WorldWideScience

Sample records for attack synthetic polymers

  1. Biopolymers Versus Synthetic Polymers

    Directory of Open Access Journals (Sweden)

    Florentina Adriana Cziple

    2008-10-01

    Full Text Available This paper present an overview of important synthetic and natural polymers with emphasis on polymer structure, the chemistry of polymer formation. an introduction to polymer characterization. The biodegradation process can take place aerobically and anaerobically with or without the presence of light. These factors allow for biodegradation even in landfill conditions which are normally inconducive to any degradation. The sheeting used to make these packages differs significantly from other “degradable plastics” in the market as it does not attempt to replace the current popular materials but instead enhances them by rendering them biodegradable.

  2. Synthetic Metal-Containing Polymers

    Science.gov (United States)

    Manners, Ian

    2004-04-01

    The development of the field of synthetic metal-containing polymers - where metal atoms form an integral part of the main chain or side group structure of a polymer - aims to create new materials which combine the processability of organic polymers with the physical or chemical characteristics associated with the metallic element or complex. This book covers the major developments in the synthesis, properties, and applications of synthetic metal-containing macromolecules, and includes chapters on the preparation and characterization of metal-containing polymers, metallocene-based polymers, rigid-rod organometallic polymers, coordination polymers, polymers containing main group metals, and also covers dendritic and supramolecular systems. The book describes both polymeric materials with metals in the main chain or side group structure and covers the literature up to the end of 2002.

  3. Cell microencapsulation with synthetic polymers.

    Science.gov (United States)

    Olabisi, Ronke M

    2015-02-01

    The encapsulation of cells into polymeric microspheres or microcapsules has permitted the transplantation of cells into human and animal subjects without the need for immunosuppressants. Cell-based therapies use donor cells to provide sustained release of a therapeutic product, such as insulin, and have shown promise in treating a variety of diseases. Immunoisolation of these cells via microencapsulation is a hotly investigated field, and the preferred material of choice has been alginate, a natural polymer derived from seaweed due to its gelling conditions. Although many natural polymers tend to gel in conditions favorable to mammalian cell encapsulation, there remain challenges such as batch to batch variability and residual components from the original source that can lead to an immune response when implanted into a recipient. Synthetic materials have the potential to avoid these issues; however, historically they have required harsh polymerization conditions that are not favorable to mammalian cells. As research into microencapsulation grows, more investigators are exploring methods to microencapsulate cells into synthetic polymers. This review describes a variety of synthetic polymers used to microencapsulate cells. PMID:24771675

  4. Polymer dynamics from synthetic polymers to proteins

    Indian Academy of Sciences (India)

    D Richter; R Biehl; M Monkenbush; B Hoffmann; R Merkel

    2008-10-01

    Starting from the standard model of polymer motion - the Rouse model - we briefly present some key experimental results on the mesoscopic dynamics of polymer systems. We touch the role of topological confinement as expressed in the reptation model and discuss in some more detail processes limiting the confinement. In the second part we relate to some new developments concerning the measurement of large-scale internal dynamics of proteins by neutron spin echo.

  5. Biodegradable synthetic polymers for tissue engineering

    Directory of Open Access Journals (Sweden)

    Gunatillake P. A.

    2003-05-01

    Full Text Available This paper reviews biodegradable synthetic polymers focusing on their potential in tissue engineering applications. The major classes of polymers are briefly discussed with regard to synthesis, properties and biodegradability, and known degradation modes and products are indicated based on studies reported in the literature. A vast majority of biodegradable polymers studied belongs to the polyester family, which includes polyglycolides and polylactides. Some disadvantages of these polymers in tissue engineering applications are their poor biocompatibility, release of acidic degradation products, poor processability and loss of mechanical properties very early during degradation. Other degradable polymers such as polyorthoesters, polyanhydrides, polyphosphazenes, and polyurethanes are also discussed and their advantages and disadvantages summarised. With advancements in tissue engineering it has become necessary to develop polymers that meet more demanding requirements. Recent work has focused on developing injectable polymer compositions based on poly (propylene fumarate and poly (anhydrides to meet these requirements in orthopaedic tissue engineering. Polyurethanes have received recent attention for development of degradable polymers because of their great potential in tailoring polymer structure to achieve mechanical properties and biodegradability to suit a variety of applications.

  6. Multimodal separation and multistage mass spectrometry of synthetic polymers

    NARCIS (Netherlands)

    Song, J.

    2011-01-01

    Synthetic polymers and polymer-based materials are essential and indispensable in many aspects of our life. An increasing demand of polymers with tailor-made properties has led to an extraordinary range of new materials. Most of the methods for characterisation of polymers only produce results on an

  7. Porous networks derived from synthetic polymer-clay complexes

    Energy Technology Data Exchange (ETDEWEB)

    Carrado, K.A.; Thiyagarajan, P.; Elder, D.L.

    1995-05-12

    Synthetic hectorites were hydrothermally crystallized with direct incorporation of a cationic polymer poly(dimethyl diallyl ammonium chloride) (PDDA), and two neutral cellulosic polymers hydroxypropyl methylcellulose (HPMC) and hydroxyethyl cellulose (HEC). Synthetic PDDA-hectorite displays the lowest d-spacing at 15.8 {Angstrom} along with less polymer incorporation (7.8 wt % organic) than the neutral polymers (18--22 wt % organic). Thermal analysis and small angle neutron scattering were used to further examine the polymer-clay systems. Clay platelets of the largest size and best stacking order occur when cationic PDDA polymer is used. PDDA also enhances these properties over the crystallites prepared for a control mineral, where no polymer is used. HEC acts to aggregate the silica, leaving less to react to form clay. The clay platelets which result from HEC are small, not stacked to a large degree, and oriented randomly. Neutral HPMC acts more like cationic PDDA in that larger clay platelets are allowed to form. The extended microstructure of the clay network remains undisturbed after polymer is removed by calcination. When no polymer is used, the synthetic hectorite has a N{sub 2} BET surface area of 200 M{sup 2}/gm, even after calcination. This increases by 20--50% for the synthetic polymer-hectorites after the polymer is removed by calcination.

  8. Energy and charge control in mass spectrometry of synthetic polymers

    NARCIS (Netherlands)

    Nasioudis, A.

    2011-01-01

    Synthetic polymers are the products of humans’ attempts to imitate nature’s gigantic molecular chain architectures. The extended variety of building blocks and reaction mechanisms resulted in a plethora of different polymeric architectures. The biggest challenge for polymer chemists is to develop an

  9. Novel synthetic methods to produce functionalized conducting polymers. 1. Polyanilines

    Energy Technology Data Exchange (ETDEWEB)

    Barbero, C.; Salavagione, H.J.; Acevedo, D.F.; Garay, F.; Planes, G.A.; Miras, M.C. [Universidad Nacional de Rio Cuarto (Argentina). Dpto. de Quimica; Grumelli, D.E. [INQUIMAE, Buenos Aires (Argentina). Dpto. de Quimica Inorganica; Morales, G.M. [University of Chicago (United States). Dept. of Chemistry

    2004-09-15

    Recent results, part of an ongoing research programme aimed to develop synthetic methods which could be used to functionalise conducting polymers, are described. Among those methods are the copolymerization of aniline with substituted anilines and post-modification reactions of polyaniline, such as: electrophilic substitution, nucleophilic addition and coupling with diazonium salts. Some of those methods could be chemically or electrochemically controlled allowing a quantitative tailoring of the modification. The effect of the added functionalities on the electrochemical properties of the polymers is investigated using spectroscopic and electrochemical techniques. The extension of the synthetic methods to combinatorial modification of conductive polymers is also discussed. (author)

  10. Synthetic polymers from readily available monosaccharides.

    Science.gov (United States)

    Galbis, J A; García-Martín, M G

    2010-01-01

    The low degradability of petroleum-based polymers and the massive use of these materials constitute a serious problem because of the environmental pollution that they can cause. Thus, sustained efforts have been extensively devoted to produce new polymers based on natural renewing resources and with higher degradability. Of the different natural sources, carbohydrates stand out as highly convenient raw materials because they are inexpensive, readily available, and provide great stereochemical diversity. New polymers, analogous to the more accredited technical polymers, but based on chiral monomers, have been synthesized from natural and available sugars. This chapter describes the potential of sugar-based monomers as precursors to a wide variety of macromolecular materials.

  11. Molecular weight characterisation of synthetic polymers

    CERN Document Server

    Holding, Steve R

    1995-01-01

    The report comprises a state-of-the-art overview of the subject of molecular weight characterisation, supported by an extensive, indexed bibliography. The bibliography contains over 400 references and abstracts, compiled from the Polymer Library.

  12. High-density polymer microarrays: identifying synthetic polymers that control human embryonic stem cell growth.

    Science.gov (United States)

    Hansen, Anne; Mjoseng, Heidi K; Zhang, Rong; Kalloudis, Michail; Koutsos, Vasileios; de Sousa, Paul A; Bradley, Mark

    2014-06-01

    The fabrication of high-density polymer microarray is described, allowing the simultaneous and efficient evaluation of more than 7000 different polymers in a single-cellular-based screen. These high-density polymer arrays are applied in the search for synthetic substrates for hESCs culture. Up-scaling of the identified hit polymers enables long-term cellular cultivation and promoted successful stem-cell maintenance.

  13. Molecular Design of Synthetic Biodegradable Polymers as Cell Scaffold Materials

    Institute of Scientific and Technical Information of China (English)

    WANG Shen-guo; WAN Yu-qing; CAI Qing; HE Bin; CHEN Wen-na

    2004-01-01

    Poly(lactic acid) and its copolymers are regarded as the most useful biomaterials. The good biocompatibility, biodegradability and mechanical properties of them make the synthetic biodegradable polymers have primary application to tissue engineering. The advantages and disadvantages of the synthetic biodegradable polymers as cell scaffold materials are evaluated. This article reviews the modification of polylactide-family aliphatic polymers to improve the cell affinity when the polymers are used as cell scaffolds. We have developed four main approaches: to modify polyester cell scaffolds in combination of plasma treating and collagen coating; to introduce hydrophilic segments into aliphatic polyester backbones; to introduce pendant functional groups into polyester chains; to modify polyester with dextran. The results of the cell cultures prove that the approaches mentioned above have improved the cell affinity of the polyesters and have modulated cell function such as adhesion, proliferation and migration.

  14. The World of Synthetic Polymers.An Industrial Perspective

    Institute of Scientific and Technical Information of China (English)

    Lau Willie

    2004-01-01

    Synthetic polymers have become the building block in almost every aspects of our daily life. Billions of pounds of polymers are produced each year and the demand is continuously growing both in terms of volume and advanced performance. The general property of a class of polymers is often bounded by the synthetic process that produces the polymer. For example,polyolefins, are non-polar polymers due to the poor tolerance of transition metal catalysts toward polar monomers. Conversely, latices are polar polymers, since the emulsion polymerization process limits the use of non-polar monomers which have low solubility in water. It is highly desirable to be able to design polymer systems with optimum polarity balance to meet the application demand while staying within the industrial manufacturing constraints.An overview of industrial polymerization methods will be followed by a presentation on the recent development of a new emulsion polymerization technology. The technology involves the use of Cyclodextrin, acting as "Phase Transport Catalyst", facilitating the diffusion of very hydrophobic and water insoluble monomers through the aqueous medium. A new class of latex polymers and their attributes will be discussed.

  15. Solid state NMR of biopolymers and synthetic polymers

    Energy Technology Data Exchange (ETDEWEB)

    Jelinski, Lynn W. [Cornell Univ., Geneva, NY (United States)

    1995-12-31

    Solid state NMR has been invaluable in evaluating the structure, phase separation, and dynamics of polymers. Because polymers are generally used in the solid state, solid state NMR is especially powerful because it provides information about the materials in their native state. This review gives a general overview of solid state NMR, concentrating on solid state {sup 13} C and {sup 2} H NMR. It then focuses on two examples: the biopolymer spider silka and the engineering material polyurethane. It illustrates how solid state NMR can provide new information about synthetic and bio-polymers. (author) 11 refs., 5 figs., 3 tabs.

  16. Co-pyrolysis of wood biomass and synthetic polymers mixtures

    Energy Technology Data Exchange (ETDEWEB)

    Sharypov, V.I.; Beregovtsova, N.G.; Kuznetsov, B.N.; Baryshnikov, S.V. [Institute of Chemistry and Chemical Technology SB RAS, K. Marx Str., Krasnoyarsk 660049 (Russian Federation); Cebolla, V.L. [Instituto de Carboquimica, CSIC, Zaragoza (Spain); Weber, J.V.; Collura, S.; Finqueneisel, G.; Zimny, T. [Laboratoire de Chimie et Applications, Universite de Metz, IUT, rue V. Demange, 57500 Saint Avold (France)

    2006-06-01

    The pyrolysis in a hydrogen atmosphere of pine wood and synthetic polymers (polyethylene and polypropylene) mixtures was studied in a rotating autoclave. The effects of reaction temperature, wood/polymers mixture composition and catalysts, on the mixtures conversion into liquids and gases were established and discussed. The used catalysts were pyrrhotite and haematite materials activated by mechanochemical treatment. In the co-liquefaction processes the interaction between fragments of wood and polymers thermal decomposition took place. This results in non-additive increase of the wood/polymers conversion degree by 10-15wt.% and of the yield of distillate fractions by 14-19wt.%. Iron ore materials were found catalytically active in the process of hydropyrolysis of wood/polymers mixtures. By using these catalysts a significant increase of the distillable liquids amounts (by 14-21wt.%) and a sharp decrease of olefins and cycloparaffins content (by approximately two to three times) were observed. (author)

  17. Diversity screening for novel enzymes degrading synthetic polymers

    DEFF Research Database (Denmark)

    Lezyk, Mateusz Jakub

    The objective of this PhD study was to evaluate the feasibility of enzymatic degradation of synthetic polymers used as binder materials in marine coatings. Enzymatic modification of synthetic polymers like epoxy resin, polyurethanes and various acrylics is desirable in several industrial processes...... library from heavily polluted soil – one of the most challenging habitats and source of potent enzymes, potentially degrading a range of recalcitrant xenobiotics from oil and paint industries. It is well-establisehd that ‘you get what you screen for’, therefore the major challenge was the availability...... plant cell wall polymers. Several enzymes catalysed transglycosylation either using lactose or pNP-Fuc as acceptor and Mfuc6 exhibited an unusually high transglycosylation/hydrolysis ratio. Using 25 mM pNP-Fuc as donor and under conditions tested, the maximum yields of 1.6 ± 0.1 mM 2’-fucosyllactose...

  18. Hybrid Block Copolymers Constituted by Peptides and Synthetic Polymers: An Overview of Synthetic Approaches, Supramolecular Behavior and Potential Applications

    Directory of Open Access Journals (Sweden)

    Jordi Puiggalí

    2013-02-01

    Full Text Available Hybrid block copolymers based on peptides and synthetic polymers, displaying different types of topologies, offer new possibilities to integrate the properties and functions of biomacromolecules and synthetic polymers in a single hybrid material. This review provides a current status report of the field concerning peptide-synthetic polymer hybrids. The first section is focused on the different synthetic approaches that have been used within the last three years for the preparation of peptide-polymer hybrids having different topologies. In the last two sections, the attractive properties, displayed in solution or in the solid state, together with the potential applications of this type of macromolecules or supramolecular systems are highlighted.

  19. Natural and synthetic polymers for wounds and burns dressing.

    Science.gov (United States)

    Mogoşanu, George Dan; Grumezescu, Alexandru Mihai

    2014-03-25

    In the last years, health care professionals faced with an increasing number of patients suffering from wounds and burns difficult to treat and heal. During the wound healing process, the dressing protects the injury and contributes to the recovery of dermal and epidermal tissues. Because their biocompatibility, biodegradability and similarity to macromolecules recognized by the human body, some natural polymers such as polysaccharides (alginates, chitin, chitosan, heparin, chondroitin), proteoglycans and proteins (collagen, gelatin, fibrin, keratin, silk fibroin, eggshell membrane) are extensively used in wounds and burns management. Obtained by electrospinning technique, some synthetic polymers like biomimetic extracellular matrix micro/nanoscale fibers based on polyglycolic acid, polylactic acid, polyacrylic acid, poly-ɛ-caprolactone, polyvinylpyrrolidone, polyvinyl alcohol, polyethylene glycol, exhibit in vivo and in vitro wound healing properties and enhance re-epithelialization. They provide an optimal microenvironment for cell proliferation, migration and differentiation, due to their biocompatibility, biodegradability, peculiar structure and good mechanical properties. Thus, synthetic polymers are used also in regenerative medicine for cartilage, bone, vascular, nerve and ligament repair and restoration. Biocompatible with fibroblasts and keratinocytes, tissue engineered skin is indicated for regeneration and remodeling of human epidermis and wound healing improving the treatment of severe skin defects or partial-thickness burn injuries. PMID:24368109

  20. 21 CFR 874.3620 - Ear, nose, and throat synthetic polymer material.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Ear, nose, and throat synthetic polymer material. 874.3620 Section 874.3620 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN..., and throat synthetic polymer material. (a) Identification. Ear, nose, and throat synthetic...

  1. Identification of Synthetic Polymers and Copolymers by Analytical Pyrolysis-Gas Chromatography/Mass Spectrometry

    Science.gov (United States)

    Kusch, Peter

    2014-01-01

    An experiment for the identification of synthetic polymers and copolymers by analytical pyrolysis-gas chromatography/mass spectrometry (Py-GC/MS) was developed and performed in the polymer analysis courses for third-year undergraduate students of chemistry with material sciences, and for first-year postgraduate students of polymer sciences. In…

  2. Synthetic polymers and methods of making and using the same

    Energy Technology Data Exchange (ETDEWEB)

    Daily, Michael D.; Grate, Jay W.; Mo, Kai-For

    2016-06-14

    Monomer embodiments that can be used to make polymers, such as homopolymers, heteropolymers, and that can be used in particular embodiments to make sequence-defined polymers are described. Also described are methods of making polymers using such monomer embodiments. Methods of using the polymers also are described.

  3. Control of polymer-packing orientation in thin films through synthetic tailoring of backbone coplanarity

    KAUST Repository

    Chen, Mark S.

