aarhus, DenmarkFor many decades, cancer registries have been a cornerstone in monitoring cancer occurrence in different populations. Cancer registries in the Nordic countries are characterized by a high level of completeness and excellent data quality.1 Cancer diagnoses are often validated through several procedures, with documentation of clinical evidence for the diagnosis. Cancer registries have proven very useful in monitoring cancer incidence, contributing significantly to our understanding of its origin and development. Some registries also have been used to monitor cancer survival at the population level.1

  12. Diverticulitis Diet: Can Certain Foods Trigger an Attack?

    Science.gov (United States)

    ... there trigger foods I should avoid to prevent diverticulitis attacks? Answers from Katherine Zeratsky, R.D., L. ... Actually, no specific foods are known to trigger diverticulitis attacks. And no special diet has been proved ...

  13. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  14. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  15. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  16. Aspirin to Prevent a First Heart Attack or Stroke

    Science.gov (United States)

    ... NHLBI on Twitter. Aspirin to Prevent a First Heart Attack or Stroke Also known as aspirin primary prevention. ... if I’m taking aspirin to prevent another heart attack or stroke? The information discussed in Who may ...

  17. Heart Attack Risk Spikes After Respiratory Infection, Study Finds

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_165626.html Heart Attack Risk Spikes After Respiratory Infection, Study Finds Even ... May 16, 2017 (HealthDay News) -- The risk of heart attack increases sharply after a respiratory infection, a new ...

  18. Fatal First-Time Heart Attacks More Common in Blacks

    Science.gov (United States)

    ... gov/news/fullstory_167101.html Fatal First-Time Heart Attacks More Common in Blacks: Study Black men are ... likely than whites to die of a first heart attack, a new analysis suggests. Two out of three ...

  19. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  20. Reconceiving barriers for democratic health education in Danish schools: an analysis of institutional rationales

    DEFF Research Database (Denmark)

    Danielsen, Dina; Bruselius-Jensen, Maria; Laitch, Daniel

    2017-01-01

    rationales connected to formal and informal social processes and institutional purposes of schools, namely conservatism and Neoliberalism. It is empirically described and argued how these institutional rationales discourage teachers and students from including a broad and positive concept of health...

  1. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  2. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  3. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  4. Encouraging Health Information Management Graduates to Pursue Cancer Registry Careers.

    Science.gov (United States)

    Peterson, Jennifer

    2016-01-01

    The cancer registry profession has grown dramatically since its inception in 1926. Certified tumor registrars (CTRs) have become an integral part of the cancer care team by providing quality cancer data for research, statistical purposes, public health, and cancer control. In addition, CTRs have been found to be valuable in other cancer and health-related fields. Based on the need for high-quality, accurate data, the National Cancer Registrars Association (NCRA), the certification body for CTRs, has increased the educational requirement for eligibility for the CTR certification exam. This has resulted in fewer individuals who are able to meet the requirements for CTR certification. In addition, the existing cancer registry workforce is, on average, older than other allied health professions, and therefore will face an increasing number of retirements in the next few years. The high demand for CTRs, the decreased pool of CTR-eligible applicants, and the aging cancer registry workforce has resulted in an existing shortage that will only get worse as the population ages and the incidence of cancer increases. Health information management (HIM) students are well suited to pursuing further training in the cancer registry field and gaining the CTR credential. HIM students or new graduates have the needed skill set and education to pursue a cancer registry career. There are many avenues HIM educational programs can take to encourage students to pursue CTR certification and a cancer registry career. Including cancer registry functions in courses throughout the HIM curriculum, bringing in cancer registry speakers, encouraging networking, and promoting the cancer registry field and profession in general are just a few of the methods that HIM programs can use to raise awareness of and promote a cancer registry career to their students. Illinois State University has used these methods and has found them to be successful in encouraging a percentage of their graduates to pursue

  5. From Fault-tolerance to Attack Tolerance

    Science.gov (United States)

    2011-04-02

    AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Means to build fault - tolerant ...bottlenecks. We also implemented a distributed storage service that uses Byzantine Quo- rum Systems (rather than state machine replication) and employs...From Fault - tolerance to Attack Tolerance AFOSR Grant F9550-06-1-0019 Final Report 1 December 2005 – 30 November 2010 Fred B. Schneider Computer

  6. Collision attack against Tav-128 hash function

    Science.gov (United States)

    Hariyanto, Fajar; Hayat Susanti, Bety

    2017-10-01

    Tav-128 is a hash function which is designed for Radio Frequency Identification (RFID) authentication protocol. Tav-128 is expected to be a cryptographically secure hash function which meets collision resistance properties. In this research, a collision attack is done to prove whether Tav-128 is a collision resistant hash function. The results show that collisions can be obtained in Tav-128 hash function which means in other word, Tav-128 is not a collision resistant hash function.

  7. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    devices through a Trojan horse program. This method is highly technical; it requires sophisticated hardware, software and a highly skilled hacker...Symantec, a leading manufacturer of anti- virus software and cybersecurity suites published a report on the economic impact of cyber-attacks (Symantec...Prior to the Egyptian’s introduction of the chariot, wars were waged primarily on foot. This horse driven cart added incredible speed on the open

  8. [Acute ischemic proctitis following an epileptic attack

    DEFF Research Database (Denmark)

    Klintmann, C.K.; Hillingso, J.G.; Glenthøj, Andreas

    2008-01-01

    Acute ischemic proctitis is a rare diagnosis mainly because the rectum is supplied by an extensive arterial network. Consequently, in more than 90% of patients with ischemic colitis the rectum is spared. Previously reported cases are related to severe vascular insufficiency of the rectal...... circulation caused by systemic atherosclerosis, usually following aortic or aortoiliac operations. We report one case of acute ischemic proctitis following an epileptic attack Udgivelsesdato: 2008/9/29...