    2013-10-22

    Controlling solid-state order of π-conjugated polymers through macromolecular design is essential for achieving high electronic device performance; yet, it remains a challenge, especially with respect to polymer-packing orientation. Our work investigates the influence of backbone coplanarity on a polymer\\'s preference to pack face-on or edge-on relative to the substrate. Isoindigo-based polymers were synthesized with increasing planarity by systematically substituting thiophenes for phenyl rings in the acceptor comonomer. This increasing backbone coplanarity, supported by density functional theory (DFT) calculations of representative trimers, leads to the narrowing of polymer band gaps as characterized by ultraviolet-visible-near infrared (UV-vis-NIR) spectroscopy and cyclic voltammetry. Among the polymers studied, regiosymmetric II and TII polymers exhibited the highest hole mobilities in organic field-effect transistors (OFETs), while in organic photovoltaics (OPVs), TBII polymers that display intermediate levels of planarity provided the highest power conversion efficiencies. Upon thin-film analysis by atomic force microscropy (AFM) and grazing-incidence X-ray diffraction (GIXD), we discovered that polymer-packing orientation could be controlled by tuning polymer planarity and solubility. Highly soluble, planar polymers favor face-on orientation in thin films while the less soluble, nonplanar polymers favor an edge-on orientation. This study advances our fundamental understanding of how polymer structure influences nanostructural order and reveals a new synthetic strategy for the design of semiconducting materials with rationally engineered solid-state properties. © 2013 American Chemical Society.

  4. PEG-related polymer resins as synthetic supports

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Combinatorial chemistry has become a significant part of the discovery and optimization process for novel drugs,affinity ligands,and catalysts.The polymeric supports play a key role in combinatory chemistry.Therefore,various kinds of functional polymer resins have been exploited as supports,reagents,and catalysts in organic synthesis.In comparison to the conventional Merrifield resins,the poly(ethylene glycol)(PEG)-related polymer resins have advantages including good compatibilities with polar solvents,good solvent absorbency and swelling properties.This review focuses primarily on the more recent work in the field of developing PEG-related polymer resins as supports for organic synthesis.

  5. Synthetic genetic polymers capable of heredity and evolution

    DEFF Research Database (Denmark)

    Pinheiro, Vitor B; Taylor, Alexander I; Cozens, Christopher;

    2012-01-01

    in and recovered from six alternative genetic polymers based on simple nucleic acid architectures not found in nature [xeno-nucleic acids (XNAs)]. We also select XNA aptamers, which bind their targets with high affinity and specificity, demonstrating that beyond heredity, specific XNAs have the capacity...... for Darwinian evolution and folding into defined structures. Thus, heredity and evolution, two hallmarks of life, are not limited to DNA and RNA but are likely to be emergent properties of polymers capable of information storage....

  6. Review of Synthetic Methods to Form Hollow Polymer Nanocapsules

    Energy Technology Data Exchange (ETDEWEB)

    Barker, Madeline T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-13

    Syntactic foams have grown in interest due to the widened range of applications because of their mechanical strength and high damage tolerance. In the past, hollow glass or ceramic particles were used to create the pores. This paper reviews literature focused on the controlled synthesis of hollow polymer spheres with diameters ranging from 100 –200 nm. By using hollow polymer spheres, syntactic foams could reach ultra-low densities.

  7. Novel polymer materials for protecting crew and structural elements of orbital station against microorganisms attack throughout long-term operation

    Science.gov (United States)

    Savelyev, Yu.; Rudenko, A.; Robota, L.; Koval, E.; Savelyeva, O.; Markovskaya, L.; Veselov, V.

    2009-01-01

    Novel polyurethanes, polyamidourethanes and polyurethane foams of stable to biocorrosion were synthesized. The polymers possess fungicidal/fungistatic and bactericidal/bacteriostatic activity. After the biological tests with using of mold fungi and yeasts, polymers totally keep their main exploitation characteristics: for most of polymers coefficients of strength and elasticity keeping are equal of 100%. Most of them possess the fungicidal properties of zero balls, according to the State Standard. Life-firmness investigation of the most aggressive extremophiles: mold fungi Penicillium and Aspergillus on the polymer surfaces showed that for some samples it made up from 3 to 10 days. Some polymers possess both anti-micotic and anti-bacterial action. Based on investigation results a special technological scheme of assured human protection against microorganisms attack in specific condition of his existence are to be elaborated.

  8. Characterization of chitosan composites with synthetic polymers and inorganic additives.

    Science.gov (United States)

    Lewandowska, Katarzyna

    2015-11-01

    In the present study, the results from thermogravimetric analysis (TGA), contact angle measurements, tensile tests, scanning electron microscopy (SEM) and atomic force microscopy (AFM) of polymer composites containing chitosan (Ch) and montmorillonite (MMT) with and without poly(vinyl alcohol) (PVA) are presented. Measurements of the contact angles for diiodomethane (D) and glycerol (G) on the surfaces of chitosan films, Ch/MMT and Ch/PVA/MMT, were made and surface free energies were calculated. It was found that the wettability of the chitosan/MMT or Ch/PVA/MMT composite films decreased relative to the wettability of chitosan. The microstructure of unmodified polymers and their composites, as observed by SEM and AFM, showed particles that are relatively well dispersed in the polymer matrix. The TGA thermograms and mass loss percentages at different decomposition temperatures showed that the thermal stability of the binary composite slightly decreases upon the addition of PVA. The film mechanical properties such as tensile strength, Young's modulus and tensile strain at break depend on the composition and varied non-uniformly. Both composites possessed a tensile strength and Young's modulus of 27.6-94.3MPa and 1.5-3.5GPa, respectively. The addition of PVA to the composite led to a reduction in tensile strength by approximately 40%. PMID:26253510

  9. Impinging jet study of the deposition of colloidal particles on synthetic polymer (Zeonor)

    DEFF Research Database (Denmark)

    Vlček, Jakub; Lapčík, Lubomír; Cech, Jiri;

    2014-01-01

    In this study, an impinging jet deposition experiments were performed on synthetic polymer (Zeonor) original and by micro-embossing modified substrates with exactly defined topology as confirmed by AFM and SEM. Deposition experiments were performed at ambient temperature and at selected flow regime...

  10. Towards the construction of synthetic protocells: Engineering responsive polymer membranes

    Science.gov (United States)

    Kamat, Neha Prashant

    Polymersomes are vesicles formed through self-assembly of diblock copolymers that display the lamellar structure of cellular membranes. The work described in this thesis has been driven by the long-range goal of creating a polymersome protocell; a polymer vesicle, that carries out some life activities, such as signaling, communication, sensation or growth. We developed three different areas important for cellular mimicry, and used the concept of inter-particle communication as a model behavior to guide the design parameters of our system. These parameters include designing responsive membranes, controlling membrane architecture and composition, and controlling vesicle spatial position. First, we created responsive polymer membranes that use an optical illumination to trigger and report membrane response. Confocal microscopy and micropipette aspiration were used to show that polymer membranes that contained a porphyrin-based chromophore could be induced to deform and rupture in response to light when a luminal solute, dextran, was encapsulated. This response could be tuned by changing the molecular weight of dextran and the membrane polymer. We then showed how supermolecular porphyrin-based fluorophores can be used as sensors for membrane stress. We showed that changes in porphyrin emission report changes in membrane tension by using fluorimetry, a multispectral camera and aspiration techniques to characterize changes in the optical emission of these near infrared (NIR) emissive probes embedded within the hydrophobic core of the polymersome membrane. Next, we constructed polymersomes with increased control over the membrane diameter, membrane composition, and luminal encapsulates using microfluidics. Using micropipette aspiration, we verified the unilamellarity of fluid membranes consisting of PEO30-b-PBD46 diblock copolymers. In addition, we used micropipette aspiration to both track and verify solvent removal from double emulsion-templated polymersomes. Finally

  11. New synthetic amphiphilic polymers for steric protection of liposomes in vivo.

    Science.gov (United States)

    Torchilin, V P; Trubetskoy, V S; Whiteman, K R; Caliceti, P; Ferruti, P; Veronese, F M

    1995-09-01

    Carboxy group-terminated synthetic polymers--branched poly(ethylene glycol), poly(acryloylmorpholine), and poly(vinylpyrrolidone)--were made amphiphilic by derivatization with phosphatidyl ethanolamine via the terminal carboxy group and then incorporated into lecithin-cholesterol liposomes prepared by the detergent dialysis method. Following the biodistribution of liposomes in mice, all three polymers were shown to be effective steric protectors for liposomes and were able to sharply increase liposome circulation times in a concentration-dependent manner. The accumulation of liposomes in the liver decreases. The effects observed are similar to those found for liposomes modified with linear poly(ethylene glycol). At low polymer concentration, amphiphilic branched poly(ethylene glycol) seems to be the most effective liposome protector, most probably, because at the same molar content of anchoring groups, each attachment point carries two polymeric chains and doubles the quantity of liposome-grafted polymer comparing to linear poly(ethylene glycol).

  12. Targeted conjugation of breast anticancer drug tamoxifen and its metabolites with synthetic polymers.

    Science.gov (United States)

    Sanyakamdhorn, S; Agudelo, D; Bekale, L; Tajmir-Riahi, H A

    2016-09-01

    Conjugation of antitumor drug tamoxifen and its metabolites, 4-hydroxytamxifen and ednoxifen with synthetic polymers poly(ethylene glycol) (PEG), methoxypoly (ethylene glycol) polyamidoamine (mPEG-PAMAM-G3) and polyamidoamine (PAMAM-G4) dendrimers was studied in aqueous solution at pH 7.4. Multiple spectroscopic methods, transmission electron microscopy (TEM) and molecular modeling were used to characterize the drug binding process to synthetic polymers. Structural analysis showed that drug-polymer binding occurs via both H-bonding and hydrophobic contacts. The order of binding is PAMAM-G4>mPEG-PAMAM-G3>PEG-6000 with 4-hydroxttamoxifen forming more stable conjugate than tamoxifen and endoxifen. Transmission electron microscopy showed significant changes in carrier morphology with major changes in the shape of the polymer aggregate as drug encapsulation occurred. Modeling also showed that drug is located in the surface and in the internal cavities of PAMAM with the free binding energy of -3.79 for tamoxifen, -3.70 for 4-hydroxytamoxifen and -3.69kcal/mol for endoxifen, indicating of spontaneous drug-polymer interaction at room temperature. PMID:27137803

  13. Perturbations of cellular membranes with synthetic polymers and ultrafast lasers

    Science.gov (United States)

    Kelly, Christopher Vaughn-Daigneau

    This dissertation examines the response of the plasma membrane to perturbations by synthetic nanoparticles and ultra-fast laser pulses. Both model membranes and living cells were examined in to characterize membrane disruption and the biological response to perturbation. These studies provide a deeper understanding of cell biology and guide the design of effective nanoparticle- or laser-based therapies, as well as warning about unintended exposure. In regards to membrane disruption by pulsed-laser irradiation, irradiation induced giant plasma membrane vesicles (GPMVs) on the surface of the living cell. This process involved the incorporation of material from the extracellular media into both the cytoplasm and the GPMV as the cell responded to the intense pressure and temperature gradients induced by irradiation and the subsequent cavitation. Further, the cell exposed phosphotidylserine to the exterior surface of the plasma membrane and GPMV and initiated caspase activity. Single particle tracking of 20 nm fluorescent beads within the GPMVs demonstrated a complex, gelatinous structure within the GPMV. In regards to nanoparticle-based perturbations, techniques such as isothermal titration calorimetry and molecular dynamics were used to investigate the relationship between nanoparticle properties and membrane disruption. Molecular dynamics simulations examined the binding of third-generation poly(amidoamine) dendrimers to phosphatidylcholine bilayers as a function on nanoparticle termination and membrane phase. A potential of mean force was calculated and demonstrated that the charged dendrimers bound to the zwitterionic phospholipids with approximately 50% more free energy release than uncharged dendrimers. Further, the difference in dendrimer binding to gel and fluid lipids was largely due to the hydrophobic interactions between the lipid tails and the non-polar dendrimer moieties. Isothermal titration calorimetry examined the heat release upon interaction between

  14. Comparison of spatial frequency domain features for the detection of side attack explosive ballistics in synthetic aperture acoustics

    Science.gov (United States)

    Dowdy, Josh; Anderson, Derek T.; Luke, Robert H.; Ball, John E.; Keller, James M.; Havens, Timothy C.

    2016-05-01

    Explosive hazards in current and former conflict zones are a threat to both military and civilian personnel. As a result, much effort has been dedicated to identifying automated algorithms and systems to detect these threats. However, robust detection is complicated due to factors like the varied composition and anatomy of such hazards. In order to solve this challenge, a number of platforms (vehicle-based, handheld, etc.) and sensors (infrared, ground penetrating radar, acoustics, etc.) are being explored. In this article, we investigate the detection of side attack explosive ballistics via a vehicle-mounted acoustic sensor. In particular, we explore three acoustic features, one in the time domain and two on synthetic aperture acoustic (SAA) beamformed imagery. The idea is to exploit the varying acoustic frequency profile of a target due to its unique geometry and material composition with respect to different viewing angles. The first two features build their angle specific frequency information using a highly constrained subset of the signal data and the last feature builds its frequency profile using all available signal data for a given region of interest (centered on the candidate target location). Performance is assessed in the context of receiver operating characteristic (ROC) curves on cross-validation experiments for data collected at a U.S. Army test site on different days with multiple target types and clutter. Our preliminary results are encouraging and indicate that the top performing feature is the unrolled two dimensional discrete Fourier transform (DFT) of SAA beamformed imagery.

  15. Frontiers in biomaterials the design, synthetic strategies and biocompatibility of polymer scaffolds for biomedical application

    CERN Document Server

    Cao, Shunsheng

    2014-01-01

    Frontiers in Biomaterials: The Design, Synthetic Strategies and Biocompatibility of Polymer Scaffolds for Biomedical Application, Volume 1" highlights the importance of biomaterials and their interaction with biological system. The need for the development of biomaterials as scaffold for tissue regeneration is driven by the increasing demands for materials that mimic functions of extracellular matrices of body tissues.This ebook covers the latest challenges on the biocompatibility of scaffold overtime after implantation and discusses the requirement of innovative technologies and strategies f

  16. Thermal properties of thermoplastic starch/synthetic polymer blends with potential biomedical applicability

    OpenAIRE

    Mano, J. F.; Koniarova, D.; Reis, R. L.

    2003-01-01

    Previous studies shown that thermoplastic blends of corn starch with some biodegradable synthetic polymers (poly(-caprolactone), cellulose acetate, poly(lactic acid) and ethylene-vinyl alcohol copolymer) have good potential to be used in a series of biomedical applications. In this work the thermal behavior of these structurally complex materials is investigated by differential scanning calorimetry (DSC) and by thermogravimetric analysis (TGA). In addition, Fourier-transform infrared (FTIR) s...

  17. Emerging synthetic strategies for core cross-linked star (CCS) polymers and applications as interfacial stabilizers: bridging linear polymers and nanoparticles.

    Science.gov (United States)

    Chen, Qijing; Cao, Xueteng; Xu, Yuanyuan; An, Zesheng

    2013-10-01

    Core cross-linked star (CCS) polymers become increasingly important in polymer science and are evaluated in many value-added applications. However, limitations exist to varied degrees for different synthetic methods. It is clear that improvement in synthetic efficiency is fundamental in driving this field moving even further. Here, the most recent advances are highlighted in synthetic strategies, including cross-linking with cross-linkers of low solubility, polymerization-induced self-assembly in aqueous-based heterogeneous media, and cross-linking via dynamic covalent bonds. The understanding of CCS polymers is also further refined to advocate their role as an intermediate between linear polymers and polymeric nanoparticles, and their use as interfacial stabilizers is rationalized within this context.

  18. Radiation synthesis and characterization of network structure of natural/synthetic double-network superabsorbent polymers

    International Nuclear Information System (INIS)

    Complete text of publication follows. Superabsorbent polymers (SAPs) are moderately cross linked, 3-D, hydrophilic network polymers that can absorb and conserve considerable amounts of aqueous fluids even under certain heat or pressure. Because of the unique properties superior to conventional absorbents, SAPs have found potential application in many fields such as hygienic products, disposable diapers, horticulture, gel actuators, drug-delivery systems, as well as water-blocking tapes coal dewatering, water managing materials for the renewal of arid and desert environment, etc. In recent years, naturally available resources, such as polysaccharides have drawn considerable attention for the preparation of SAPs. Since the mechanical properties of polysaccharide based natural polymers are low, researchers have mostly focused on natural/synthetic polymer/monomer mixtures to obtain novel SAPs. The aim of this study is to synthesize and characterization of network structure of novel double-network (DN) hydrogels as a SAP. Hydrogels with high mechanical strength have been prepared by radiation induced polymerization and crosslink of acrylic acid sodium salt in the presence of natural polymer locust bean gum. Liquid retention capacities and absorbency under load (AUL) analysis of synthesized SAPs was performed at different temperatures in water and synthetic urine solution, in order to determine their SAP character. For the characterization of network structure of the semi-IPN hydrogels, the average molecular weight between cross links (Mc) were evaluated by using uniaxial compression and oscillatory dynamical mechanical analyses and the advantage and disadvantage of these two technique for the characterization of network structures were compared.

  19. Catechol-Functionalized Synthetic Polymer as a Dental Adhesive to Contaminated Dentin Surface for a Composite Restoration

    OpenAIRE

    Lee, Sang-Bae; González-Cabezas, Carlos; Kim, Kwang-mahn; Kim, Kyoung-Nam; Kuroda, Kenichi

    2015-01-01

    This study reports a synthetic polymer functionalized with catechol groups as dental adhesives. We hypothesize that a catechol-functionalized polymer functions as a dental adhesive for wet dentin surfaces, potentially eliminating the complications associated with saliva contamination. We prepared a random copolymer containing catechol and methoxyethyl groups in the side chains. The mechanical and adhesive properties of the polymer to dentin surface in the presence of water and salivary compon...

  20. Bio-Organic Nanotechnology: Using Proteins and Synthetic Polymers for Nanoscale Devices

    Science.gov (United States)

    Molnar, Linda K.; Xu, Ting; Trent, Jonathan D.; Russell, Thomas P.

    2003-01-01

    While the ability of proteins to self-assemble makes them powerful tools in nanotechnology, in biological systems protein-based structures ultimately depend on the context in which they form. We combine the self-assembling properties of synthetic diblock copolymers and proteins to construct intricately ordered, three-dimensional polymer protein structures with the ultimate goal of forming nano-scale devices. This hybrid approach takes advantage of the capabilities of organic polymer chemistry to build ordered structures and the capabilities of genetic engineering to create proteins that are selective for inorganic or organic substrates. Here, microphase-separated block copolymers coupled with genetically engineered heat shock proteins are used to produce nano-scale patterning that maximizes the potential for both increased structural complexity and integrity.

  1. Calculating the vulnerability of synthetic polymers to autoignition during nuclear flash. Final report

    International Nuclear Information System (INIS)

    The purpose of our investigation was to determine if the rapid progression of fire to flashover conditions in a furnished room, observed in a 1953 nuclear weapons test at the Nevada Test Site (the Encore Event), might be typical behavior rather than an aberration. If flashover under such conditions is indeed likely, this phenomenon is worth pursuing in view of the increased threat to buildings and human life from possible large-scale fires. We placed special emphasis on fires that occurred in modern rooms, i.e., ones furnished with upholstery and drapery materials made from synthetic polymers. Examination of photochemical processes showed them to be an unlikely explanation, either in Encore or in the future. Our calculation of rapid radiant-heating behavior of a few materials demonstrated that fabrics and fabric-covered foams would exceed their autoignition temperature when exposed to a 25-cal/cm2 fluence from a 1-Mt air burst weapon. Because synthetic polymers have higher heating values and release heat faster during combustion than do the cellulosics used in the Encore experiment, early flashover should not be unexpected in contemporary households. However, the far-field thermal fluence required would be higher because of the absorption of thermal energy by windows and window coverings. Because of the complexity of the problem, carefully planned, full-scale experiments will be needed to finally answer the question. 39 refs., 9 figs., 8 tabs

  2. Human articular chondrocyte adhesion and proliferation on synthetic biodegradable polymer films.

    Science.gov (United States)

    Ishaug-Riley, S L; Okun, L E; Prado, G; Applegate, M A; Ratcliffe, A

    1999-12-01

    The effect of polymer chemistry on adhesion, proliferation, and morphology of human articular cartilage (HAC) chondrocytes was evaluated on synthetic degradable polymer films and tissue culture polystyrene (TCPS) as a control. Two-dimensional surfaces of poly(glycolide) (PGA), poly(L-lactide) (L-PLA), poly(D,L-lactide) (D,L-PLA), 85:15 poly(D,L-lactide-co-glycolide) (D,L-PLGA), poly(epsilon-caprolactone) (PCL), 90:10 (D,L-lactide-co-caprolactone) (D,L-PLCL), 9:91 D,L-PLCL, 40:60 L-PLCL, 67:33 poly(glycolide-co-trimethylene carbonate) (PGTMC), and poly(dioxanone) (PDO) were made by spin-casting into uniform thin films. Adhesion kinetics were studied using TCPS and PCL films and revealed that the rate of chondrocyte adhesion began to level off after 6 h. Degree of HAC chondrocyte adhesion was studied on all the substrates after 8 h, and ranged from 47 to 145% of the attachment found on TCPS. The greatest number of chondrocytes attached to PGA and 67:33 PGTMC polymer films, and attachment to PCL and L-PLA films was statistically lower than that found on PGA (p PLA, respectively, which was significantly higher than the 11-fold expansion found on TCPS (p PLA films may be attributed to the availability of space for cells to grow, since their numbers at the start of culture were fewer following the 8 h attachment period. This suggests that regardless of initial seeding density on these degradable polymer substrates (i.e., if some minimum number of cells are able to attach), they will eventually populate the surfaces of all these polymers given sufficient space and time. PMID:10614931

  3. Design of biomimetic catalysts by molecular imprinting in synthetic polymers: the role of transition state stabilization.

    Science.gov (United States)

    Wulff, Günter; Liu, Junqiu

    2012-02-21

    The impressive efficiency and selectivity of biological catalysts has engendered a long-standing effort to understand the details of enzyme action. It is widely accepted that enzymes accelerate reactions through their steric and electronic complementarity to the reactants in the rate-determining transition states. Thus, tight binding to the transition state of a reactant (rather than to the corresponding substrate) lowers the activation energy of the reaction, providing strong catalytic activity. Debates concerning the fundamentals of enzyme catalysis continue, however, and non-natural enzyme mimics offer important additional insight in this area. Molecular structures that mimic enzymes through the design of a predetermined binding site that stabilizes the transition state of a desired reaction are invaluable in this regard. Catalytic antibodies, which can be quite active when raised against stable transition state analogues of the corresponding reaction, represent particularly successful examples. Recently, synthetic chemistry has begun to match nature's ability to produce antibody-like binding sites with high affinities for the transition state. Thus, synthetic, molecularly imprinted polymers have been engineered to provide enzyme-like specificity and activity, and they now represent a powerful tool for creating highly efficient catalysts. In this Account, we review recent efforts to develop enzyme models through the concept of transition state stabilization. In particular, models for carboxypeptidase A were prepared through the molecular imprinting of synthetic polymers. On the basis of successful experiments with phosphonic esters as templates to arrange amidinium groups in the active site, the method was further improved by combining the concept of transition state stabilization with the introduction of special catalytic moieties, such as metal ions in a defined orientation in the active site. In this way, the imprinted polymers were able to provide both an

  4. Radiation Synthesis and Characterization of Natural and Natural-Synthetic Hybrid Super Absorbent Polymers for Agricultural Applications. Chapter 19

    International Nuclear Information System (INIS)

    The experimental studies carried out in Hacettepe University, Laboratories of Radiation and Polymers Science (LRPS) in the past ten years, which focused mainly on the synthesis of synthetic and natural-synthetic super absorbent polymers in various irradiation conditions, are summarized in the first part of the presentation. Studies conducted on the following areas: (1) the controlled release of fertilizers and herbicides and the effect of the natural polymer type, (2) the neutralization degree of poly(acrylic acid), (3) the temperature and pressure on the swelling kinetics, and (4) the maximum water absorption capacity of the potential soil conditional hydrogels, were explained. The results were then compared with those obtained from commercial super absorbent polymers prepared through conventional techniques. In the third part of the presentation, basic and advanced techniques in the characterization of the network structure of super water absorbents were presented. (author)

  5. Biodegradability of PP/HMSPP and natural and synthetic polymers blends in function of gamma irradiation degradation

    Science.gov (United States)

    Cardoso, Elisabeth C. L.; Scagliusi, Sandra R.; Lima, Luis F. C. P.; Bueno, Nelson R.; Brant, Antonio J. C.; Parra, Duclerc F.; Lugão, Ademar B.

    2014-01-01

    Polymers are used for numerous applications in different industrial segments, generating enormous quantities of discarding in the environment. Polymeric materials composites account for an estimated from 20 to 30% total volume of solid waste. Polypropylene (PP) undergoes crosslinking and extensive main chain scissions when submitted to ionizing irradiation; as one of the most widely used linear hydrocarbon polymers, PP, made from cheap petrochemical feed stocks, shows easy processing leading it to a comprehensive list of finished products. Consequently, there is accumulation in the environment, at 25 million tons per year rate, since polymeric products are not easily consumed by microorganisms. PP polymers are very bio-resistant due to involvement of only carbon atoms in main chain with no hydrolysable functional group. Several possibilities have been considered to minimize the environmental impact caused by non-degradable plastics, subjecting them to: physical, chemical and biological degradation or combination of all these due to the presence of moisture, air, temperature, light, high energy radiation or microorganisms. There are three main classes of biodegradable polymers: synthetic polymers, natural polymers and blends of polymers in which one or more components are readily consumed by microorganisms. This work aims to biodegradability investigation of a PP/HMSPP (high melt strength polypropylene) blended with sugarcane bagasse, PHB (poly-hydroxy-butyrate) and PLA (poly-lactic acid), both synthetic polymers, at a 10% level, subjected to gamma radiation at 50, 100, 150 and 200 kGy doses. Characterization will comprise IR, DSC, TGA, OIT and Laboratory Soil Burial Test (LSBT).

  6. Natural and synthetic mineral silicates as functional nanoparticles in polymer composites

    Science.gov (United States)

    Shao, Hua

    A new strategy is described for the substantial enhancement of the barrier properties for both a thermoset epoxy polymer and a thermoplastic polyolefin by sandwiching a novel self-supported clay fabric film between thin polymer sheets. The success of this strategy is attributed to the high orientation of clay nanolayers in the paper-like clay fabric films and to the filling of the micro- or sub-micro sized voids between imperfectly tiled clay platelet edges by the polymer chains. Thermoplastic polyolefin-clay fabric film composites were fabricated by hot-pressing the clay films between two sheets of high density polyethylene (HDPE) films. The sandwiched composites exhibit more than a 30-fold decrease in O2 transmission rate with respect to the pure HDPE film. Impregnating the self-supported clay papers with epoxy pre-polymers successfully leads to thermoset composite films with more than 2-3 orders of magnitude reduction in O2 permeability in comparison to the pristine epoxy matrix. Owing to the promising use of synthetic Mg-saponite (denoted SAP) as epoxy polymer reinforcing agents, we investigated the cost-effective synthesis of SAP by replacing urea with sodium hydroxide as base source. Co-crystallization of new zeolite phases, such as garronite (denoted GIS) and cancrinite (denoted CAN), occurred along with SAP upon increasing the alkalinity of the reaction mixture. This finding represents the first example of the preparation of a CAN/SAP phase mixture. Moreover, pure-phase cancrinite with rod-like morphology up to several mum in length was synthesized under Mg-free conditions. Also, the Si/AI ratio within the synthesis gel has an influence on the chemical composition and textural properties of pure CAN crystals. Microporous cancrinite is a promising candidate for reinforcing epoxy polymers, considering that CAN represents a substantial fraction of the mixed CAN-SAP phase formed during the synthesis of saponite. Therefore, the reaction conditions (e

  7. Hemostatic potential of natural/synthetic polymer based hydrogels crosslinked by gamma radiation

    Science.gov (United States)

    Barba, Bin Jeremiah D.; Tranquilan-Aranilla, Charito; Abad, Lucille V.

    2016-01-01

    Various raw materials and hydrogels prepared from their combination were assessed for hemostatic capability using swine whole blood clotting analysis. Initial screening showed efficient coagulative properties from κ-carrageenan and its carboxymethylated form, and α-chitosan, even compared to commercial products like QuikClot Zeolite Powder. Blending natural and synthetic polymers formed into hydrogels using gamma radiation produced materials with improved properties. KC and CMKC hydrogels were found to have the lowest blood clotting index in granulated form and had the higher capacity for platelet adhesion in foamed form compared to GelFoam. Possible mechanisms involved in the evident thrombogenicity of the materials include adsorption of platelets and related proteins that aid in platelet activation (primary hemostasis), absorption of water to concentrate protein factors that control the coagulation cascade, contact activation by its negatively charged surface and the formation of gel-blood clots.

  8. Improving the Compatibility of Natural and Synthetic Polymer Blends by Radiation Treatments for Using in Practical Application

    International Nuclear Information System (INIS)

    Different polymer blends based on the natural polymers carboxymethyl cellulose (CMC) and sodium alginate as well as the synthetic polymers poly(ethylene glycol) (PEG), poly(ethylene oxide) (PEO) and poly acrylamide (PAM) were prepared by solution casting in the form of films. The common solvent used was water. The different blends prepared in this study were subjected to gamma radiation. The compatibility and structure-property behaviour of these blends was studied by differential scanning calorimetry (DSC), Fourier-Transform Infrared (FTIR) analysis, thermogravimetric analysis (TGA), scanning electron microscopy (SEM), and tensile mechanical testing before and after irradiation. In addition, the swelling properties of different polymer blends were studied at different conditions of temperature and ph. The controlled release characters of the different blends of different drugs were investigated. In addition, the different polymer blends were used for the removal of heavy metals and dyes waste.

  9. Protein and synthetic polymer injection for induction of obstructive hydrocephalus in rats

    Directory of Open Access Journals (Sweden)

    Del Bigio Marc R

    2007-09-01

    Full Text Available Abstract Background The objective of this study was to develop a simple and inexpensive animal model of induced obstructive hydrocephalus with minimal tissue inflammation, as an alternative to kaolin injection. Materials Two-hundred and two male Sprague-Dawley rats aged 3 weeks received intracisternal injections of kaolin (25% suspension, Matrigel, type 1 collagen from rat tail, fibrin glue (Tisseel, n-butyl-cyanoacrylate (NBCA, or ethylene vinyl alcohol copolymer (Onyx-18 and Onyx-34. Magnetic resonance imaging was used to assess ventricle size. Animals were euthanized at 2, 5, 10 and 14 days post-injection for histological analysis. Results Kaolin was associated with 10% mortality and successful induction of hydrocephalus in 97% of survivors (ventricle area proportion 0.168 ± 0.018. Rapidly hardening agents (fibrin glue, NBCA, vinyl polymer had high mortality rates and low success rates in survivors. Only Matrigel had relatively low mortality (17% and moderate success rate (20%. An inflammatory response with macrophages and some lymphocytes was associated with kaolin. There was negligible inflammation associated with Matrigel. A severe inflammatory response with giant cell formation was associated with ethylene vinyl alcohol copolymer. Conclusion Kaolin predictably produces moderate to severe hydrocephalus with a mild chronic inflammatory reaction and fibrosis of the leptomeninges. Other synthetic polymers and biopolymers tested are unreliable and cause different types of inflammation.

  10. Enzyme-free translation of DNA into sequence-defined synthetic polymers structurally unrelated to nucleic acids

    Science.gov (United States)

    Niu, Jia; Hili, Ryan; Liu, David R.

    2013-04-01

    The translation of DNA sequences into corresponding biopolymers enables the production, function and evolution of the macromolecules of life. In contrast, methods to generate sequence-defined synthetic polymers with similar levels of control have remained elusive. Here, we report the development of a DNA-templated translation system that enables the enzyme-free translation of DNA templates into sequence-defined synthetic polymers that have no necessary structural relationship with nucleic acids. We demonstrate the efficiency, sequence-specificity and generality of this translation system by oligomerizing building blocks including polyethylene glycol, α-(D)-peptides, and β-peptides in a DNA-programmed manner. Sequence-defined synthetic polymers with molecular weights of 26 kDa containing 16 consecutively coupled building blocks and 90 densely functionalized β-amino acid residues were translated from DNA templates using this strategy. We integrated the DNA-templated translation system developed here into a complete cycle of translation, coding sequence replication, template regeneration and re-translation suitable for the iterated in vitro selection of functional sequence-defined synthetic polymers unrelated in structure to nucleic acids.

  11. Biodegradability of PP/HMSPP and natural and synthetic polymers blends in function of gamma irradiation degradation

    International Nuclear Information System (INIS)

    Polymers are used for numerous applications in different industrial segments, generating enormous quantities of discarding in the environment. Polymeric materials composites account for an estimated from 20 to 30% total volume of solid waste. Polypropylene (PP) undergoes crosslinking and extensive main chain scissions when submitted to ionizing irradiation; as one of the most widely used linear hydrocarbon polymers, PP, made from cheap petrochemical feed stocks, shows easy processing leading it to a comprehensive list of finished products. Consequently, there is accumulation in the environment, at 25 million tons per year rate, since polymeric products are not easily consumed by microorganisms. PP polymers are very bio-resistant due to involvement of only carbon atoms in main chain with no hydrolysable functional group. Several possibilities have been considered to minimize the environmental impact caused by non-degradable plastics, subjecting them to: physical, chemical and biological degradation or combination of all these due to the presence of moisture, air, temperature, light, high energy radiation or microorganisms. There are three main classes of biodegradable polymers: synthetic polymers, natural polymers and blends of polymers in which one or more components are readily consumed by microorganisms. This work aims to biodegradability investigation of a PP/HMSPP (high melt strength polypropylene) blended with sugarcane bagasse, PHB (poly-hydroxy-butyrate) and PLA (poly-lactic acid), both synthetic polymers, at a 10% level, subjected to gamma radiation at 50, 100, 150 and 200 kGy doses. Characterization will comprise IR, DSC, TGA, OIT and Laboratory Soil Burial Test (LSBT). - Highlights: • Polymeric materials composites account for an estimated from 20 to 30% total volume of solid waste. • Landfills will not be enough for an estimated accumulation of 25 million tons per year of plastics. • Incorporation of natural/synthetic polymers in PP/HMSPP to reduce

  12. Synthetic

    Directory of Open Access Journals (Sweden)

    Anna Maria Manferdini

    2010-06-01

    Full Text Available Traditionally materials have been associated with a series of physical properties that can be used as inputs to production and manufacturing. Recently we witnessed an interest in materials considered not only as ‘true matter’, but also as new breeds where geometry, texture, tooling and finish are able to provoke new sensations when they are applied to a substance. These artificial materials can be described as synthetic because they are the outcome of various qualities that are not necessarily true to the original matter, but they are the combination of two or more parts, whether by design or by natural processes. The aim of this paper is to investigate the potential of architectural surfaces to produce effects through the invention of new breeds of artificial matter, using micro-scale details derived from Nature as an inspiration.

  13. Probing the Biomimetic Ice Nucleation Inhibition Activity of Poly(vinyl alcohol) and Comparison to Synthetic and Biological Polymers.

    Science.gov (United States)

    Congdon, Thomas; Dean, Bethany T; Kasperczak-Wright, James; Biggs, Caroline I; Notman, Rebecca; Gibson, Matthew I

    2015-09-14

    Nature has evolved many elegant solutions to enable life to flourish at low temperatures by either allowing (tolerance) or preventing (avoidance) ice formation. These processes are typically controlled by ice nucleating proteins or antifreeze proteins, which act to either promote nucleation, prevent nucleation or inhibit ice growth depending on the specific need, respectively. These proteins can be expensive and their mechanisms of action are not understood, limiting their translation, especially into biomedical cryopreservation applications. Here well-defined poly(vinyl alcohol), synthesized by RAFT/MADIX polymerization, is investigated for its ice nucleation inhibition (INI) activity, in contrast to its established ice growth inhibitory properties and compared to other synthetic polymers. It is shown that ice nucleation inhibition activity of PVA has a strong molecular weight dependence; polymers with a degree of polymerization below 200 being an effective inhibitor at just 1 mg.mL(-1). Other synthetic and natural polymers, both with and without hydroxyl-functional side chains, showed negligible activity, highlighting the unique ice/water interacting properties of PVA. These findings both aid our understanding of ice nucleation but demonstrate the potential of engineering synthetic polymers as new biomimetics to control ice formation/growth processes. PMID:26258729

  14. Catechol-Functionalized Synthetic Polymer as a Dental Adhesive to Contaminated Dentin Surface for a Composite Restoration.