  9. SQL Injection - Database Attack Revolution and Prevention

    OpenAIRE

    Dorai, Ramakanth; Kannan, Vinod

    2011-01-01

    SQL injection came with a bang and caused revolution in database attacking. In recent years, with the explosion in web-based commerce and information systems, databases have been drawing ever closer to the network and it is critical part of network security. This paper is incorporated with our research and firsthand experience in hacking the database by SQL injection. Database is the Storage Brain of a website. A hacked database is the source for Passwords and juicy information like credit ca...

  10. Finding Effective Responses Against Cyber Attacks for Divided Nations

    Science.gov (United States)

    2015-12-01

    Training and Exercise Center CSTIA Central Science and Technology Information Agency DDoS Distributed Denial of Service DNS Domain Name Server DOD...computers in 2004 and Distributed Denial of Service ( DDoS ) attacks in 2009, were attributed to North Korea. North Korea has attacked not only government...President Roh to Lee, North Korea intensified both their criticisms and attacks. In 2009, they conducted extensive DDoS attacks on South Korea and

  11. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment sequ...... was defined as ≥ 3 successes, and lack of consistent efficacy was defined as ≥ 2 failures, in treatment response. A total of 1677 patients treated ≥ 1 attack and 1263 treated all four attacks....

  12. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  13. Smoking behaviour under intense terrorist attacks.

    Science.gov (United States)

    Keinan-Boker, Lital; Kohn, Robert; Billig, Miriam; Levav, Itzhak

    2011-06-01

    Smoking is one of the varied psychological reactions to stress. This study examined the rate and changes in cigarette smoking among former Gaza and current West Bank Jewish settlers subjected to direct and indirect terrorist attacks during the Al-Aksa Intifada. The relationship with degree of religious observance and emotional distress was explored as well. In this cross-sectional study, the respondents were settlers randomly selected and interviewed by telephone (N = 706). The interview schedule included socio-demographic items, information on direct exposure to terrorist attacks (e.g. threat to life or physical integrity, personal losses, property damage) and on steady and changes in smoking habits, and a scale to measure emotional distress. In contrast with the country population, a larger percentage of settlers who smoked increased the number of cigarettes consumed with exposure to terrorism (10 and 27%, respectively). Respondents who were injured or had their home damaged reported a higher rate of smoking during the preceding year (30 and 20%, respectively). Emotional distress was related to cigarette smoking, but not in the controlled analysis. Religious observance had no effect. Direct or indirect exposure to terrorist attacks had an impact on smoking prevalence rates and on changes in smoking habits. Studies investigating reactions to traumatic events should include a detailed section on smoking while mental health interventions should address the needs of smokers.

  14. The Danish National Multiple Myeloma Registry

    Directory of Open Access Journals (Sweden)

    Gimsing P

    2016-10-01

    Full Text Available Peter Gimsing,1 Morten O Holmström,2 Tobias Wirenfelt Klausen,3 Niels Frost Andersen,4 Henrik Gregersen,5 Robert Schou Pedersen,6 Torben Plesner,7 Per Trøllund Pedersen,8 Mikael Frederiksen,9 Ulf Frølund,2 Carsten Helleberg,3 Annette Vangsted,1 Peter de Nully Brown,1 Niels Abildgaard,10   On behalf of the Danish Myeloma Study Group 1Department of Hematology, Rigshospitalet, Copenhagen, 2Department of Hematology, Roskilde Sygehus, Roskilde, 3Department of Hematology, Herlev Hospital, Copenhagen, 4Department of Hematology, Aarhus University Hospital, Aarhus, 5Department of Hematology, Aalborg University Hospital, Aalborg, 6Department of Hematology, Holstebro Hospital, Holstebro, 7Department of Hematology, Vejle Hospital, Vejle, 8Department of Hematology, Hospital of Southwestern Jutland, Esbjerg, 9Department of Internal Medicine, Hospital of Southern Jutland, Aabenraa, 10Department of Hematology, Odense University Hospital, Odense, Denmark Aim: The Danish National Multiple Myeloma Registry (DMMR is a population-based clinical quality database established in January 2005. The primary aim of the database is to ensure that diagnosis and treatment of plasma cell dyscrasia are of uniform quality throughout the country. Another aim is to support research. Patients are registered with their unique Danish personal identification number, and the combined use of DMMR, other Danish National registries, and the Danish National Cancer Biobank offers a unique platform for population-based translational research.Study population: All newly diagnosed patients with multiple myeloma (MM, smoldering MM, solitary plasmacytomas, and plasma cell leukemia in Denmark are registered annually; ~350 patients. Amyloid light-chain amyloidosis, POEMS syndrome (polyneuropathy, organomegaly, endocrinopathy, monoclonal gammopathy, and skin changes syndrome, monoclonal gammopathy of undetermined significance and monoclonal gammopathy of undetermined significance with

  15. Design of a prospective, multinational registry to evaluate patients hospitalized with hyponatremia: the HN Registry

    Directory of Open Access Journals (Sweden)