    Science.gov (United States)

    Lee, Sang-Bae; González-Cabezas, Carlos; Kim, Kwang-Mahn; Kim, Kyoung-Nam; Kuroda, Kenichi

    2015-08-10

    This study reports a synthetic polymer functionalized with catechol groups as dental adhesives. We hypothesize that a catechol-functionalized polymer functions as a dental adhesive for wet dentin surfaces, potentially eliminating the complications associated with saliva contamination. We prepared a random copolymer containing catechol and methoxyethyl groups in the side chains. The mechanical and adhesive properties of the polymer to dentin surface in the presence of water and salivary components were determined. It was found that the new polymer combined with an Fe(3+) additive improved bond strength of a commercial dental adhesive to artificial saliva contaminated dentin surface as compared to a control sample without the polymer. Histological analysis of the bonding structures showed no leakage pattern, probably due to the formation of Fe-catechol complexes, which reinforce the bonding structures. Cytotoxicity test showed that the polymers did not inhibit human gingival fibroblast cells proliferation. Results from this study suggest a potential to reduce failure of dental restorations due to saliva contamination using catechol-functionalized polymers as dental adhesives.

  15. Size exclusion chromatography of synthetic polymers and biopolymers on common reversed phase and hydrophilic interaction chromatography columns.

    Science.gov (United States)

    Caltabiano, Anna M; Foley, Joe P; Barth, Howard G

    2016-03-11

    This work describes the applicability of common reversed phase and HILIC columns for size exclusion chromatography of synthetic and natural polymers. Depending on the nature of the solute and column stationary phase, a "non-retention" condition must be created with the aid of the mobile phase to achieve a unique size-based separation in isocratic mode. The various bonded phases show remarkable differences in size separations that are controlled by mobile phase conditions. Polymer-mobile phase and column-mobile phase solvation interactions determine polymer hydrodynamic volume (or solute bulkiness) and polymer-column steric interaction. Solvation interactions in turn depend on polymer, mobile phase and stationary phase polarities. Column-mobile phase solvation interactions determine the structural order of the bonded ligands that can vary from ordered (extended, aligned away from the silica substrate) to disordered (folded, pointing toward the silica substrate). Chain order increases with increased solvent penetration into the bonded phase. Increased chain order reduces pore volume, and therefore decreases the size-separation efficiency of a column. Conversely, decreased chain order increases pore volume and therefore increases the size-separation efficiency. The thermodynamic quality of the mobile phase also plays a significant role in the separation of polymers. "Poor" solvents can significantly reduce the hydrodynamic diameter of a solute and thus change their retention behavior. Medium polarity stationary phases, such as fluoro-phenyl and cyano, exhibit a unique retention behavior. With an appropriate polarity mobile phase, polar and non-polar synthetic polymers of the same molecular masses can be eluted at the same retention volumes.

  16. Natural-Synthetic Hybrid Polymers Developed via Electrospinning: The Effect of PET in Chitosan/Starch System

    Directory of Open Access Journals (Sweden)

    Carlos Velasco-Santos

    2011-03-01

    Full Text Available Chitosan is an amino polysaccharide found in nature, which is biodegradable, nontoxic and biocompatible. It has versatile features and can be used in a variety of applications including films, packaging, and also in medical surgery. Recently a possibility to diversify chitosan properties has emerged by combining it with synthetic materials to produce novel natural-synthetic hybrid polymers. We have studied structural and thermophysical properties of chitosan + starch + poly(ethylene terephthalate (Ch + S + PET fibers developed via electrospinning. Properties of these hybrids polymers are compared with extant chitosan containing hybrids synthesized by electrospinning. Molecular interactions and orientation in the fibers are analyzed by infrared and Raman spectroscopies respectively, morphology by scanning electron microscopy and thermophysical properties by thermogravimetric analysis and differential scanning calorimetry. Addition of PET to Ch + S systems results in improved thermal stability at elevated temperatures.

  17. Synthetic molecular machines and polymer/monomer size switches that operate through dynamic and non-dynamic covalent changes.

    Science.gov (United States)

    Stadler, Adrian-Mihail; Ramírez, Juan

    2012-01-01

    The present chapter is focused on how synthetic molecular machines (e.g. shuttles, switches and molecular motors) and size switches (conversions between polymers and their units, i.e., conversions between relatively large and small molecules) can function through covalent changes. Amongst the interesting examples of devices herein presented are molecular motors and size switches based on dynamic covalent chemistry which is an area of constitutional dynamic chemistry. PMID:22169959

  18. Preparation of Dis-Azo Dyes Derived from p-Aminophenol and Their Fastness Properties for Synthetic Polymer-Fibres

    Science.gov (United States)

    Otutu, J. O.; Okoro, D.; Ossai, E. K.

    The preparation and properties of a series of dis-azo dyes derived from p-aminophenol is described. The influence on colour, dyeing fastness properties of the dyes on synthetic polymer-fibres is reported. Most of the dyes synthesized afford better light fastness and better wet (wash, perspiration) fastness on PET than on nylon 6 fabric. The structure of each compound was confirmed by using infrared, UV-VIS and elemental analysis.

  19. Tissue engineered esophagus scaffold constructed with porcine small intestinal submucosa and synthetic polymers

    International Nuclear Information System (INIS)

    Acellular porcine small intestinal submucosa (SIS) has been successfully used for reconstructing esophagus with half circumferential defects. However, repairing full circumferential esophageal defects with SIS has been restricted due to the latter's poor mechanical properties. In the present study, synthetic polyesters biomaterial poly(3-hydroxybutyrate-co-3-hydroxyhexanoate) (PHBHHx) and poly(lactide-co-glycolide) (PLGA) have been used to improve the mechanical properties of SIS. Feasibility of SIS/PHBHHx-PLGA composite material scaffold for esophageal tissue engineering has been assessed through a series of testing. The appropriate mixing ratio of PHBHHx and PLGA polymers has been determined as 5:5 by mechanical testing and in vitro degradation experiment. The morphology of constructed membranous and tubular scaffolds was also characterized. As confirmed by enzyme-linked immunosorbent assay, the contents of VEGF and TGF-β have respectively reached 657 ± 18 ng mL−1 and 130 ± 4 pg mL−1 within the SIS/PHBHHx-PLGA specimens. Biocompatibility of the SIS/PHBHHx-PLGA specimens with rat bone marrow mesenchymal stem cells (MSCs) was also evaluated by scanning electron microscopy and a live–dead cell viability assay. Actin filaments of MSCs on the composite materials were labeled. Biological safety of the extract from SIS/PHBHHx-PLGA specimens, measured as hemolysis rate, was all lower than 5%. Compared with SIS and SIS/PHBHHx-PLGA specimens, inflammatory reaction provoked by the PHBHHx-PLGA specimens in rats was however more severe. Our results have suggested that SIS/PHBHHx-PLGA composite material can offer a new approach for esophageal tissue engineering. (paper)

  20. Biodegradable synthetic polymer scaffolds for reinforcement of albumin protein solders used for laser-assisted tissue repair.

    Science.gov (United States)

    Hoffman, Grant T; Soller, Eric C; McNally-Heintzelman, Karen M

    2002-01-01

    Laser tissue soldering has been investigated for several years by researchers in our laboratory as an alternative to conventional tissue fasteners, including sutures, staples and clips. Laser tissue soldering is a bonding technique in which protein solder is applied to the tissue surfaces to be joined, and laser energy is used to bond the solder to the tissue surfaces. Over the past four years we have been investigating the use of synthetic polymer membranes as a means for reinforcing the strength of tissue repairs formed using traditional laser tissue soldering techniques. The purpose of this study was to assess the influence of various processing parameters on the strength of tissue repairs formed using the reinforced solder. Biodegradable polymer membranes of specific porosity were fabricated by means of a solvent-casting and particulate-leaching technique, using three different poly(alpha ester)s: polyglycolic acid (PGA), polylactic acid (PLA) and poly(L-lactic-co-glycolic acid) (PLGA). In addition, several membranes were also prepared with poly(ethylene glycol) (PEG). The membranes were then doped with the traditional protein solder mixture of serum albumin and indocyanine green dye. Varied processing parameters included the polymer type, the PLGA copolymer blend ratio, the polymer/PEG blend ratio, the porosity of the polymer membrane and the initial albumin weight fraction. Variation of the polymer type had negligible effect on the strength of the repairs. Although it is known that alteration of the copolymer blend ratio of PLGA influences the degradation rate of the polymer, this variation also had no significant effect on the strength of the repairs formed. Increased membrane flexibility was observed when PEG was added during the casting stage. An increase in the porosity of the polymer membranes led to a subsequent increase in the final concentration of protein contained within the membranes, hence aiding in strengthening the resultant repairs. Likewise

  1. Enzymatic modification of natural and synthetic polymers using lipases and proteases

    Science.gov (United States)

    Chakraborty, Soma

    Enzymatic modification of natural/synthetic polymers [starch nanoparticles, poly (n-alkyl acrylates) and poly(vinyl formamide)] was studied. Enzymes used for catalysis were lipases and proteases. Starch nanoparticles (40nm diameter) were incorporated into AOT-coated reverse micelles. Reactions performed with the acylating agents vinyl stearate, epsilon-caprolactone and maleic anhydride in toluene in presence of Novozyme-435 at 40°C for 36h gave products with degrees of substitution of 0.8, 0.6 and 0.4 respectively. DEPT-135 NMR spectra revealed that the modification occurred regioselectively at the C-6 position of the glucose units. Infrared microspectroscopy showed that the surfactant coated starch nanoparticles diffuse into pores of Novozyme-435 beads, coming in close proximity with CALB to promote modification. The modified products retained nanoscale dimensions. Catalysis of amide bond formation between a low molar mass amine and ester side groups of poly(n-alkyl acrylates)[poly(ethyl acrylate), poly(methyl acrylate) and poly(butyl acrylate)] was also examined. The nucleophiles were mono and diamines. Among the poly(n-alkyl acrylates) and the lipases studied, poly(ethyl acrylate) was the preferred substrate and Novozyme-435 the most active lipase. Poly(ethyl acrylate) in 80% by-volume toluene was reacted with 1 equivalent per repeat unit of hexyl amine at 70°C in presence of Novozyme-435. The product contained 10.6 mol% amide groups. Attempts to increase the amidation beyond 10--11 mol% by increasing the reaction time or use of fresh enzyme were unsuccessful, showing that poly(ethylacrylate-co-10mol%hexylacrylamide) is a poor substrate for further acylation. When chiral amines ([R,S]-alpha-methyl benzylamine, [R,S]-beta-methyl phenyl amine) were used as nucleophiles, Novozyme-435 enantioselectively catalyzed amidation of poly(ethyl acrylate). Poly(vinyl formamide), P(VfAm) by acid or base-catalyzed hydrolysis leads to poly(vinylamine), P(VAm), and

  2. Synthetic polymers in the marine environment: a rapidly increasing, long-term threat.

    Science.gov (United States)

    Moore, Charles James

    2008-10-01

    Synthetic polymers, commonly known as plastics, have been entering the marine environment in quantities paralleling their level of production over the last half century. However, in the last two decades of the 20th Century, the deposition rate accelerated past the rate of production, and plastics are now one of the most common and persistent pollutants in ocean waters and beaches worldwide. Thirty years ago the prevailing attitude of the plastic industry was that "plastic litter is a very small proportion of all litter and causes no harm to the environment except as an eyesore" [Derraik, J.G.B., 2002. The pollution of the marine environment by plastic debris: a review. Mar. Pollut. Bull. 44(9), 842-852]. Between 1960 and 2000, the world production of plastic resins increased 25-fold, while recovery of the material remained below 5%. Between 1970 and 2003, plastics became the fastest growing segment of the US municipal waste stream, increasing nine-fold, and marine litter is now 60-80% plastic, reaching 90-95% in some areas. While undoubtedly still an eyesore, plastic debris today is having significant harmful effects on marine biota. Albatross, fulmars, shearwaters and petrels mistake floating plastics for food, and many individuals of these species are affected; in fact, 44% of all seabird species are known to ingest plastic. Sea turtles ingest plastic bags, fishing line and other plastics, as do 26 species of cetaceans. In all, 267 species of marine organisms worldwide are known to have been affected by plastic debris, a number that will increase as smaller organisms are assessed. The number of fish, birds, and mammals that succumb each year to derelict fishing nets and lines in which they become entangled cannot be reliably known; but estimates are in the millions. We divide marine plastic debris into two categories: macro, >5 mm and micro, marine biota are being directly investigated, since it was found 20 years ago that the mass of ingested plastic in Great

  3. Synthetic Cathinones ("Bath Salts")

    Science.gov (United States)

    ... they are not increased sociability increased sex drive panic attacks excited delirium —extreme agitation and violent behavior What ... nosebleeds paranoia increased sociability increased sex drive hallucinations panic attacks Intoxication from synthetic cathinones has resulted in death. ...

  4. Long term chemo-hydro-mechanical behavior of compacted soil bentonite polymer complex submitted to synthetic leachate.

    Science.gov (United States)

    Razakamanantsoa, Andry Rico; Djeran-Maigre, Irini

    2016-07-01

    An experimental program is carried out to investigate the long term hydro-mechanical behavior correlated with chemical one of compacted soils with low concentration of Ca-bentonite and Ca-bentonite polymer mixture. The effect of prehydration on the hydraulic performance is compared to the polymer adding effect. All specimens are submitted to synthetic leachate (LS) under different permeation conditions. Several issues are studied: mechanical stability, hydraulic performance, chemical exchange of cations validated with microstructure observations. Scanning Electron Microscope (SEM) observations demonstrate two distinct behaviors: dispersive for Bentonite (B) and B with Polymer P1 (BP1) and flocculated for B with Polymer P2 (BP2). Direct shear tests show that bentonite adding increases the Soil (S) cohesion and decreases the friction angle. Polymer adding behaves similarly by maintaining the soil cohesion and increasing the friction angle. Hydraulic conductivity of prehydrated soil bentonite (SB) and direct permeation of polymer added soil bentonite are studied (SBP1 and SBP2). Hydraulic test duration are in range of 45days to 556days long. Prehydration allows to delay the aggressive effect of the LS in short term but seems to increase its negative effect on the hydraulic conductivity value in long term exposure. SB and SBP1 behave similarly and seem to act in the long term as a granular filler effect. SBP2 presents positive results comparing to the other mixtures: it maintains the hydraulic conductivity and the chemical resistance. Chemical analysis confirms that all specimens are subjected to Na(+) dissolution and Ca(2+) retention which are more pronounced for prehydrated specimen. The short term effect of prehydration and the positive effect of SBP2 are also confirmed. PMID:27156365

  5. Understanding the folding process of synthetic polymers by small-molecule folding agents

    Indian Academy of Sciences (India)

    S G Ramkumar; S Ramakrishnan

    2008-01-01

    Two acceptor containing polyimides PDI and NDI carrying pyromellitic diimide units and 1,4,5,8-naphthalene tetracarboxy diimide units, respectively, along with hexa(oxyethylene) (EO6) segments as linkers, were prepared from the corresponding dianhydrides and diamines. These polyimides were made to fold by interaction with specifically designed folding agents containing a dialkoxynaphthalene (DAN) donor linked to a carboxylic acid group. The alkali-metal counter-ion of the donor carboxylic acid upon complexation with the EO6 segment brings the DAN unit in the right location to induce a charge-transfer complex formation with acceptor units in the polymer backbone. This two-point interaction between the folding agent and the polymer backbone leads to a folding of the polymer chain, which was readily monitored by NMR titrations. The effect of various parameters, such as structures of the folding agent and polymer, and the solvent composition, on the folding propensities of the polymer was studied.

  6. Synthetic polymers in the marine environment: a rapidly increasing, long-term threat.

    Science.gov (United States)

    Moore, Charles James

    2008-10-01

    Synthetic polymers, commonly known as plastics, have been entering the marine environment in quantities paralleling their level of production over the last half century. However, in the last two decades of the 20th Century, the deposition rate accelerated past the rate of production, and plastics are now one of the most common and persistent pollutants in ocean waters and beaches worldwide. Thirty years ago the prevailing attitude of the plastic industry was that "plastic litter is a very small proportion of all litter and causes no harm to the environment except as an eyesore" [Derraik, J.G.B., 2002. The pollution of the marine environment by plastic debris: a review. Mar. Pollut. Bull. 44(9), 842-852]. Between 1960 and 2000, the world production of plastic resins increased 25-fold, while recovery of the material remained below 5%. Between 1970 and 2003, plastics became the fastest growing segment of the US municipal waste stream, increasing nine-fold, and marine litter is now 60-80% plastic, reaching 90-95% in some areas. While undoubtedly still an eyesore, plastic debris today is having significant harmful effects on marine biota. Albatross, fulmars, shearwaters and petrels mistake floating plastics for food, and many individuals of these species are affected; in fact, 44% of all seabird species are known to ingest plastic. Sea turtles ingest plastic bags, fishing line and other plastics, as do 26 species of cetaceans. In all, 267 species of marine organisms worldwide are known to have been affected by plastic debris, a number that will increase as smaller organisms are assessed. The number of fish, birds, and mammals that succumb each year to derelict fishing nets and lines in which they become entangled cannot be reliably known; but estimates are in the millions. We divide marine plastic debris into two categories: macro, >5 mm and micro, pollutants. The potential bioavailability of compounds added to plastics at the time of manufacture, as well as those

  7. Synthetic Polymer Hybridization with DNA and RNA Directs Nanoparticle Loading, Silencing Delivery, and Aptamer Function.

    Science.gov (United States)

    Zhou, Zhun; Xia, Xin; Bong, Dennis

    2015-07-22

    We report herein discrete triplex hybridization of DNA and RNA with polyacrylates. Length-monodisperse triazine-derivatized polymers were prepared on gram-scale by reversible addition-fragmentation chain-transfer polymerization. Despite stereoregio backbone heterogeneity, the triazine polymers bind T/U-rich DNA or RNA with nanomolar affinity upon mixing in a 1:1 ratio, as judged by thermal melts, circular dichroism, gel-shift assays, and fluorescence quenching. We call these polyacrylates "bifacial polymer nucleic acids" (bPoNAs). Nucleic acid hybridization with bPoNA enables DNA loading onto polymer nanoparticles, siRNA silencing delivery, and can further serve as an allosteric trigger of RNA aptamer function. Thus, bPoNAs can serve as tools for both non-covalent bioconjugation and structure-function nucleation. It is anticipated that bPoNAs will have utility in both bio- and nanotechnology. PMID:26138550

  8. Synthetic Enantiopure Carbohydrate Polymers that are Highly Soluble in Water and Noncytotoxic.

    Science.gov (United States)

    Dane, Eric L; Chin, Stacy L; Grinstaff, Mark W

    2013-10-15

    The first synthesis of poly-amido-saccharides (PASs) from a galactose(gal)-derived β-lactam sugar monomer is reported. The polymers are prepared using a controlled anionic ring-opening polymerization and characterized by NMR, optical rotation, IR, and GPC. Galactose-derived PASs display high solubility in aqueous solutions and are noncytotoxic to HepG2, CHO, and HeLa cell lines. To evaluate whether gal-derived PASs are recognized by the gal-specific lectin present on human hepatocytes, cellular uptake of rhodamine-labeled polymers is assessed using flow cytometry and fluorescence microscopy. Based on these results, the polymers are taken into cells via endocytosis that is not dependent on the gal-specific receptor on hepatocytes. Neutral, hydrophilic polymers, such as gal-derived PASs, are desirable materials for a range of biomedical applications, such as drug delivery, surface passivation, and hydrogel formation.

  9. Synthetic Polymer Hybridization with DNA and RNA Directs Nanoparticle Loading, Silencing Delivery, and Aptamer Function

    OpenAIRE

    Zhou, Zhun; Xia, Xin; Bong, Dennis

    2015-01-01

    We report herein discrete triplex hybridization of DNA and RNA with polyacrylates. Length-monodisperse triazine-derivatized polymers were prepared on gram-scale by reversible addition–fragmentation chain-transfer polymerization. Despite stereoregio backbone heterogeneity, the triazine polymers bind T/U-rich DNA or RNA with nanomolar affinity upon mixing in a 1:1 ratio, as judged by thermal melts, circular dichroism, gel-shift assays, and fluorescence quenching. We call these polyacrylates “bi...

  10. Molecularly imprinted polymers as synthetic mimics of bioreceptors. 1. General principles of molecular imprinting

    Directory of Open Access Journals (Sweden)

    Sergeyeva T. A.

    2009-08-01

    Full Text Available The review is devoted to analysis of the publications in the area of synthesis of artificial mimics of biological receptors using the method of molecular imprinting. General principles of molecular imprinting as well as main types of polymers being used in molecular imprinting are described. The special attention is paid to the polymers-biomimics synthesized using the method of non-covalent molecular imprinting.

  11. Role of various natural, synthetic and semi-synthetic polymers on drug release kinetics of losartan potassium oral controlled release tablets

    Science.gov (United States)

    Jayasree, J.; Sivaneswari, S.; Hemalatha, G.; Preethi, N.; Mounika, B.; Murthy, S. Vasudeva

    2014-01-01

    Objective: The objective of the present work was to formulate and to characterize controlled release matrix tablets of losartan potassium in order to improve bioavailability and to minimize the frequency of administration and increase the patient compliance. Materials and Methods: Losartan potassium controlled release matrix tablets were prepared by direct compression technique by the use of different natural, synthetic and semisynthetic polymers such as gum copal, gum acacia, hydroxypropyl methyl cellulose K100 (HPMC K100), eudragit RL 100 and carboxy methyl ethyl cellulose (CMEC) individually and also in combination. Studies were carried out to study the influence of type of polymer on drug release rate. All the formulations were subjected to physiochemical characterization such as weight variation, hardness, thickness, friability, drug content, and swelling index. In vitro dissolution studies were carried out simulated gastric fluid (pH 1.2) for first 2 h and followed by simulated intestinal fluid (pH 6.8) up to 24 h, and obtained dissolution data were fitted to in vitro release kinetic equations in order to know the order of kinetics and mechanism of drug release. Results and Discussion: Results of physiochemical characterization of losartan potassium matrix tablets were within acceptable limits. Formulation containing HPMC K100 and CMEC achieved the desired drug release profile up to 24 h followed zero order kinetics, release pattern dominated by Korsmeyer — Peppas model and mechanism of drug release by nonfickian diffusion. The good correlation obtained from Hixson-Crowell model indicates that changes in surface area of the tablet also influences the drug release. Conclusion: Based on the results, losartan potassium controlled release matrix tablets prepared by employing HPMC K100 and CMEC can attain the desired drug release up to 24 h, which results in maintaining steady state concentration and improving bioavailability. PMID:25426439

  12. Research on the structure in solution of optically active synthetic polymers (propylene polysulphide, propylene polyoxide, tertio-butyl polysulphide)

    International Nuclear Information System (INIS)

    It was proposed to study the structure of sulphur-containing synthetic polymers, stereo-regular, optically active in solution and able to adopt a spiral conformation, with special reference to propylene polysulphide. Two methods were used, the first mathematical (conformational energy calculations) and the second physico-chemical, essentially spectroscopic. By conformational analysis it is possible to choose the most probable structures liable to be adopted by a given polymer in solution while the spectro-polarimetric study should, in principle, invalidate or confirm certain of these hypotheses. The conformational energy calculations showed that in fact there is no energy conformation low enough to be stable in solution. Strictly speaking however we can refer to a region of stability in which steric hindrance is low and many energy minima exist. These minima are indistinguishable both by their energy values and by their spatial localizations and are all enclosed in the region bounded by the barriers due to steric hindrance. This uncertainty does not arise from approximations made in the calculations, but from the multitude of stereochemical structure possible. Investigations into the variation of the optical rotary dispersion and the circular dichroism as a function of temperature indicated the existence of three or more equilibrium states in the dioxane. The spectra appear to be the summation of the optical activities of the numerous simultaneously possible conformations. It appears that polymers, such as propylene polysulphide or propylene polyoxide do not have stable structures in solution. These are molecules of great flexibility possessing a large number of degrees of freedom. These properties distinguish them from the natural polymers, carrying precise information, such as DNA which must consequently have stable conformations. (author)

  13. Copyrolysis of wood biomass and synthetic polymers mixtures. Part 2. Characterisation of the liquid phases

    Energy Technology Data Exchange (ETDEWEB)

    Marin, N.; Collura, S.; Weber, J.V. [Laboratoire de Chimie et Applications, Universite de Metz, IUT, rue Victor Demange, 57500 Saint Avold (France); Sharypov, V.I.; Beregovtsova, N.G.; Baryshnikov, S.V.; Kutnetzov, B.N. [Institute of Chemistry and Chemical Technology SB RAS, Academgorodok, 660049 Krasnoyarsk (Russia); Cebolla, V. [Instituto de Carboquimica, CSIC, Zaragoza (Spain)

    2002-10-01

    The copyrolysis of wood biomass-polyolefins was carried out in a rotating autoclave. At 400C, more than 50% (in mass) of final products are found in the liquid phase for a 1:1 (in mass) mixture. The obtained liquids are separated in a distillable liquids fraction and in an extracted liquids fraction. The first fraction can be fully characterised by gas chromatography/mass spectrometry. Only olefins, paraffins and some aromatics (benzene, toluene and xylene), issued from the polymers, are found in this fraction. The origin of the polymer plays the most important role in the chemical composition of this fraction. Some interactions with the solid issued from thermal degradation of the biomass are evidenced, for example by the presence of 2-alkenes with 3n carbon atoms. In the heavy liquids fraction, more than 80% (in mass) of the products are heavy olefins or paraffins. Schematically, we can explain the results of the copyrolysis experiments by: the biomass, whatever its origin, leads to solid, water and gas; polymer leads to liquid and gaseous olefins and paraffins; at a temperature lower than 400C, the biomass reacts and during the pyrolysis at 400C the formed solid evolves to act as a radical donor; assisted by radicals from biomass, polymer chain scission leads to the production of the light liquids; if the presence of biomass has an influence on the chemical composition of final products (particularly the light liquids fraction) their origin has, in general, only a limited effect.

  14. Interrogation of Single Synthetic Polymer Chains and Polysaccharides by AFM-Based Force Spectroscopy

    NARCIS (Netherlands)

    Giannotti, Marina I.; Vancso, G. Julius

    2007-01-01

    This contribution reviews selected mechanical experiments on individual flexible macromolecules using single-molecule force spectroscopy (SMFS) based on atomic force microscopy. Focus is placed on the analysis of elasticity and conformational changes in single polymer chains upon variation of the ex

  15. Magnetic polymer beads: Recent trends and developments in synthetic design and applications

    KAUST Repository

    Philippova, Olga

    2011-04-01

    The paper describes the synthesis, properties and applications of magnetic polymer beads. State-of-the-art, future challenges, and promising trends in this field are analyzed. New applications in oil recovery are described. © 2010 Elsevier Ltd. All rights reserved.

  16. Panic Attack or Heart Attack?

    Science.gov (United States)

    Panic Attack or Heart Attack? Diagnosing heart disease in women A Healthy Hearts Guide ® Heart disease in women is often mistaken for panic attack with shortness of breath, anxiety, palpitations and indigestion. ...

  17. Studies in Finishing Effects of Clay Mineral in Polymers and Synthetic Fibers

    Directory of Open Access Journals (Sweden)

    Faheem Uddin

    2013-01-01

    Full Text Available The use of clay mineral in modifying the properties of polymeric material is improved in application. The current interest in modifying the polymeric materials, particularly polyethylene, polypropylene, polystyrene, and nylon using clay mineral for improved flame retardancy, thermal stability, peak heat release rate, fracture, and strength properties generated significant research literature. This paper aims to review some of the important recent modification achieved in the performance of polymeric materials using organoclay mineral. Degradation of clay mineral-polymer (nm composite is discussed with appropriate known examples. Clay mineral (nm loading of 5 wt.% to 7 wt.% that was significantly smaller than the percent loading of conventional fillers in polymeric materials introduced significant improvement in terms of thermal and physical stability. An attempt is made to emphasize flammability and thermal stability and to indicate the areas that are relatively little explored in modification of fiber-forming polymers to enhance further research interest.

  18. Co-pyrolysis of wood biomass and synthetic polymers mixtures. Part 3. Characterisation of heavy products

    Energy Technology Data Exchange (ETDEWEB)

    Sharypov, V.I.; Beregovtsova, N.G.; Kuznetsov, B.N. [Institute of Chemistry and Chemical Technology SB RAS, K. Marx str., 42, Krasnoyarsk 660049 (Russian Federation); Membrado, L.; Cebolla, V.L. [Instituto de Carboquimica, CSIC, Zaragoza (Spain); Marin, N.; Weber, J.V. [Laboratoire de Chimie et Applications, Universite de Metz, IUT, rue V. Demange, 57500 Saint-Avold (France)

    2003-05-01

    The chemical composition of heavy liquids (b.p.>180C) obtained by co-pyrolysis of polyolefins/wood biomass mixtures in autoclave conditions under inert atmosphere was investigated by FTIR, {sup 1}H NMR, GC-MS, high performance TLC combined with densitometry techniques. The preliminary separation of heavy liquids into different fractions by open LC and TLC methods had been used. Some perspectives of polymer and biomass thermal conversion during co-pyrolysis process were discussed.

  19. DNA Separation by Capillary Electrophoresis with Ultraviolet Detection using Mixed Synthetic Polymers

    Institute of Scientific and Technical Information of China (English)

    Qian WANG; Xu XU

    2003-01-01

    The mixtures of two polymers, poly (N,N-dimethylacrylamide) (PDMA) and polyvinylpyrrolidone (PVP) were synthesized and used as the separation medium for double-stranded and single-stranded DNA fragments by capillary electrophoresis with UV detector. On optimal conditions, 2%w/v PDMA ( 2%w/v PVP can be used to separate the doublet 123/124bp in pBR322/Hae III Markers.

  20. Thermally controlled permeation of ionic molecules through synthetic nanopores functionalized with amine-terminated polymer brushes

    Science.gov (United States)

    Nasir, Saima; Ali, Mubarak; Ensinger, Wolfgang

    2012-06-01

    We present temperature-dependent ionic transport through an array of nanopores (cylindrical and conical) and a single conical nanopore functionalized with amine-terminated poly(N-isopropylacrylamide) [PNIPAAM-NH2] brushes. For this purpose, nanopores are fabricated in heavy ion irradiated polyethylene terephthlate (PET) membranes by a controlled chemical track-etching technique, which leads to the generation of carboxyl (COOH) groups on the pore surface. End-functionalized polymer chains are immobilized onto the inner pore walls via a ‘grafting-to’ approach through the covalent linkage of surface COOH moieties with the terminal amine groups of the PNIPAAM molecules by using carbodiimide coupling chemistry. The success of the chemical modification reaction is corroborated by measuring the permeation flux of charged analytes across the multipore membranes in an aqueous solution, and for the case of single conical pore by measuring the current-voltage (I-V) characteristics, which are dictated by the electrostatic interaction of the charged pore surface with the mobile ions in an electrolyte solution. The effective nanopore diameter is tuned by manipulating the environmental temperature due to the swelling/shrinking behaviour of polymer brushes attached to the inner nanopore walls, leading to a decrease/increase in the ionic transport across the membrane. This process should permit the thermal gating and controlled release of ionic drug molecules through the nanopores modified with thermoresponsive polymer chains across the membrane.

  1. Thermally controlled permeation of ionic molecules through synthetic nanopores functionalized with amine-terminated polymer brushes

    International Nuclear Information System (INIS)

    We present temperature-dependent ionic transport through an array of nanopores (cylindrical and conical) and a single conical nanopore functionalized with amine-terminated poly(N-isopropylacrylamide) [PNIPAAM-NH2] brushes. For this purpose, nanopores are fabricated in heavy ion irradiated polyethylene terephthlate (PET) membranes by a controlled chemical track-etching technique, which leads to the generation of carboxyl (COOH) groups on the pore surface. End-functionalized polymer chains are immobilized onto the inner pore walls via a ‘grafting-to’ approach through the covalent linkage of surface COOH moieties with the terminal amine groups of the PNIPAAM molecules by using carbodiimide coupling chemistry. The success of the chemical modification reaction is corroborated by measuring the permeation flux of charged analytes across the multipore membranes in an aqueous solution, and for the case of single conical pore by measuring the current–voltage (I–V) characteristics, which are dictated by the electrostatic interaction of the charged pore surface with the mobile ions in an electrolyte solution. The effective nanopore diameter is tuned by manipulating the environmental temperature due to the swelling/shrinking behaviour of polymer brushes attached to the inner nanopore walls, leading to a decrease/increase in the ionic transport across the membrane. This process should permit the thermal gating and controlled release of ionic drug molecules through the nanopores modified with thermoresponsive polymer chains across the membrane. (paper)

  2. Development of partially biodegradable foams from PP/HMSPP blends with natural and synthetic polymers

    International Nuclear Information System (INIS)

    Polymers are used in various application and in different industrial areas providing enormous quantities of wastes in environment. Among diverse components of residues in landfills are polymeric materials, including Polypropylene, which contribute with 20 to 30% of total volume of solid residues. As polymeric materials are immune to microbial degradation, they remain in soil and in landfills as a semi-permanent residue. Environmental concerning in litter reduction is being directed to renewable polymers development for manufacturing of polymeric foams. Foamed polymers are considered future materials, with a wide range of applications; high density structural foams are specially used in civil construction, in replacement of metal, woods and concrete with a final purpose of reducing materials costs. At present development, it was possible the incorporation of PP/HMSPP polymeric matrix blends with sugarcane bagasse, PHB and PLA, in structural foams production. Thermal degradation at 100, 120 and 160 deg C temperatures was not enough to induce biodegradability. Gamma irradiation degradation, at 50, 100, 200 and 500 kGy showed effective for biodegradability induction. Irradiated bagasse blends suffered surface erosion, in favor of water uptake and consequently, a higher biodegradation in bulk structure. (author)

  3. Porous organic polymers with anchored aldehydes: A new platform for post-synthetic amine functionalization en route for enhanced CO2 adsorption properties

    KAUST Repository

    Guillerm, Vincent

    2014-01-01

    A novel porous organic polymer has been synthesized using the molecular building block approach to deliberately encompass aldehyde functionalities amenable to post functionalization. The resultant porous framework allows a facile, one-step quantitative and post-synthetic functionalization by amines, permitting enhanced CO2 sorption properties. © 2014 The Royal Society of Chemistry.

  4. Poly (ether ether ketone) derivatives: Synthetic route and characterization of nitrated and sulfonated polymers

    Energy Technology Data Exchange (ETDEWEB)

    Conceicao, T.F.; Bertolino, J.R. [Grupo de Estudo em Materiais Polimericos-Departamento de Quimica, Universidade Federal de Santa Catarina, Florianopolis, SC (Brazil); Barra, G.M.O. [Departamento de Engenharia Mecanica, Universidade Federal de Santa Catarina, Florianopolis, SC (Brazil); Pires, A.T.N. [Grupo de Estudo em Materiais Polimericos-Departamento de Quimica, Universidade Federal de Santa Catarina, Florianopolis, SC (Brazil)], E-mail: alfredotiburcio@pq.cnpq.br

    2009-03-01

    Nitrated and sulfonated poly (ether ether ketone) [SNPEEK] samples were prepared through sulfonation of nitrated PEEK (NPEEK) at different temperatures resulting in polymers with distinct sulfonation degrees (SD). The sulfonation occurred preferentially in the hydroquinone segment even after 81% of this moiety had been nitrated. Sulfonation in the benzophenone moiety was achieved only in 16% of this segment at the reaction temperature of 80 deg. C. The substitution degree was obtained through the TG curves, and values were in agreement with {sup 1}H NMR data when SD is much higher as ND (nitration degree). The highest SD obtained was 72%. Membranes of the sulfonated and nitrated PEEK (SNPEEK) were prepared by casting and showed good ductility depending on the substitution degree, with proton conductivity in the order of 10{sup -2} S cm{sup -1}, an important characteristic in some applications, such as in fuel cells.