    Hauptman PJ

    2013-08-01

    Full Text Available Paul J Hauptman,1 Arthur Greenberg,2 Joseph G Verbalis,3 Alpesh Amin,4 Samuel Sigal,5 Jun Chiong,6 Sandra Chase,7 Joseph Dasta81Saint Louis University School of Medicine, St Louis, MO, USA; 2Duke University Medical Center, Durham, NC, USA; 3Georgetown University Medical Center, Washington, DC, USA; 4University of California, Irvine, CA, USA; 5New York University Langone Medical Center, New York, NY, USA; 6Loma Linda University, Loma Linda, CA, USA; 7Otsuka America Pharmaceutical, Inc, Princeton, NJ, USA; 8University of Texas at Austin, TX, USABackground: Hyponatremia is a prevalent condition in patients hospitalized across a broad range of conditions, including heart failure, cirrhosis, and the syndrome of inappropriate antidiuretic hormone (SIADH secretion. Whether present on admission or developing during hospitalization, hyponatremia has been associated with increased mortality, longer hospital stays, and higher costs. Little is known, however, about its management and outcomes outside of clinical trial settings.Methods: The Hyponatremia Registry (HN Registry is a prospective, observational, multicenter, multinational study of patients hospitalized with either hypervolemic hyponatremia (cirrhosis and heart failure in the United States or euvolemic hyponatremia (SIADH in both the United States and Europe. Study enrollment began in September 2010 at community, tertiary, and academic medical centers. Overall, the HN Registry is expected to enroll >5,000 patients with hyponatremia, at >280 sites. Data will be used to characterize demographic and clinical characteristics of patients hospitalized with hyponatremia, evaluate the comparative effectiveness of available treatment modalities, and document and compare length of hospital stay as a reflection of resource use associated with hospital management.Discussion: Despite better understanding of the clinical consequences, economic impact, and prognostic significance of euvolemic and hypervolemic

  16. STAR Performance with SPEAR (Signal Processing Electronic Attack RFIC)

    Science.gov (United States)

    2017-03-01

    STAR Performance with SPEAR ( Signal Processing Electronic Attack RFIC) Luciano Boglione, Clayton Davis, Joel Goodman, Matthew McKeon, David...Parrett, Sanghoon Shin and Naomi Walker Naval Research Laboratory Washington, DC, 20375 Figure 1: The Signal Processing Electronic Attack RFIC...SPEAR) system. Abstract: The Signal Processing Electronic Attack RFIC (SPEAR) is a simultaneous transmit and receive (STAR) system capable of

  17. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  18. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  19. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  20. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  1. Why Do Higher Education Institutions Internationalize? An Investigation of the Multilevel Determinants of Internationalization Rationales

    Science.gov (United States)

    Seeber, Marco; Cattaneo, Mattia; Huisman, Jeroen; Paleari, Stefano

    2016-01-01

    In recent decades internationalization has risen to prominence in higher education institutions (HEIs). Scholars have identified several rationales for internationalization. There is however a lack of conceptual understanding and empirical evidence for which rationale(s) for internationalization are chosen by a given HEI and why. The goal of this…

  2. Final results from the 16-year sumatriptan, naratriptan, and treximet pregnancy registry.

    Science.gov (United States)

    Ephross, Sara A; Sinclair, Susan M

    2014-01-01

    To monitor for a signal of major teratogenicity by determining the risk of all birth major defects following in utero exposure to sumatriptan, naratriptan, and the sumatriptan/naproxen sodium combination product (tablets marketed in the United States as Treximet [GlaxoSmithKline, Research Triangle Park, NC, USA]), and to monitor for unusual patterns of defects that might suggest teratogenicity. The prevalence of migraine is highest in women of childbearing age. Coupled with the recurrent nature of migraine attacks and the high proportion of unplanned pregnancies, intentional and inadvertent exposure to anti-migraine drugs in pregnancy is likely. The Sumatriptan, Naratriptan, and Treximet Pregnancy Registry captured data on women exposed to those drugs during pregnancy to monitor for evidence of major teratogenicity. In this primarily prospective, observational study, health care professionals from anywhere in the world enrolled, on a voluntary basis, women exposed to sumatriptan, naratriptan, or the sumatriptan/naproxen sodium combination product during their pregnancies. Only pregnancies with unknown outcomes at the time of enrollment were included in the analysis. The proportion of infants or fetuses with major birth defects was calculated as the total number of infants/fetuses with major birth defects divided by the sum of the number of infants/fetuses with major birth defects + the number of live births without defects. The risk of major birth defects was further stratified by earliest trimester of pregnancy exposure. The registry enrolled 680 evaluable exposed pregnant women, which resulted in 689 infants and fetuses (outcomes). Of these outcomes, 626 were exposed to sumatriptan, 57 were exposed to naratriptan (seven were exposed to both sumatriptan and naratriptan), and six were exposed to the sumatriptan/naproxen sodium combination product. Twenty outcomes with major birth defects were reported among 528 outcomes exposed in the first trimester to

  3. Venous disease patient registries available in the United States.

    Science.gov (United States)

    Lurie, Fedor; Obi, Andrea; Schul, Marlin; Hofmann, Lawrence V; Kasper, Gregory; Wakefield, Thomas

    2017-10-19

    Patient registries are beneficial in that they allow the collection of prospective data focused on a specific medical issue. These registries give providers a "real-world" view of patient outcomes. Many medical disciplines have a long history of developing and using patient registries; the first patient registry for chronic venous disease in the United States was launched in 2011, fairly recently in comparison. Registries included in this review were identified by surveying members of major academic societies that focus on the care of chronic venous disease and by searching MEDLINE and Embase databases using Ovid interface. Medical directors of four of the five databases available in the United States completed a standard questionnaire, and the answers served as the basis for this review. This review is not a comparison of registries; it does, however, describe the common and unique features of four venous registries currently available in the United States with the purpose of increasing awareness of and fostering participation in these registries. Copyright © 2017 Society for Vascular Surgery. Published by Elsevier Inc. All rights reserved.