  5. Synthetic Methodology for the Fabrication of Porous Porphyrin Materials with Metal-Organic-Polymer Aerogels.

    Science.gov (United States)

    Zhao, Xin; Yuan, Lin; Zhang, Zeng-Qi; Wang, Yong-Song; Yu, Qiong; Li, Jun

    2016-06-01

    A promising fabrication strategy used for designing porous porphyrin materials and a group of rigid carboxyl porphyrins based metal-organic-polymer aerogels (MOPAs) has been proposed recently. These newly synthesized MOPAs were exemplarily characterized by FT-IR, UV-vis-DRS, EDS, PXRD, TGA, SEM, TEM, and gas sorption measurements. A gelation study has shown that solvents, molar ratio, temperature, and peripheral carboxyl number in porphyrins all affect gel generation. The MOPA series exhibit eminent thermal stability, high removal efficiency in dye adsorption, versatile morphologies, and permanent tunable porosity; also the BET surface areas fall within the range 249-779 m(2) g(-1). All of the mentioned properties are significantly superior to some other porous materials, which enable these compounds to be potential candidates for dye uptake, gas storage, and separation. PMID:27159626

  6. Synthetic approaches towards new polymer systems by the combination of living carbocationic and anionic polymerizations

    DEFF Research Database (Denmark)

    Feldthusen, Jesper; Ivan, Bela; Muller, Axel. H.E.;

    1996-01-01

    Recent efforts to obtain block copolymers by combination of living carbocationic and anionic polymerizations are presented.When tolyl-ended polyisobutylene was used as macroinitiator of anionic polymerization of methacrylate derivatives mixtures of homopolymers and block copolymers were formed due...... to incomplete lithiation of this chain end.In another approach a new functionalization method was developed by end-quenching living polyisobutylene with 1,1-diphenylethylene. After transformation of the groups into 2,2-diphenylvinyl end groups and lithiation polymers were synthesized from protected acrylate...... monomers. After partial deprotection a network could be formed by reaction with diisocyanate. Complete deprotection yielded a new amphiphilic network containing polyisobutylene and poly(2-hydroxyethyl) methacrylate segments crosslinked by urethane linkages....

  7. Contributions to MALDI TOF- and ESI ion trap mass spectrometry of biopolymers, synthetic polymers and highly polar analytes

    International Nuclear Information System (INIS)

    The present thesis focuses on the so-called 'soft' desorption/ionization techniques matrix assisted laser desorption/ionization (MALDI) and atmospheric pressure ionization (API) mass spectrometry. This thesis contains five publications that describe methods and techniques which have been developed and evaluated for the characterization of (glyco)proteins, carbohydrates, technical polymers, calixarenes and fluorescence labeled peptides. The first paper presents and evaluates several simple methods for cleaning and desalting proteins and glycoproteins prior to MALDI TOF MS, which are especially well suited for small sample amounts. Advantages and disadvantages of these methods, with respect to sample volume, sample amount, time consumption, concentration and losses are discussed. The second paper shows the utility of MALDI MS for the analysis of modified cyclodextrines. These cyclic carbohydrates are used as chiral selectors in enantiomeric separations. It is shown that material purchased from different manufacturers is not identical and exhibits considerable heterogeneity. The third paper describes a new matrix, 4-hydroxy benzylidene malonnitrile, for MALDI MS analysis of industrially relevant synthetic polymers such as polyethyleneglycole, polystyrole, polymethyl methacrylate and especially for polyacryle nitride, which has so far never been investigated by MALDI MS. The advantage of delayed ion extraction in MALDI MS is also demonstrated. In the fourth contribution calixarenes, small cup-shaped molecules, are investigated. These polyphenolic compounds behave similar to carbohydrates in MALDI MS analysis. In the positive ion mode caution adducts can be detected, whereas in the negative ion mode deprotonated molecules dominate the mass spectra. By fragment ion analysis the identity of substituents can be verified. In the last paper the fragment ions of fluorescence labeled peptides, derived from either MALDI PSD MS or ESI IT MS, are compared. Fluorescence labeling

  8. Design and Development of Transdermal Therapeutic system of Carvedilol using Combination of Natural and Synthetic Polymers

    Directory of Open Access Journals (Sweden)

    Patel DB

    2012-04-01

    Full Text Available The present study was mainly focused on investigating the influence of concentration and combinationof HPMC K4M, Carbopol 934P and Chitosan on physical characterization and drug release behavior ofcarvedilol transdermal films prepared by the solvent evaporation technique. The physicochemicalcompatibility of the drug and the polymers was studied by differential scanning calorimetry and infraredspectroscopy. The results suggested no physicochemical incompatibility between the drug and thepolymers. The prepared films were evaluated for physicochemical characteristics like weight variation,thickness, folding endurance, tensile strength, percentage moisture uptake, water vapor transmissionrate, percentage flatness and in vitro permeation study. In vitro permeation studies were performed byusing Franz diffusion cells. The drug release profiles of selected formulations were subjected to kinetictreatment using zero order, first order, Higuchi and korsmeyer’s peppas kinetic models. The resultsfollowed Higuchi kinetics (r2=0.951−0.995 and the mechanism of release was diffusion mediated.Based on physicochemical and in vitro permeation studies, transdermal film prepared by combination ofHPMC K4M and Chitosan with ratio 3:1 selected as optimized formulation shows the drug release morethan 24 hours with good flexibility and stability at 250C. The developed transdermal film increases theefficacy of carvedilol for the treatment of hypertension.

  9. Biopolymeric Mucin and Synthetic Polymer Analogs: Their Structure, Function and Role in Biomedical Applications

    Directory of Open Access Journals (Sweden)

    Sundar P. Authimoolam

    2016-03-01

    Full Text Available Mucin networks are viscoelastic fibrillar aggregates formed through the complex self-association of biopolymeric glycoprotein chains. The networks form a lubricious, hydrated protective shield along epithelial regions within the human body. The critical role played by mucin networks in impacting the transport properties of biofunctional molecules (e.g., biogenic molecules, probes, nanoparticles, and its effect on bioavailability are well described in the literature. An alternate perspective is provided in this paper, presenting mucin’s complex network structure, and its interdependent functional characteristics in human physiology. We highlight the recent advances that were achieved through the use of mucin in diverse areas of bioengineering applications (e.g., drug delivery, biomedical devices and tissue engineering. Mucin network formation is a highly complex process, driven by wide variety of molecular interactions, and the network possess structural and chemical variations, posing a great challenge to understand mucin’s bulk behavior. Through this review, the prospective potential of polymer based analogs to serve as mucin mimic is suggested. These analog systems, apart from functioning as an artificial model, reducing the current dependency on animal models, can aid in furthering our fundamental understanding of such complex structures.

  10. Improving the drug delivery characteristics of graphene oxide based polymer nanocomposites through the "one-pot" synthetic approach of single-electron-transfer living radical polymerization

    Science.gov (United States)

    Gao, Peng; Liu, Meiying; Tian, Jianwen; Deng, Fengjie; Wang, Ke; Xu, Dazhuang; Liu, Liangji; Zhang, Xiaoyong; Wei, Yen

    2016-08-01

    Graphene oxide (GO) based polymer nanocomposites have attracted extensive research interest recently for their outstanding physicochemical properties and potential applications. However, surface modification of GO with synthetic polymers has demonstrated to be trouble for most polymerization procedures are occurred under non-aqueous solution, which will in turn lead to the restacking of GO. In this work, a facile and efficient "one-pot" strategy has been developed for surface modification of GO with synthetic polymers through single-electron-transfer living radical polymerization (SET-LRP). The GO based polymer nanocomposites were obtained via SET-LRP in aqueous solution using poly(ethylene glycol) methyl ether methacrylate (PEGMA) as the monomer and 11-bromoundecanoic acid as the initiator, which could be effectively adsorbed on GO through hydrophobic interaction. The successful preparation of GO based polymer nanocomposites was confirmed by a series of characterization techniques such as 1H nuclear magnetic resonance, Fourier transform infrared spectroscopy, thermogravimetric analysis, transmission electron microscopy and X-ray photoelectron spectroscopy. The resultant products exhibit high water disperisibility, excellent biocompatibility and high efficient drug loading capability, making these PEGylated GO nanocomposites promising candidates for biomedical applications.

  11. Space science applications for conducting polymer particles: synthetic mimics for cosmic dust and micrometeorites.

    Science.gov (United States)

    Fielding, Lee A; Hillier, Jon K; Burchell, Mark J; Armes, Steven P

    2015-12-11

    Over the last decade or so, a range of polypyrrole-based particles have been designed and evaluated for space science applications. This electrically conductive polymer enables such particles to efficiently acquire surface charge, which in turn allows their acceleration up to the hypervelocity regime (>1 km s(-1)) using a Van de Graaff accelerator. Either organic latex (e.g. polystyrene or poly(methyl methacrylate)) or various inorganic materials (such as silica, olivine or pyrrhotite) can be coated with polypyrrole; these core-shell particles are useful mimics for understanding the hypervelocity impact ionisation behaviour of micro-meteorites (a.k.a. cosmic dust). Impacts on metal targets at relatively low hypervelocities (10 km s(-1)) generate predominately atomic species, since many more chemical bonds are cleaved if the particles impinge with higher kinetic energy. Such fundamental studies are relevant to the calibration of the cosmic dust analyser (CDA) onboard the Cassini spacecraft, which was designed to determine the chemical composition of Saturn's dust rings. Inspired by volcanism observed for one of the Jupiter's moons (Io), polypyrrole-coated sulfur-rich latexes have also been designed to help space scientists understand ionisation spectra originating from sulfur-rich dust particles. Finally, relatively large (20 μm diameter) polypyrrole-coated polystyrene latexes have proven to be useful for understanding the extent of thermal ablation of organic projectiles when fired at ultralow density aerogel targets at up to 6.1 km s(-1) using a Light Gas Gun. In this case, the sacrificial polypyrrole overlayer simply provides a sensitive spectroscopic signature (rather than a conductive overlayer), and the scientific findings have important implications for the detection of organic dust grains during the Stardust space mission.

  12. Space science applications for conducting polymer particles: synthetic mimics for cosmic dust and micrometeorites.

    Science.gov (United States)

    Fielding, Lee A; Hillier, Jon K; Burchell, Mark J; Armes, Steven P

    2015-12-11

    Over the last decade or so, a range of polypyrrole-based particles have been designed and evaluated for space science applications. This electrically conductive polymer enables such particles to efficiently acquire surface charge, which in turn allows their acceleration up to the hypervelocity regime (>1 km s(-1)) using a Van de Graaff accelerator. Either organic latex (e.g. polystyrene or poly(methyl methacrylate)) or various inorganic materials (such as silica, olivine or pyrrhotite) can be coated with polypyrrole; these core-shell particles are useful mimics for understanding the hypervelocity impact ionisation behaviour of micro-meteorites (a.k.a. cosmic dust). Impacts on metal targets at relatively low hypervelocities (10 km s(-1)) generate predominately atomic species, since many more chemical bonds are cleaved if the particles impinge with higher kinetic energy. Such fundamental studies are relevant to the calibration of the cosmic dust analyser (CDA) onboard the Cassini spacecraft, which was designed to determine the chemical composition of Saturn's dust rings. Inspired by volcanism observed for one of the Jupiter's moons (Io), polypyrrole-coated sulfur-rich latexes have also been designed to help space scientists understand ionisation spectra originating from sulfur-rich dust particles. Finally, relatively large (20 μm diameter) polypyrrole-coated polystyrene latexes have proven to be useful for understanding the extent of thermal ablation of organic projectiles when fired at ultralow density aerogel targets at up to 6.1 km s(-1) using a Light Gas Gun. In this case, the sacrificial polypyrrole overlayer simply provides a sensitive spectroscopic signature (rather than a conductive overlayer), and the scientific findings have important implications for the detection of organic dust grains during the Stardust space mission. PMID:26458233

  13. Research Progress of Electrospun Biodegradable Synthetic Polymer Fibers%可降解合成高分子静电纺纤维的研究进展

    Institute of Scientific and Technical Information of China (English)

    江乙逵; 赖明河; 陈向标; 陈海宏

    2012-01-01

    The principle of electrospinning and the research progress of biodegradable synthetic polymer nanofibers prepared by electrospinning were introduced. The research progress of several major electrospun biodegradable synthetic polymer fibers such as poly-carboxylic acid, polylactic acid, polycaprolactone and their copolymers, etc was mainly described. The important application in biomedical field was pointedout.%介绍了静电纺丝的原理及利用静电纺丝方法制备生物可降解合成高分子纳米纤维的最新研究进展,主要讲述聚羧基乙酸、聚乳酸、聚己内酯及其共聚物等几种主要的生物可降解合成高分子电纺纤维的研究进展,并指出它们在生物医学领域的重要应用.

  14. Biodegradable Polymers

    Directory of Open Access Journals (Sweden)

    Isabelle Vroman

    2009-04-01

    Full Text Available Biodegradable materials are used in packaging, agriculture, medicine and other areas. In recent years there has been an increase in interest in biodegradable polymers. Two classes of biodegradable polymers can be distinguished: synthetic or natural polymers. There are polymers produced from feedstocks derived either from petroleum resources (non renewable resources or from biological resources (renewable resources. In general natural polymers offer fewer advantages than synthetic polymers. The following review presents an overview of the different biodegradable polymers that are currently being used and their properties, as well as new developments in their synthesis and applications.

  15. 人工合成高分子支架材料治疗脊髓损伤★%Synthetic polymer scaffolds for spinal cord injury

    Institute of Scientific and Technical Information of China (English)

    阚瑞; 盛伟斌

    2013-01-01

    BACKGROUND: Synthetic polymer scaffolds for treatment of spinal cord injury are currently a focus of research. OBJECTIVE: To summarize domestic and foreign researches on synthetic polymer scaffolds for the treatment of spinal cord injury. METHODS: Articles on synthetic polymer scaffolds for treatment of spinal cord injury were searched on WanfangMed, CNKI, PubMed and EBSCO databases from 2000-01 to 2012-01, using “spinal cord injury, tissue engineering, synthetic polymer material” appearing in title/abstract as key words. RESULTS AND CONCLUSION: Many kinds of synthetic polymer materials are developed for the treatment of spinal cord injury, including polylactic acid, polyglycolic acid, poly-β hydroxybutyric acid, synthetic hydrogel, and polyethylene glycol. Each material has its pros and cons, but none has complete tissue compatibility and biodegradability. These materials cannot completely mimic the three-dimensional porous structure of the spinal cord. After implantation, the materials are located freely to the spinal cord, which cannot be anatomized with the gray and white matters of the spinal cord, and fatherly cannot correspond to the main fibers in the white matter. Therefore, these materials have not been implemented in clinical trial. Further study on synthetic polymer scaffolds for the treatment of spinal cord injury is required.%  背景:治疗脊髓损伤的人工合成高分子支架材料是目前的研究热点之一。目的:综述国内外人工合成高分子支架材料在治疗脊髓损伤方面的研究进展。方法:应用计算机检索万方医学、中国知网、PubMed、EBSCO 数据库中2000年1月至2012年1月关于人工合成高分子支架材料治疗脊髓损伤方面的文章,在标题和摘要中以“脊髓损伤,组织工程,人工合成高分子材料”或“spinal cord injury,tissue engineering,synthetic polymer material”为检索词进行检索。结果与结论:治疗脊髓损伤的人工合

  16. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  17. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  18. Co-pyrolysis of wood biomass and synthetic polymer mixtures. Part 1. Influence of experimental conditions on the evolution of solids, liquids and gases

    Energy Technology Data Exchange (ETDEWEB)

    Sharypov, V.I.; Beregovtsova, N.G.; Baryshnikov, S.V.; Kuznetsov, B.N. [Institute of Chemistry and Chemical Technology SB RAS, 42 Karl Marx Street, Academgorodok, 660049 Krasnoyarsk (Russian Federation); Marin, N.; Weber, J.V. [Laboratoire de Chimie et Applications, Universite de Metz, IUT, Rue V. Demange, 57500 Saint-Avold (France); Cebolla, V.L. [Instituto de Carboquimica, CSIC, Zaragoza (Spain)

    2002-07-01

    The thermal behaviour of wood biomass and synthetic polymer mixtures was studied in a rotating autoclave. Beech wood, pine wood, cellulose, hydrolytic lignin, medium density polyethylene, isotactic and atactic polypropylene were selected as starting materials. The effects of reaction conditions, biomass and polymers' origins on the degree of mixture conversion as well as on the yields of liquid and gaseous products were established and discussed. A preliminary thermogravimetric investigation has shown that biomass is thermally degraded at a lower temperature than the studied polyolefins. As described in the literature, independent thermal behaviors were, in all cases, observed for each component of biomass/plastic mixtures (1:1 weight ratio). Co-pyrolysis of the different types of natural and synthetic polymer mixtures in an inert atmosphere has led to high yield of light distillate fraction and benzene soluble products. The optimum temperature for biomass/plastic mixture conversion which corresponds to the maximum yield of light liquids was 400C. The origins of both biomass and plastic had significant influences on the co-pyrolysis products' distribution. In some cases non-additive effects were observed. This effect, generally, took place at biomass/plastic ratio lower then 1 (weight ratio) and resulted in high yields of distillate liquid fraction.

  19. Molecularly imprinted polymers with synthetic dummy templates for the preparation of capsaicin and dihydrocapsaicin from chili peppers.