  4. Review of military and civilian trauma registries : Does consensus matter?

    NARCIS (Netherlands)

    van Dongen, Thijs T C F|info:eu-repo/dai/nl/357301714; de Graaf, Johan|info:eu-repo/dai/nl/413649393; Huizinga, Eelco P; Champion, Howard R; Hoencamp, Rigo; Leenen, Luke P H|info:eu-repo/dai/nl/071390596

    2017-01-01

    BACKGROUND: Structural collection of data from combat injuries is important to improve provided care and the outcome of (combat) casualties. Trauma registries are used in civilian and military health care systems for systematic administration of injury data. However, these registries often use

  5. 14 CFR 49.11 - FAA Aircraft Registry.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false FAA Aircraft Registry. 49.11 Section 49.11 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT RECORDING OF AIRCRAFT TITLES AND SECURITY DOCUMENTS General § 49.11 FAA Aircraft Registry. To be eligible for recording...

  6. 14 CFR 47.19 - FAA Aircraft Registry.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false FAA Aircraft Registry. 47.19 Section 47.19 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT AIRCRAFT REGISTRATION General § 47.19 FAA Aircraft Registry. Each application, request, notification, or other...

  7. Data quality in the Danish National Acute Leukemia Registry

    DEFF Research Database (Denmark)

    Ostgård, Lene Sofie Granfeldt; Nørgaard, Jan Maxwell; Severinsen, Marianne Tang

    2013-01-01

    The Danish National Acute Leukemia Registry (DNLR) has documented coverage of above 98.5%. Less is known about the quality of the recorded data.......The Danish National Acute Leukemia Registry (DNLR) has documented coverage of above 98.5%. Less is known about the quality of the recorded data....

  8. 76 FR 14366 - National Registry of Certified Medical Examiners

    Science.gov (United States)

    2011-03-16

    ... Federal Motor Carrier Safety Administration 49 CFR Parts 390 and 391 RIN 2126-AA97 National Registry of... National Registry of Certified Medical Examiners (NRCME) published on December 1, 2008. In the comments on...'s certificate had been issued to a commercial motor vehicle driver by a medical examiner listed on...

  9. Design and implementation of an ICU incident registry

    NARCIS (Netherlands)

    van der Veer, Sabine; Cornet, Ronald; de Jonge, Evert

    2007-01-01

    Due to its complexity intensive care is vulnerable to errors. On the ICU adults of the AMC (Amsterdam, The Netherlands) the available registries used for error reporting did not give insight in the occurrence of unwanted events, and did not lead to preventive measures. Therefore, a new registry has

  10. Design and implementation of an ICU incident registry

    NARCIS (Netherlands)

    van der Veer, Sabine; Cornet, Ronald; de Jonge, Evert

    2005-01-01

    Due to its complexity intensive care is vulnerable to errors. On the ICU Adults of the AMC (Amsterdam, the Netherlands) the available registries used for error reporting did not give insight in the occurrence of unwanted events, and did not lead to preventive measures. Therefore, a new registry has

  11. An international registry on autoinflammatory diseases: the Eurofever experience

    NARCIS (Netherlands)

    Toplak, N.; Frenkel, J.; Ozen, S.; Lachmann, H.J.; Woo, P.; Kone-Paut, I.; Benedetti, F. de; Neven, B.; Hofer, M.; Dolezalova, P.; Kummerle-Deschner, J.; Touitou, I.; Hentgen, V.; Simon, A.; Girschick, H.; Rose, C.; Wouters, C.; Vesely, R.; Arostegui, J.; Stojanov, S.; Ozgodan, H.; Martini, A.; Ruperto, N.; Gattorno, M.

    2012-01-01

    OBJECTIVE: To report on the demographic data from the first 18 months of enrollment to an international registry on autoinflammatory diseases in the context of the Eurofever project. METHODS: A web-based registry collecting baseline and clinical information on autoinflammatory diseases and related

  12. Danish Registry of Childhood and Adolescent Diabetes

    DEFF Research Database (Denmark)

    Svensson, Jannet; Cerqueira, Charlotte; Kjærsgaard, Per

    2016-01-01

    classification, family history of diabetes, growth parameters, self-care, and treatment variables. The quality indicators are selected based on international consensus of measures of good clinical practice. The indicators are metabolic control as assessed by HbA1c, blood pressure, albuminuria, retinopathy......AIM: The aims of the Danish Registry of Childhood and Adolescent Diabetes (DanDiabKids) are to monitor and improve the quality of care for children and adolescents with diabetes in Denmark and to follow the incidence and prevalence of diabetes. STUDY POPULATION: The study population consists of all...... children diagnosed with diabetes before the age of 15 years since 1996. Since 2015, every child followed up at a pediatric center (diabetes...

  13. The Danish Neuro-Oncology Registry

    DEFF Research Database (Denmark)

    Hansen, Steinbjørn

    2016-01-01

    advantage of reporting indicators is the related multidisciplinary discussions giving a better understanding of what actually is going on, thereby facilitating the work on adjusting the national guidelines in the Danish Neuro-Oncology Group. CONCLUSION: The establishment of DNOR has optimized the quality...... in handling primary brain tumor patients in Denmark by reporting indicators and facilitating a better multidisciplinary collaboration at a national level. DNOR provides a valuable resource for research.......AIM OF DATABASE: The Danish Neuro-Oncology Registry (DNOR) was established by the Danish Neuro-Oncology Group as a national clinical database. It was established for the purpose of supporting research and development in adult patients with primary brain tumors in Denmark. STUDY POPULATION: DNOR has...