    Science.gov (United States)

    Ma, Xiuli; Ji, Wenhua; Chen, Lingxiao; Wang, Xiao; Liu, Jianhua; Wang, Xueyong

    2015-01-01

    In this work, dummy molecularly imprinted polymers with high selectivity and affinity to capsaicin and dihydrocapsaicin are designed using N-vanillylnonanamide as a dummy template. The performance of dummy molecularly imprinted polymers and nonimprinted polymers was evaluated using adsorption isotherms, adsorption kinetics, and selective recognition capacity. Dummy molecularly imprinted polymers were found to exhibit good site accessibility, taking just 20 min to achieve adsorption equilibrium; they were also highly selective toward capsaicin and dihydrocapsaicin. We successfully used dummy molecularly imprinted polymers as a specific sorbent for selectively enriching capsaicin and dihydrocapsaicin from chili pepper samples. In a scaled-up experiment, the selective recovery of capsaicinoids was calculated to be 77.8% using solid-phase extraction. To the best of our knowledge, this is the first example of the use of N-vanillylnonanamide as a dummy template in molecularly imprinted polymers to simultaneously enrich capsaicin and dihydrocapsaicin. PMID:25348490

  20. Heart Attack

    Science.gov (United States)

    ... having another heart attack. These medicines include: aspirin, beta blockers, statins, ACE inhibitors and fish oil. Your doctor ... have had a stent placed in your heart. Beta blockers are a group of drugs that lower the ...

  1. Panic Attack

    OpenAIRE

    Scantamburlo, Gabrielle; Ansseau, Marc

    2004-01-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. Peer reviewed

  2. [Panic attack].

    Science.gov (United States)

    Scantamburlo, G; Ansseau, M

    2004-05-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. PMID:15264579

  3. Evaluation of synthetic water-soluble metal-binding polymers with ultrafiltration for selective concentration of americium and plutonium

    International Nuclear Information System (INIS)

    Water-soluble metal-binding polymers in combination with ultrafiltration are shown to be an effective method for selectively removing dilute actinide ions from acidic solutions of high ionic strength. The actinide-binding properties of commercially available water-soluble polymers and several polymers which have been reported in the literature were evaluated. The functional groups incorporated in the polymers were pyrrolidone, amine, oxime, and carboxylic, phosphonic, or sulfonic acid. The polymer containing phosphonic acid groups gave the best results with high distribution coefficients and concentration factors for 241Am(III) and 238Pu(III)/(IV) at pH 4 to 6 and ionic strengths of 0.1 to 4. (author)

  4. Synthetic staggered architecture composites

    International Nuclear Information System (INIS)

    Highlights: ► Composite design inspired by nature. ► Tuning microstructure via changing ceramic content and aspect ratio. ► Experimental display of structure–property correlationship in synthetic composites. - Abstract: Structural biocomposites (for example, nacre in seashells, bone, etc.) are designed according to the functional role they are delegated for. For instance, bone is primarily designed for withstanding time-dependent loading (for example, withstanding stresses while running, jumping, accidental fall) and hence the microstructure is designed primarily from enhanced toughness and moderate stiffness point of view. On the contrary, seashells (which lie in the abyss of oceans) apart from providing defense to the organism (it is hosting) against predatory attacks, are subjected to static loading (for example, enormous hydrostatic pressure). Hence, emphasis on the shell structure evolution is directed primarily towards providing enhanced stiffness. In order to conform between stiffness and toughness, nature precisely employs a staggered arrangement of inorganic bricks in a biopolymer matrix (at its most elementary level of architecture). Aspect ratio and content of ceramic bricks are meticulously used by nature to synthesize composites having varying degrees of stiffness, strength and toughness. Such an amazing capability of structure–property correlationship has rarely been demonstrated in synthetic composites. Therefore, in order to better understand the mechanical behavior of synthetic staggered composites, the problem becomes two-pronged: (a) synthesize composites with varying brick size and contents and (b) experimental investigation of the material response. In this article, an attempt has been made to synthesize and characterize staggered ceramic–polymer composites having varying aspect ratio and ceramic content using freeze-casting technique. This will in-turn help us in custom-design manufacture of hybrid bio-inspired composite materials

  5. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  6. Direct observation of the ultrafast electron transfer process in a polymer/fullerene blend. : Section Title: Physical Properties of Synthetic High Polymers

    NARCIS (Netherlands)

    Brabec, Ch J.; Zerza, G.; Sariciftci, N. S.; Cerullo, G.; Lanzani, G.; De Silvestri, S.; Hummelen, J. C.

    2001-01-01

    Optical studies on conjugated polymer-fullerene blends are performed with sub-10-fs temporal resoln. The photoinduced electron transfer process is directly monitored in the time domain, obtaining a forward electron transfer time const. of 45 fs. [on SciFinder(R)

  7. Evaluation of synthetic water-soluble metal-binding polymers with ultrafiltration for selective concentration of americium and plutonium

    International Nuclear Information System (INIS)

    Routine counting methods and ICP-MS are unable to directly measure the new US Department of Energy (DOE) regulatory level for discharge waters containing alpha-emitting radionuclides of 30 pCi/L total alpha or the 0.05 pCi/L regulatory level for Pu or Am activity required for surface waters at the Rocky Flats site by the State of Colorado. This inability indicates the need to develop rapid, reliable, and robust analytical techniques for measuring actinide metal ions, particularly americium and plutonium. Selective separation or preconcentration techniques would aid in this effort. Water-soluble metal-binding polymers in combination with ultrafiltration are shown to be an effective method for selectively removing dilute actinide ions from acidic solutions of high ionic strength. The actinide-binding properties of commercially available water-soluble polymers and several polymers which have been reported in the literature were evaluated. The functional groups incorporated in the polymers were pyrrolidone, amine, oxime, and carboxylic, phosphonic, or sulfonic acid. The polymer containing phosphonic acid groups gave the best results with high distribution coefficients and concentration factors for 241Am(III) and 238Pu(III)/(IV) at pH 4 to 6 and ionic strengths of 0.1 to 4

  8. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  9. Mars attacks.

    Science.gov (United States)

    Cohain, Judy Slome

    2008-01-01

    "Mars Attacks" is a new term coined to describe unjustified violation of women by care providers at the time of birth, as well as the purposeful abandonment of the peer review system by major obstetric journals and the abandonment of the use of research evidence by ACOG in their latest protocols, in order to justify continued use of this form of violence against women. PMID:19244777

  10. Osteogenic induction of human bone marrow-derived mesenchymal progenitor cells in novel synthetic polymer-hydrogel matrices

    OpenAIRE

    Endres, M; Hutmacher, D.W.; Salgado, A. J.; Kaps, C; RINGE, J; Reis, R. L.; Sittinger, M; Brandwood, A.; Schantz, J. T.

    2003-01-01

    The aim of this project was to investigate the in vitro osteogenic potential of human mesenchymal progenitor cells in novel matrix architectures built by means of a three-dimensional bioresorbable synthetic framework in combination with a hydrogel. Human mesenchymal progenitor cells (hMPCs) were isolated from a human bone marrow aspirate by gradient centrifugation. Before in vitro engineering of scaffold-hMPC constructs, the adipogenic and osteogenic differentiation potential was demonstrated...

  11. Grafting of synthetic polyelectrolyte onto polymer surfaces--comparison of glow discharge and 60Co-gamma-irradiation method

    International Nuclear Information System (INIS)

    Water soluble polyelectrolyte synthesized from natural rubber contains sulfamate and carboxylate groups similar to that of heparin. It is observed that synthetic heparinoid polyelectrolyte is capable of inhibiting blood coagulation. In the present study, we attempted to graft the same onto polystyrene and polymethylmethacrylate surfaces using glow discharge technique and 60Co-gamma-irradiation method, and the surfaces were compared with respect to water contact angle and platelet adhesion parameters. Heparinized surfaces are also evaluated for relative comparison

  12. Synthetic approaches to parabens molecularly imprinted polymers and their applications to the solid-phase extraction of river water samples.

    Science.gov (United States)

    Beltran, A; Marcé, R M; Cormack, P A G; Borrull, F

    2010-09-10

    In this paper we describe the synthesis, characterisation and use of two distinct molecularly imprinted polymers (MIPs) prepared using esters of p-hydroxybenzoic acid (parabens) as templates: one MIP was synthesised by precipitation polymerisation using a semi-covalent molecularly imprinting strategy with methyl paraben as the template/target (MIP 1); the second MIP was prepared in monolithic form through a conventional non-covalent molecular imprinting strategy, with butyl paraben as the template (MIP 2). MIP 1 recognized methyl paraben, showed cross-selectivity for other parabens analytes used in the study and higher affinity towards these compounds than did a non-imprinted control polymer. Similarly, MIP 2 demonstrated higher affinity towards paraben analytes than a non-imprinted control polymer. For the analysis of environmental water samples, a solid-phase extraction (SPE) protocol was developed using MIP 2 as sorbent, and results were compared to a SPE using a commercial sorbent (Oasis HLB). With MIP 2 as sorbent and butyl paraben as target, when percolating 500 mL of river water spiked at 1 μg L(-1) through the SPE cartridge, and using 1 mL of isopropanol as cleaning solvent, a higher recovery of butyl 4-hydroxybenzoate (butyl paraben) and a cleaner chromatogram where achievable when using the MIP compared to the commercial sorbent.

  13. In-Line Desalting of Proteins from Buffer and Synthetic Urine Solution Prior to ESI-MS Analysis via a Capillary-Channeled Polymer Fiber Microcolumn

    Science.gov (United States)

    Burdette, Carolyn Q.; Marcus, R. Kenneth

    2013-06-01

    Presented here is a novel in-line solid phase extraction (SPE) method utilizing a capillary-channeled polymer (C-CP) fiber microcolumn prior to introduction to an electrospray ionization (ESI) source. The high permeability of the microcolumn allows for operation under syringe pump or HPLC driven flow, ultimately providing greater mass spectral clarity and accurate molecular weight determinations for different protein/buffer combinations. Studies presented here focus on the desalting of several target proteins from a standard phosphate buffered saline (PBS) matrix and a synthetic urine solution prior to ESI-MS determinations. In every case, responses for μM-level proteins in PBS improve from the situation of not permitting molecular weight determinations to values that are precise to better than ±10 Da, without internal standards, with relative improvements in the signal-to-background ratios (S/B) on the order of 3,000×. De-salting of a myoglobin-spiked (12 μM) synthetic urine results in equally-improved spectral quality.

  14. Heart Attack Risk Assessment

    Science.gov (United States)

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  15. Edible Polymers: Challenges and Opportunities

    OpenAIRE

    Subhas C. Shit; Shah, Pathik M.

    2014-01-01

    Edible polymers have established substantial deliberation in modern eons because of their benefits comprising use as edible materials over synthetic polymers. This could contribute to the reduction of environmental contamination. Edible polymers can practically diminish the complexity and thus improve the recyclability of materials, compared to the more traditional non-environmentally friendly materials and may be able to substitute such synthetic polymers. A synthetic hydrogel polymer unlock...

  16. Comparison of the in Vitro Uptake and Toxicity of Collagen- and Synthetic Polymer-Coated Gold Nanoparticles

    Directory of Open Access Journals (Sweden)

    Oana T. Marisca

    2015-08-01

    Full Text Available We studied the physico-chemical properties (size, shape, zeta-potential, cellular internalization and toxicity of gold nanoparticles (NPs stabilized with the most abundant mammalian protein, collagen. The properties of these gold NPs were compared to the same sized gold NPs coated with synthetic poly(isobutylene-alt-maleic anhydride (PMA. Intracellular uptake and cytotoxicity were assessed in two cell lines (cervical carcinoma and lung adenocarcinoma cells by employing inductively-coupled plasma-mass spectrometry (ICP-MS analysis and a cell viability assay based on 3-(4,5-dimethylthiazol-2-yl-2,5-diphenyltetrazolium bromide (MTT, respectively. We found that the collagen-coated gold NPs exhibit lower cytotoxicity, but higher uptake levels than PMA-coated gold NPs. These results demonstrate that the surface coating of Au NPs plays a decisive role in their biocompatibility.

  17. Surface-Directed Assembly of Sequence-Defined Synthetic Polymers into Networks of Hexagonally Patterned Nanoribbons with Controlled Functionalities

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Chun-Long; Zuckermann, Ronald N.; DeYoreo, James J.

    2016-05-24

    The exquisite self-assembly of proteins and peptides in nature into highly ordered functional materials has inspired innovative approaches to biomimetic materials design and synthesis. Here we report the assembly of peptoids—a class of highly stable sequence-defined synthetic polymers—into biomimetic materials on mica surfaces. The assembling 12-mer peptoid contains alternating acidic and aromatic residues, and the presence of Ca2+ cations creates peptoid-peptoid and peptoid-mica interactions that drive assembly. In situ atomic force microscopy (AFM) shows that peptoids first assemble into discrete nanoparticles, these particles then transform into hexagonally-patterned nanoribbons on mica surfaces. AFM-based dynamic force spectroscopy (DFS) studies show that peptoid-mica interactions are much stronger than peptoidpeptoid interactions in the presence of Ca2+, illuminating the physical parameters that drive peptoid assembly. We further demonstrate the display of functional groups at the N-terminus of assembling peptoid sequence to produce biomimetic materials with similar hierarchical structures. This research demonstrates that surface-directed peptoid assembly can be used as a robust platform to develop biomimetic coating materials for applications.

  18. FORMULATION AND IN-VITRO EVALUATION OF EFFERVESCENT FLOATING MATRIX TABLETS OF NIZATIDINE USING NATURAL AND SEMI SYNTHETIC POLYMERS

    Directory of Open Access Journals (Sweden)

    A Sarat Chandra

    2012-12-01

    Full Text Available The aim of this study was to develop a floating gastroretentive dosage form using effervescent technique so as to increase the patient compliance and to provide a prolonged therapeutic effect. Nizatidine was used as a model drug because of its short elimination half-life and localized action in the gastric region. Nine batches containing 75mg of Nizatidine per tablet were developed using release modifiers like xanthan gum and HPMC K100M both individually and in 1:1 combination at 30, 40 and 50% concentrations. Sodium bicarbonate and tartaric acid were used as gas generating agents. The drug-excipient compatibility, pre and post compression parameters, buoyancy properties and swelling index were evaluated. In-vitro dissolution studies were carried out in 0.1N HCl (pH 1.2 at 37±0.5oC. Increase in polymer concentration showed significant retardation of drug release and increase in swelling property. Release kinetics were studied by fitting the data into various models and release mechanism, predicted drug release were studied. Best formulation among the designed batches was selected based on cumulative percentage of drug released by the end of twelfth hour and by comparing the predicted and obtained drug releases at the end of 5th and 8th hours respectively.

  19. Formulation and evaluation of a sustained-release tablets of metformin hydrochloride using hydrophilic synthetic and hydrophobic natural polymers

    Directory of Open Access Journals (Sweden)

    K J Wadher

    2011-01-01

    Full Text Available Metformin hydrochloride has relatively short plasma half-life, low absolute bioavailability. The need for the administration two to three times a day when larger doses are required can decrease patient compliance. Sustained release formulation that would maintain plasma level for 8-12 h might be sufficient for daily dosing of metformin. Sustained release products are needed for metformin to prolong its duration of action and to improve patient compliances. The overall objective of this study was to develop an oral sustained release metformin hydrochloride tablet by using hydrophilic Eudragit RSPO alone or its combination with hydrophobic natural polymers Gum copal and gum damar as rate controlling factor. The tablets were prepared by wet granulation method. The in vitro dissolution study was carried out using USP 22 apparatus I, paddle method and the data was analysed using zero order, first order, Higuchi, Korsmeyer and Hixson-Crowell equations. The drug release study revealed that Eudragit RSPO alone was unable to sustain the drug release. Combining Eudragit with gum Copal and gum Damar sustained the drug release for more than 12 h. Kinetic modeling of in vitro dissolution profiles revealed the drug release mechanism ranges from diffusion controlled or Fickian transport to anomalous type or non-Fickian transport. Fitting the in vitro drug release data to Korsmeyer equation indicated that diffusion along with erosion could be the mechanism of drug release.

  20. Chain-length-dependent impact of band broadening on the molar-mass determination of synthetic polymers via size-exclusion chromatography.

    Science.gov (United States)

    Wolpers, Arne; Vana, Philipp

    2016-08-01

    The impact of band-broadening (BB) on the molar-mass determination of synthetic polymers via size-exclusion chromatography (SEC) is systematically studied. BB is simulated using the exponentially modified Gaussian (EMG) model, which combines the two inherent and distinct characteristics contributing to BB in SEC: symmetric Gaussian broadening and asymmetric skewing. It is demonstrated that BB both during the measurement of the analyte itself and during the calibration process has an individual impact on molar-mass determination. In this context, particularly skewing leads to a chain-length-dependent underestimation of molar masses, with deviations of the apparent from the true ones of only a few percent for low molar masses to up to 20% for high ones for reasonable extents of BB. The impact is shown to be independent of the shape of the analyte⬢s molar-mass distribution (MMD) and affects broad and multimodal MMDs similarly to narrow and unimodal ones. As a consequence, strategies are presented for a comprehensive quantitative correction of the observed effects, which may find their application in refined SEC software packages. The potential impact of the findings on general conceptions of repeatability and reproducibility within SEC experiments is discussed. PMID:27393628

  1. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  2. Analytical development of the sup 252 Cf-plasma desorption mass spectroscopy for the structure analysis of biopolymers and synthetic polymers. Analytische Entwicklung der sup 252 Cf-Plasmadesorptions-Massenspektrometrie zur Strukturanalyse von Biopolymeren und synthetischen Polymeren

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, K.

    1991-01-01

    The dissertation had the following aims: A systematic, analytical development of the plasma desorption method, and applications of the plasma desorption mass spectroscopy (PDMS) in primary structure investigations of polypeptides and proteins, and for the determination of the molecular weight of synthetic polymers. For the analytical development of the PDMS, aspects of main interest were the preparation and characterization techniques, and systematic model investigations of the analytical sensitivity, reproducibility and accuray of the molecular weight determination, as well as of the mixture analysis. The objective in the second part of the dissertation was to show application potentials and limits of the PDMS within the framework of analytical tasks of a primary structure characterization of polypeptides and proteins, as well as with regard to the determination of molecular weight and molecular weight distribution of synthetic polymers. (orig.).