  14. The Danish registry of diabetic retinopathy

    DEFF Research Database (Denmark)

    Andersen, Mads Varis Nis; Hjortdal, Jesper Østergaard; Schielke, Katja Christina

    2016-01-01

    Aim of database: To monitor the development of diabetic eye disease in Denmark and to evaluate the accessibility and effectiveness of diabetic eye screening programs with focus on interregional variations. Target population: The target population includes all patients diagnosed with diabetes....... Denmark (5.5 million inhabitants) has ~320,000 diabetes patients with an annual increase of 27,000 newly diagnosed patients. The Danish Registry of Diabetic Retinopathy (DiaBase) collects data on all diabetes patients aged ≥18 years who attend screening for diabetic eye disease in hospital eye departments...... and in private ophthalmological practice. In 2014-2015, DiaBase included data collected from 77,968 diabetes patients. Main variables: The main variables provide data for calculation of performance indicators to monitor the quality of diabetic eye screening and development of diabetic retinopathy. Data...

  15. Danish Registry of Childhood and Adolescent Diabetes

    DEFF Research Database (Denmark)

    Svensson, Jannet; Cerqueira, Charlotte; Kjærsgaard, Per

    2016-01-01

    AIM: The aims of the Danish Registry of Childhood and Adolescent Diabetes (DanDiabKids) are to monitor and improve the quality of care for children and adolescents with diabetes in Denmark and to follow the incidence and prevalence of diabetes. STUDY POPULATION: The study population consists of all...... children diagnosed with diabetes before the age of 15 years since 1996. Since 2015, every child followed up at a pediatric center (diabetes...... classification, family history of diabetes, growth parameters, self-care, and treatment variables. The quality indicators are selected based on international consensus of measures of good clinical practice. The indicators are metabolic control as assessed by HbA1c, blood pressure, albuminuria, retinopathy...

  16. Quality of trauma care and trauma registries.

    Science.gov (United States)

    Pino Sánchez, F I; Ballesteros Sanz, M A; Cordero Lorenzana, L; Guerrero López, F

    2015-03-01

    Traumatic disease is a major public health concern. Monitoring the quality of services provided is essential for the maintenance and improvement thereof. Assessing and monitoring the quality of care in trauma patient through quality indicators would allow identifying opportunities for improvement whose implementation would improve outcomes in hospital mortality, functional outcomes and quality of life of survivors. Many quality indicators have been used in this condition, although very few ones have a solid level of scientific evidence to recommend their routine use. The information contained in the trauma registries, spread around the world in recent decades, is essential to know the current health care reality, identify opportunities for improvement and contribute to the clinical and epidemiological research. Copyright © 2014 Elsevier España, S.L.U. and SEMICYUC. All rights reserved.

  17. Danish Registry of Childhood and Adolescent Diabetes

    DEFF Research Database (Denmark)

    Svensson, Jannet; Cerqueira, Charlotte; Kjærsgaard, Per

    2016-01-01

    classification, family history of diabetes, growth parameters, self-care, and treatment variables. The quality indicators are selected based on international consensus of measures of good clinical practice. The indicators are metabolic control as assessed by HbA1c, blood pressure, albuminuria, retinopathy......AIM: The aims of the Danish Registry of Childhood and Adolescent Diabetes (DanDiabKids) are to monitor and improve the quality of care for children and adolescents with diabetes in Denmark and to follow the incidence and prevalence of diabetes. STUDY POPULATION: The study population consists of all...... changed dramatically with more children treated intensively with multiple daily injections, insulin pumps, and increased number of self-monitored blood glucose values per day. These initiatives have resulted in a significant improvement in HbA1c over the years and a decrease in the number of children...

  18. Variation in performance measure criteria significantly affects cardiology practice rankings: Insights from the National Cardiovascular Data Registry's Practice Innovation and Clinical Excellence Registry.

    Science.gov (United States)

    Eapen, Zubin J; Tang, Fengming; Jones, Phil G; Maddox, Thomas M; Oetgen, William J; Spertus, John A; Rumsfeld, John S; Heidenreich, Paul A; Peterson, Eric D; Drozda, Joseph P

    2015-06-01

    Million Hearts is a national initiative to prevent 1 million heart attacks and strokes over 5 years by improving cardiovascular prevention. An important tool in the success of programs like Million Hearts is public ranking on the quality of practices, yet different measures may provide different rankings, so the true quality of practices is difficult to discern. We evaluated the quality of ambulatory cardiology care using performance measure metrics. We compared rankings of practices participating in the National Cardiovascular Data Registry's Practice Innovation and Clinical Excellence Registry using measures from (1) the physician quality reporting system and (2) the American College of Cardiology/American Heart Association/Physician Consortium for Performance Improvement. We compared achievement rates for measures between the 2 frameworks and determined correlations in rankings using Spearman correlation coefficients. From January 1, 2008 to December 31, 2012, there were 1,711,326 patients enrolled from 111 US practices. Among eligible patients, the physician quality reporting system and American College of Cardiology/American Heart Association/Physician Consortium for Performance Improvement measures were achieved in 76.1% versus 77.4% for antiplatelet prescription (P < .001), 68.3% versus 90.8% for blood pressure control (P < .001), 26.9% versus 43.4% for cholesterol control (P < .001), and 37.4% versus 40.6% for smoking cessation (P = .383). Practice rankings were strongly correlated for antiplatelet prescription (correlation coefficient 0.98) and cholesterol control (0.92) but poorly correlated for blood pressure control (0.39) and smoking cessation (0.22). Evaluation of preventive care and individual practice rankings vary significantly depending on how measures are defined. Publicly reported measures need to be validly associated with outcomes to avoid incorrectly evaluating practice performance and failing to achieve public health goals. Copyright © 2015

  19. I RBH - First Brazilian Hypertension Registry.

    Science.gov (United States)

    Jardim, Paulo César Brandão Veiga; Souza, Weimar Kunz Sebba Barroso de; Lopes, Renato Delascio; Brandão, Andréa Araújo; Malachias, Marcus V Bolívar; Gomes, Marco Mota; Moreno Júnior, Heitor; Barbosa, Eduardo Costa Duarte; Póvoa, Rui Manoel Dos Santos

    2016-08-01

    A registry assessing the care of hypertensive patients in daily clinical practice in public and private centers in various Brazilian regions has not been conducted to date. Such analysis is important to elucidate the effectiveness of this care. To document the current clinical practice for the treatment of hypertension with identification of the profile of requested tests, type of administered treatment, level of blood pressure (BP) control, and adherence to treatment. National, observational, prospective, and multicenter study that will include patients older than 18 years with hypertension for at least 4 weeks, following up in public and private centers and after signing a consent form. The study will exclude patients undergoing dialysis, hospitalized in the previous 30 days, with class III or IV heart failure, pregnant or nursing, with severe liver disease, stroke or acute myocardial infarction in the past 30 days, or with diseases with a survival prognosis profile, metabolic syndrome, and adherence to treatment. The primary outcomes will be hospitalization due to hypertensive crisis, cardiocirculatory events, and cardiovascular death, while secondary outcomes will be hospitalization for heart failure and requirement of dialysis. A subgroup analysis of 15% of the sample will include noninvasive central pressure evaluation at baseline and study end. The estimated sample size is 3,000 individuals for a prevalence of 5%, sample error of 2%, and 95% confidence interval. The results will be presented after the final evaluation, which will occur at the end of a 1-year follow-up. The analysis of this registry will improve the knowledge and optimize the treatment of hypertension in Brazil, as a way of modifying the prognosis of cardiovascular disease in the country.

  20. I RBH - First Brazilian Hypertension Registry

    Directory of Open Access Journals (Sweden)

    Paulo César Brandão Veiga Jardim

    Full Text Available Abstract Background: A registry assessing the care of hypertensive patients in daily clinical practice in public and private centers in various Brazilian regions has not been conducted to date. Such analysis is important to elucidate the effectiveness of this care. Objective: To document the current clinical practice for the treatment of hypertension with identification of the profile of requested tests, type of administered treatment, level of blood pressure (BP control, and adherence to treatment. Methods: National, observational, prospective, and multicenter study that will include patients older than 18 years with hypertension for at least 4 weeks, following up in public and private centers and after signing a consent form. The study will exclude patients undergoing dialysis, hospitalized in the previous 30 days, with class III or IV heart failure, pregnant or nursing, with severe liver disease, stroke or acute myocardial infarction in the past 30 days, or with diseases with a survival prognosis < 1 year. Evaluations will be performed at baseline and after 1 year of follow-up. The parameters that will be evaluated include anthropometric data, lifestyle habits, BP levels, lipid profile, metabolic syndrome, and adherence to treatment. The primary outcomes will be hospitalization due to hypertensive crisis, cardiocirculatory events, and cardiovascular death, while secondary outcomes will be hospitalization for heart failure and requirement of dialysis. A subgroup analysis of 15% of the sample will include noninvasive central pressure evaluation at baseline and study end. The estimated sample size is 3,000 individuals for a prevalence of 5%, sample error of 2%, and 95% confidence interval. Results: The results will be presented after the final evaluation, which will occur at the end of a 1-year follow-up. Conclusion: The analysis of this registry will improve the knowledge and optimize the treatment of hypertension in Brazil, as a way of

  1. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  2. A Suggested Model for Building Robust Biomedical Implants Registries.

    Science.gov (United States)

    Aloufi, Bader; Alshagathrah, Fahad; Househ, Mowafa

    2017-01-01

    Registries are an essential source of information for clinical and non-clinical decision-makers; because they provide evidence for post-market clinical follow-up and early detection of safety signals for biomedical implants. Yet, many of todays biomedical implants registries are facing a variety of challenges relating to a poorly designed dataset, the reliability of inputted data and low clinician and patient participation. The purpose of this paper is to present a best practice model for the implementation and use of biomedical implants registries to monitor the safety and effectiveness of implantable medical devices. Based on a literature review and an analysis of multiple national relevant registries, we identified six factors that address contemporary challenges and are believed to be the keys for building a successful biomedical implants registry, which include: sustainable development, international comparability, data reliability, purposeful design, ease of patient participation, and collaborative development at the national level.

  3. Attack or retreat: contrasted defensive tactics used by Cyprian honeybee colonies under attack from hornets.

    Science.gov (United States)

    Papachristoforou, Alexandros; Rortais, Agnès; Sueur, Jérôme; Arnold, Gérard

    2011-02-01

    This study describes the tactics used by Cyprian honeybees (Apis mellifera cypria) to defend their colonies against hornet (Vespa orientalis orientalis) attacks. We use simulated hornet attacks and a combination of video recordings and image analysis to reveal, for the first time, contrasted intra-subspecies defensive tactics that operate at the colony level during predation. In some colonies, when attacked, the numbers of guards at the hive entrance increases rapidly to attack, engulf, and kill invading hornets. In other colonies, guards avoid conflicts with hornets by retreating gradually and by forming a defensive line of honeybees at the hive entrance. Retreater colonies have propolis walls at the hive entrances with small apertures that are too narrow to allow the hornet to access the hive and that therefore reinforces entrance protection. On the contrary, attacker colonies have propolis walls with large openings through which the hornet can pass; these bees block the hornet's access by intensively guarding the hive entrance. We experimentally destroy propolis walls to test whether colonies consistently rebuild walls with the same intrinsic characteristics and we also monitor the survival rate of each anti-predator tactic after massive natural predation by hornets. Copyright © 2010 Elsevier B.V. All rights reserved.

  4. Estimating the cost of operating cancer registries: Experience in Colombia.

    Science.gov (United States)

    de Vries, Esther; Pardo, Constanza; Arias, Nelson; Bravo, Luis Eduardo; Navarro, Edgar; Uribe, Claudia; Yepez, María Clara; Jurado, Daniel; Garci, Luz Stella; Piñeros, Marion; Edwards, Patrick; Beebe, Maggie Cole; Tangka, Florence; Subramanian, Sujha

    2016-12-01

    Maintaining population-based registries requires adequate and sustained resources; however, to date there has been no systematic evaluation to identify the resource needs for cancer registration in most countries, including Colombia. A systematic assessment of the costs can quantify the funding required and identify processes to improve efficiency of cancer registries. The Centers for Disease Control and Prevention's (CDC's) International Registry Costing Tool (IntRegCosting Tool) was tailored specifically for the Colombian registries and was used to collect resource use data from five regional population-based cancer registries: Barranquilla, Bucaramanga, Cali, Manizales, and Pasto. The registries provided cost data for the year 2013 and cancer cases corresponding to the year 2010. We identified an almost threefold variation in the average cost per case (77,932 to 214,082 Colombian pesos or US $41 to US $113 in 2013) across the registries, but there were also substantial differences in data collection approaches, types of data collected, and activities performed. Cost per inhabitant varied between 95 and 415 Colombian pesos (US $0.05 to US $0.22). Between 20% and 45% of the total cost was due to fixed cost activities. The detailed economic information presented in this study constitutes a valuable source of activity-based cost data that registries can use to compare operations, assess key factors that lead to differences in cost per case, and identify potential approaches to improve efficiencies. Furthermore, the knowledge gained from studying the Colombian registries can help inform the planning and operations of other registries in the region. Published by Elsevier Ltd.

  5. Differences in the Korea Acute Myocardial Infarction Registry Compared with Western Registries.

    Science.gov (United States)

    Sim, Doo Sun; Jeong, Myung Ho

    2017-11-01

    The Korea Acute Myocardial Infarction Registry (KAMIR) is the first nationwide registry that reflects current therapeutic approaches and acute myocardial infarction (AMI) management in Korea. The results of the KAMIR demonstrated different risk factors and responses to medical and interventional treatments. The results indicated that the incidence of ST-elevation myocardial infarction (STEMI) was relatively high, and that the prevalence of dyslipidemia was relatively low with higher triglyceride and lower high-density lipoprotein cholesterol levels. Percutaneous coronary intervention (PCI) rates were high for both STEMI and non-ST-elevation myocardial infarction (NSTEMI) with higher use of drug-eluting stents (DESs). DES were effective and safe without increased risk of stent thrombosis in Korean AMI patients. Triple antiplatelet therapy, consisting of aspirin, clopidogrel, and cilostazol, was effective in preventing adverse clinical outcomes after PCI. Statin therapy was effective in Korean AMI patients, including those with very low levels of low-density lipoprotein cholesterol and those with cardiogenic shock. The KAMIR score had a greater predictive value than Thrombolysis in Myocardial Infarction (TIMI) and Global Registry of Acute Coronary Events (GRACE) scores for long-term mortality in AMI patients. Based on these results, the KAMIR will be instrumental for establishing new therapeutic strategies and effective methods for secondary prevention of AMI and guidelines for Asian patients. Copyright © 2017. The Korean Society of Cardiology.

  6. Differences in the Korea Acute Myocardial Infarction Registry Compared with Western Registries

    Science.gov (United States)

    2017-01-01

    The Korea Acute Myocardial Infarction Registry (KAMIR) is the first nationwide registry that reflects current therapeutic approaches and acute myocardial infarction (AMI) management in Korea. The results of the KAMIR demonstrated different risk factors and responses to medical and interventional treatments. The results indicated that the incidence of ST-elevation myocardial infarction (STEMI) was relatively high, and that the prevalence of dyslipidemia was relatively low with higher triglyceride and lower high-density lipoprotein cholesterol levels. Percutaneous coronary intervention (PCI) rates were high for both STEMI and non-ST-elevation myocardial infarction (NSTEMI) with higher use of drug-eluting stents (DESs). DES were effective and safe without increased risk of stent thrombosis in Korean AMI patients. Triple antiplatelet therapy, consisting of aspirin, clopidogrel, and cilostazol, was effective in preventing adverse clinical outcomes after PCI. Statin therapy was effective in Korean AMI patients, including those with very low levels of low-density lipoprotein cholesterol and those with cardiogenic shock. The KAMIR score had a greater predictive value than Thrombolysis in Myocardial Infarction (TIMI) and Global Registry of Acute Coronary Events (GRACE) scores for long-term mortality in AMI patients. Based on these results, the KAMIR will be instrumental for establishing new therapeutic strategies and effective methods for secondary prevention of AMI and guidelines for Asian patients. PMID:29035427

  7. Limitations of drug registries to evaluate orphan medicinal products for the treatment of lysosomal storage disorders

    NARCIS (Netherlands)

    Hollak, Carla E. M.; Aerts, Johannes M. F. G.; Aymé, Ségolène; Manuel, Jeremy

    2011-01-01

    Orphan drugs are often approved under exceptional circumstances, requiring submission of additional data on safety and effectiveness through registries. These registries are mainly focused on one drug only and data is frequently incomplete. Some registries also address phenotypic heterogeneity and

  8. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... components quickly results in a large quantity of interrelations, which are hard to grasp. In this work we present several approaches for visualising attributes of attacks such as likelihood of success, impact, and required time or skill level. The resulting visualisations provide a link between attacks...... on an organisations and the contribution of parts of an organisation to the attack and its impact....

  9. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  10. Web Forms and Untraceable DDoS Attacks

    Science.gov (United States)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  11. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2017-11-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  12. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  13. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  14. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  15. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2014-01-01

    Full Text Available Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  16. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  17. Rationale and design of the Henry Ford Exercise Testing Project (the FIT project).

    Science.gov (United States)

    Al-Mallah, Mouaz H; Keteyian, Steven J; Brawner, Clinton A; Whelton, Seamus; Blaha, Michael J

    2014-08-01

    Although physical fitness is a powerful prognostic marker in clinical medicine, most cardiovascular population-based studies do not have a direct measurement of cardiorespiratory fitness. In line with the call from the National Heart Lung and Blood Institute for innovative, low-cost, epidemiologic studies leveraging electronic medical record (EMR) data, we describe the rationale and design of the Henry Ford ExercIse Testing Project (The FIT Project). The FIT Project is unique in its combined use of directly measured clinical exercise data retrospective collection of medical history and medication treatment data at the time of the stress test, retrospective supplementation of supporting clinical data using the EMR and administrative databases and epidemiologic follow-up for cardiovascular events and total mortality via linkage with claims files and the death registry. The FIT Project population consists of 69 885 consecutive physician-referred patients (mean age, 54 ± 10 years; 54% males) who underwent Bruce protocol treadmill stress testing at Henry Ford Affiliated Hospitals between 1991 and 2009. Patients were followed for the primary outcomes of death, myocardial infarction, and need for coronary revascularization. The median estimated peak metabolic equivalent (MET) level was 10, with 17% of the patients having a severely reduced fitness level (METs < 6). At the end of the follow-up duration, 15.9%, 5.6%, and 6.7% of the patients suffered all-cause mortality, myocardial infarction, or revascularization procedures, respectively. The FIT Project is the largest study of physical fitness to date. With its use of modern electronic clinical epidemiologic techniques, it is poised to answer many clinically relevant questions related to exercise capacity and prognosis. © 2014 Wiley Periodicals, Inc.

  18. Supporting awareness in creative group work by exposing design rationale

    Directory of Open Access Journals (Sweden)

    Umer Farooq

    2011-01-01

    Full Text Available When creativity is taken as a long-term, complex, and collaborative activity, support for awareness is required for group members to monitor the development of ideas, track how these ideas became narrowed, and understand how alternatives are being implemented and integrated by colleagues. In this paper, we investigate the effects of exposing design rationale to convey awareness, specifically activity awareness, in group creativity. Through evaluating a prototype, we investigate status updates that convey design rationale, and to what consequences, in small groups in fully distributed collaboration. We found that status updates are used for a variety of purposes and that participants’ comments on their collaborators’ status updates provided feedback. Overall, results suggest that participants’ awareness about their collaborators’ future plans increased over time. Majority of participants found the status updates useful, particularly those with higher metacognitive knowledge. Based on our results, two design strategies for activity awareness are proposed.

  19. Mineralized Collagen: Rationale, Current Status, and Clinical Applications

    Directory of Open Access Journals (Sweden)

    Zhi-Ye Qiu

    2015-07-01

    Full Text Available This paper presents a review of the rationale for the in vitro mineralization process, preparation methods, and clinical applications of mineralized collagen. The rationale for natural mineralized collagen and the related mineralization process has been investigated for decades. Based on the understanding of natural mineralized collagen and its formation process, many attempts have been made to prepare biomimetic materials that resemble natural mineralized collagen in both composition and structure. To date, a number of bone substitute materials have been developed based on the principles of mineralized collagen, and some of them have been commercialized and approved by regulatory agencies. The clinical outcomes of mineralized collagen are of significance to advance the evaluation and improvement of related medical device products. Some representative clinical cases have been reported, and there are more clinical applications and long-term follow-ups that currently being performed by many research groups.

  20. Glocal clinical registries: pacemaker registry design and implementation for global and local integration--methodology and case study.

    Science.gov (United States)

    da Silva, Kátia Regina; Costa, Roberto; Crevelari, Elizabeth Sartori; Lacerda, Marianna Sobral; de Moraes Albertini, Caio Marcos; Filho, Martino Martinelli; Santana, José Eduardo; Vissoci, João Ricardo Nickenig; Pietrobon, Ricardo; Barros, Jacson V

    2013-01-01

    The ability to apply standard and interoperable solutions for implementing and managing medical registries as well as aggregate, reproduce, and access data sets from legacy formats and platforms to advanced standard formats and operating systems are crucial for both clinical healthcare and biomedical research settings. Our study describes a reproducible, highly scalable, standard framework for a device registry implementation addressing both local data quality components and global linking problems. We developed a device registry framework involving the following steps: (1) Data standards definition and representation of the research workflow, (2) Development of electronic case report forms using REDCap (Research Electronic Data Capture), (3) Data collection according to the clinical research workflow and, (4) Data augmentation by enriching the registry database with local electronic health records, governmental database and linked open data collections, (5) Data quality control and (6) Data dissemination through the registry Web site. Our registry adopted all applicable standardized data elements proposed by American College Cardiology / American Heart Association Clinical Data Standards, as well as variables derived from cardiac devices randomized trials and Clinical Data Interchange Standards Consortium. Local interoperability was performed between REDCap and data derived from Electronic Health Record system. The original data set was also augmented by incorporating the reimbursed values paid by the Brazilian government during a hospitalization for pacemaker implantation. By linking our registry to the open data collection repository Linked Clinical Trials (LinkedCT) we found 130 clinical trials which are potentially correlated with our pacemaker registry. This study demonstrates how standard and reproducible solutions can be applied in the implementation of medical registries to constitute a re-usable framework. Such approach has the potential to facilitate