  3. Securing iris recognition systems against masquerade attacks

    Science.gov (United States)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  4. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio......-technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  5. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  6. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  7. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  8. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  9. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  10. Edible Polymers: Challenges and Opportunities

    Directory of Open Access Journals (Sweden)

    Subhas C. Shit

    2014-01-01

    Full Text Available Edible polymers have established substantial deliberation in modern eons because of their benefits comprising use as edible materials over synthetic polymers. This could contribute to the reduction of environmental contamination. Edible polymers can practically diminish the complexity and thus improve the recyclability of materials, compared to the more traditional non-environmentally friendly materials and may be able to substitute such synthetic polymers. A synthetic hydrogel polymer unlocked a new possibility for development of films, coatings, extrudable pellets, and synthetic nanopolymers, particularly designed for medical, agricultural, and industrial fields. Edible polymers offer many advantages for delivering drugs and tissue engineering. Edible polymer technology helps food industries to make their products more attractive and safe to use. Novel edible materials have been derived from many natural sources that have conventionally been regarded as discarded materials. The objective of this review is to provide a comprehensive introduction to edible polymers by providing descriptions in terms of their origin, properties, and potential uses.

  11. What Is a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  12. What Causes a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Causes a Heart Attack? Coronary Heart Disease A heart attack happens if ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  13. Life After a Heart Attack

    Science.gov (United States)

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  14. Building Computer Network Attacks

    CERN Document Server

    Futoransky, Ariel; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities of his network.

  15. Building Computer Network Attacks

    OpenAIRE

    Futoransky, Ariel; Notarfrancesco, Luciano; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities o...

  16. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  17. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  18. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  19. Preconcentration of low levels of americium and plutonium from waste waters by synthetic water-soluble metal-binding polymers with ultrafiltration

    International Nuclear Information System (INIS)

    A preconcentration approach to assist in the measurement of low levels of americium and plutonium in waste waters has been developed based on the concept of using water-soluble metal-binding polymers in combination with ultrafiltration. The method has been optimized to give over 90% recovery and accountability from actual waste water. (author)

  20. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  1. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  2. Signs of a Heart Attack

    Science.gov (United States)

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  3. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  4. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  5. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for...

  6. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  7. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  8. Polymer radiation chemistry

    International Nuclear Information System (INIS)

    This article reviews some of the work carried out in the Polymer and Radiation Group at the University of Queensland over the past ten years. The objective of the work has been to investigate the relationships between polymer structure and sensitivity towards high energy radiation, including 60Co gamma radiation, electron beams and UV radiation. A range of synthetic polymers containing carboxyl groups, acrylate groups, sulfone groups, amide linkages and aromatic residues have been investigated. (author). 18 refs, 2 figs, 4 tabs

  9. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  10. Polymers – A New Open Access Scientific Journal on Polymer Science

    Directory of Open Access Journals (Sweden)

    Shu-Kun Lin

    2009-12-01

    Full Text Available Polymers is a new interdisciplinary, Open Access scientific journal on polymer science, published by Molecular Diversity Preservation International (MDPI. This journal welcomes manuscript submissions on polymer chemistry, macromolecular chemistry, polymer physics, polymer characterization and all related topics. Both synthetic polymers and natural polymers, including biopolymers, are considered. Manuscripts will be thoroughly peer-reviewed in a timely fashion, and papers will be published, if accepted, within 6 to 8 weeks after submission. [...

  11. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    OpenAIRE

    Yi-Hsun Wang; Ching-Hao Mao; Hahn-Ming Lee

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of...

  12. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  13. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  14. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  15. Enhancement of Polymer Cytocompatibility by Nanostructuring of Polymer Surface

    OpenAIRE

    Petr Slepička; Nikola Slepičková Kasálková; Lucie Bačáková; Zdeňka Kolská; Václav Švorčík

    2012-01-01

    Polymers with their advantageous physical, chemical, mechanical, and electrical properties and easy manufacturing are widely used in biology, tissue engineering, and medicine, for example, as prosthetic materials. In some cases the polymer usage may be impeded by low biocompatibility of common synthetic polymers. The biocompatibility can be improved by modification of polymer surface, for example, by plasma discharge, irradiation with ionizing radiation, and sometime subsequent grafting with ...

  16. Synthetic environments

    Science.gov (United States)

    Lukes, George E.; Cain, Joel M.

    1996-02-01

    The Advanced Distributed Simulation (ADS) Synthetic Environments Program seeks to create robust virtual worlds from operational terrain and environmental data sources of sufficient fidelity and currency to interact with the real world. While some applications can be met by direct exploitation of standard digital terrain data, more demanding applications -- particularly those support operations 'close to the ground' -- are well-served by emerging capabilities for 'value-adding' by the user working with controlled imagery. For users to rigorously refine and exploit controlled imagery within functionally different workstations they must have a shared framework to allow interoperability within and between these environments in terms of passing image and object coordinates and other information using a variety of validated sensor models. The Synthetic Environments Program is now being expanded to address rapid construction of virtual worlds with research initiatives in digital mapping, softcopy workstations, and cartographic image understanding. The Synthetic Environments Program is also participating in a joint initiative for a sensor model applications programer's interface (API) to ensure that a common controlled imagery exploitation framework is available to all researchers, developers and users. This presentation provides an introduction to ADS and the associated requirements for synthetic environments to support synthetic theaters of war. It provides a technical rationale for exploring applications of image understanding technology to automated cartography in support of ADS and related programs benefitting from automated analysis of mapping, earth resources and reconnaissance imagery. And it provides an overview and status of the joint initiative for a sensor model API.

  17. Polymer-solvent molecular compounds

    CERN Document Server

    Guenet, Jean-Michel

    2010-01-01

    Crystallisable polymers represent a large share of the polymers used for manufacturing a wide variety of objects, and consequently have received continuous attention from scientists these past 60 years. Molecular compounds from crystallisable polymers, particularly from synthetic polymers, are receiving growing interest due to their potential application in the making of new materials such as multiporous membranes capable of capturing large particles as well as small pollutant molecules. The present book gives a detailed description of these promising systems. The first chapter

  18. Molecularly imprinted polymers with synthetic dummy template for simultaneously selective removal and enrichment of ginkgolic acids from Ginkgo biloba L. leaves extracts.

    Science.gov (United States)

    Ji, Wenhua; Ma, Xiuli; Xie, Hongkai; Chen, Lingxiao; Wang, Xiao; Zhao, Hengqiang; Huang, Luqi

    2014-11-14

    Dummy molecularly imprinted polymers (DMIPs) for simultaneously selective removal and enrichment of ginkgolic acids (GAs) during the processing of Ginkgo biloba leaves have been prepared. Two dummy template molecule with similar structural skeleton to GAs, 6-methoxysalicylic acid (MOSA, DT-1) and 6-hexadecyloxysalicylic acid (HOSA, DT-2), have been designed and synthesized. The performance of the DMIPs and NIPs were evaluated including selective recognition capacity, adsorption isotherm, and adsorption kinetics. The selective recognition capacity of the three GAs with four analogues on the sorbents illustrated that the DMIPs sorbents have high specificity for GAs. An efficient method based on DMIP-HOSA coupled with solid-phase extraction (SPE) was developed for simultaneously selective removal and enrichment of ginkgolic acids (GAs) during the processing of Ginkgo biloba leaves. The method showed excellent recoveries (82.5-88.7%) and precision (RSD 0.5-2.6%, n=5) for licorice extracts, Gastrodia elata extracts and pepper extracts spiked at three concentration levels each (50, 100, 200 μg mL(-1)). The results indicated that GAs and standardized Ginkgo biloba leaves extracts could be obtained simultaneously through the DMIP-SPE.

  19. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  20. Synthetic Astrobiology

    Science.gov (United States)

    Rothschild, Lynn J.

    2016-01-01

    Synthetic biology - the design and construction of new biological parts and systems and the redesign of existing ones for useful purposes - has the potential to transform fields from pharmaceuticals to fuels. Our lab has focused on the potential of synthetic biology to revolutionize all three major parts of astrobiology: Where do we come from? Where are we going? and Are we alone? For the first and third, synthetic biology is allowing us to answer whether the evolutionary narrative that has played out on planet earth is likely to have been unique or universal. For example, in our lab we are re-evolving the biosynthetic pathways of amino acids in order to understand potential capabilities of an early organism with a limited repertoire of amino acids and developing techniques for the recovery of metals from spent electronics on other planetary bodies. And what about the limits for life? Can we create organisms that expand the envelope for life? In the future synthetic biology will play an increasing role in human activities both on earth, in fields as diverse as human health and the industrial production of novel bio-composites. Beyond earth, we will rely increasingly on biologically-provided life support, as we have throughout our evolutionary history. In order to do this, the field will build on two of the great contributions of astrobiology: studies of the origin of life and life in extreme environments.

  1. Synthetic Astrobiology

    Science.gov (United States)

    Rothschild, Lynn J.

    2015-01-01

    Synthetic biology - the design and construction of new biological parts and systems and the redesign of existing ones for useful purposes - has the potential to transform fields from pharmaceuticals to fuels. Our lab has focused on the potential of synthetic biology to revolutionize all three major parts of astrobiology: Where do we come from? Where are we going? and Are we alone? For the first and third, synthetic biology is allowing us to answer whether the evolutionary narrative that has played out on planet earth is likely to have been unique or universal. For example, in our lab we are re-evolving the biosynthetic pathways of amino acids in order to understand potential capabilities of an early organism with a limited repertoire of amino acids and developing techniques for the recovery of metals from spent electronics on other planetary bodies. In the future synthetic biology will play an increasing role in human activities both on earth, in fields as diverse as human health and the industrial production of novel bio-composites. Beyond earth, we will rely increasingly on biologically-provided life support, as we have throughout our evolutionary history. In order to do this, the field will build on two of the great contributions of astrobiology: studies of the origin of life and life in extreme environments.

  2. ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

    Directory of Open Access Journals (Sweden)

    A.MADHURI,

    2010-09-01

    Full Text Available In this paper, we discuss the methods for detecting and preventing the DDoS Attacks and Replay Attacks, which have been posing the problems for the Internet. We explained a scheme AMFDR (AttackPatterns for Marking Filtering DoS and Replay attacks that identifies the attack packets from the packets that are sent by legitimate users and filters the attack packets. A Denial of service attack is generally launched to make a service unavailable even to an unauthorized user. If this attack uses many computers across the world, it is called Distributed Denial of service attack. Replay attack is retransmission of a data transmission which used to gain authentication in a fraudulent manner. These replayed packets or attack packets are identified. This scheme is less expensive and the implementation of this scheme needs minimal interaction with routers. The scheme is like firewall system, so that the occurrence of an attack is recognized quickly and a punitive action is taken without any loss genuine packets.

  3. Simultaneous Attacks by Terrorist Organisations

    Directory of Open Access Journals (Sweden)

    Kathleen Deloughery

    2013-12-01

    Full Text Available While terror attacks that are a part of a coordinated effort receive attention in the popular media, they have not received much attention in the academic literature. The decision to carry out simultaneous attacks should be examined as one of the choices a terrorist organisation makes about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single attack can explain why groups would use this method. Up to one quarter of all attacks coded in two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical analysis shows simultaneous attacks are more likely to be successful and cause more fatalities, though not in a one-to-one fashion. These results underline the importance of considering simultaneous attacks in empirical analysis.

  4. LITERATURE SURVEY ON WORMHOLE ATTACK

    OpenAIRE

    Avinash S. Bundela

    2015-01-01

    Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been identified & corresponding solutions have been proposed. These attacks are caused by the malicious node hence ad hoc wireless network is unprotected from the attacks of the malicious node. Between all these attacks the wormhole att ...

  5. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  6. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  7. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  8. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  9. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  10. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  11. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  12. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  13. A Network Attack Model based on Colored Petri Net

    Directory of Open Access Journals (Sweden)

    Xinlei Li

    2014-07-01

    Full Text Available The researches have shown that not all the Petri Net machines can be used to describe attack behavior. When Petri Net machines adapted for attack behavior modeling are detecting the network, for some event of current status, if there is matching event in the model, it has only one corresponding transition; otherwise that may cause errors. Since sharing synthesis and synchronization synthesis of traditional machines cannot ensure synthetic model reserves original detection capability, we propose the novel concept for synthesis operation and colored synthetic operation. By the analysis on the relation among these operations, the ability to reserve original detection is verified. Then an improved colored judgement Petri Net machine is adopted for modeling and renewing the knowledge repository. The inductive learning method is used to extend the attack modes. It creates a four-layered concept space, which actually provides a depth-first search path for matching. To solve the problems in multi-pattern matching and incremental learning, various modes are generalized by colored operation. We also adopt the decomposition and synthesis operation to handle the pattern matching of distributed attack behavior and attack information fusion. Finally the actual cases verify that our algorithm is feasible

  14. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  15. Synthetic Cannabinoids.

    Science.gov (United States)

    Mills, Brooke; Yepes, Andres; Nugent, Kenneth

    2015-07-01

    Synthetic cannabinoids (SCBs), also known under the brand names of "Spice," "K2," "herbal incense," "Cloud 9," "Mojo" and many others, are becoming a large public health concern due not only to their increasing use but also to their unpredictable toxicity and abuse potential. There are many types of SCBs, each having a unique binding affinity for cannabinoid receptors. Although both Δ-tetrahydrocannabinol (THC) and SCBs stimulate the same receptors, cannabinoid receptor 1 (CB1) and cannabinoid receptor 2 (CB2), studies have shown that SCBs are associated with higher rates of toxicity and hospital admissions than is natural cannabis. This is likely due to SCBs being direct agonists of the cannabinoid receptors, whereas THC is a partial agonist. Furthermore, the different chemical structures of SCBs found in Spice or K2 may interact in unpredictable ways to elicit previously unknown, and the commercial products may have unknown contaminants. The largest group of users is men in their 20s who participate in polydrug use. The most common reported toxicities with SCB use based on studies using Texas Poison Control records are tachycardia, agitation and irritability, drowsiness, hallucinations, delusions, hypertension, nausea, confusion, dizziness, vertigo and chest pain. Acute kidney injury has also been strongly associated with SCB use. Treatment mostly involves symptom management and supportive care. More research is needed to identify which contaminants are typically found in synthetic marijuana and to understand the interactions between different SBCs to better predict adverse health outcomes.

  16. Enzymes as catalysts in polymer chemistry

    OpenAIRE

    Sinigoi, Loris

    2011-01-01

    The use of enzymes in synthetic chemistry is attracting the interest of many researchers thanks to their extraordinary efficiency under mild conditions, high stereo- regio- and chemoselectivity and low environmental impact. Their application in the field of polymer chemistry has provided new synthetic strategies for useful polymers. The advantages coming from the use of enzymes are mainly: i) the possibility to synthesize polymers with novel properties and difficult to produce by conventional...

  17. FLOODING ATTACK AWARE SECURE AODV

    OpenAIRE

    Madhavi, S; K. Duraiswamy

    2013-01-01

    Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the ...

  18. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  19. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  20. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  1. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  2. Challenges in polymer analysis by liquid chromatography

    NARCIS (Netherlands)

    E. Uliyanchenko; S. van der Wal; P.J. Schoenmakers

    2012-01-01

    Synthetic polymers are very important in our daily life. Many valuable properties of polymers are determined by their molecular weight and chemical composition. Liquid chromatographic (LC) techniques are very commonly used for molecular characterisation of polymers. LC analysis of macromolecules is

  3. Synthetic Brainbows

    KAUST Repository

    Wan, Y.

    2013-06-01

    Brainbow is a genetic engineering technique that randomly colorizes cells. Biological samples processed with this technique and imaged with confocal microscopy have distinctive colors for individual cells. Complex cellular structures can then be easily visualized. However, the complexity of the Brainbow technique limits its applications. In practice, most confocal microscopy scans use different florescence staining with typically at most three distinct cellular structures. These structures are often packed and obscure each other in rendered images making analysis difficult. In this paper, we leverage a process known as GPU framebuffer feedback loops to synthesize Brainbow-like images. In addition, we incorporate ID shuffing and Monte-Carlo sampling into our technique, so that it can be applied to single-channel confocal microscopy data. The synthesized Brainbow images are presented to domain experts with positive feedback. A user survey demonstrates that our synthetic Brainbow technique improves visualizations of volume data with complex structures for biologists.

  4. Synthetic nanoscale motion devices

    Energy Technology Data Exchange (ETDEWEB)

    Lyshevski, M.A. [Microsystems and Nanotechnologies, Webster, NY (United States); Lyshevski, S.E. [Rochester Inst. of Technology, Rochester, NY (United States). Dept. of Electrical Engineering

    2007-07-01

    This study examined biomolecular axial and radial topology rotational machines, as well as translational motion devices made from proteins. In particular, it documented the integrated topological, structural and analytic design of synthetic nanoscale motion devices in an effort to promote high performance and meet specifications. Control, analysis and design problems were solved for electromagnetic motion devices. A systematic synthesis resulted in a radial topology permanent-magnetic device with noncontact electrostatic bearings for use in microrobotics. Such nanoscale motion devices can be made from carbon nanotubes using molecular nanotechnology and surface chemistry. Structures, magnets and windings were formed by depositing polymers and organic/inorganic molecules on the noncontact electrostatic bearings. The electromagnetic torque was studied to analyze the electromagnetics and nonuniform field. The electromagnetic torque was varied in order to control the phase voltages applied to the windings. The closed-loop systems were designed for stability, controllability and optimal performance. The proposed machines can be used as nanoscale generators to convert mechanical energy into electrical energy. The permanent-magnet synthetic motion devices may have practical use in nano- and micro robots, assemblers and propulsors. Practical control laws were derived from electromagnetic and electromechanical analyses. 5 refs., 3 figs.

  5. Transferases in Polymer Chemistry

    NARCIS (Netherlands)

    van der Vlist, Jeroen; Loos, Katja; Palmans, ARA; Heise, A

    2010-01-01

    Transferases are enzymes that catalyze reactions in which a group is transferred from one compound to another. This makes these enzymes ideal catalysts for polymerization reactions. In nature, transferases are responsible for the synthesis of many important natural macromolecules. In synthetic polym

  6. Synthetic LPS-Binding Polymer Nanoparticles

    Science.gov (United States)

    Jiang, Tian

    Lipopolysaccharide (LPS), one of the principal components of most gram-negative bacteria's outer membrane, is a type of contaminant that can be frequently found in recombinant DNA products. Because of its strong and even lethal biological effects, selective LPS removal from bioproducts solution is of particular importance in the pharmaceutical and health care industries. In this thesis, for the first time, a proof-of-concept study on preparing LPS-binding hydrogel-like NPs through facile one-step free-radical polymerization was presented. With the incorporation of various hydrophobic (TBAm), cationic (APM, GUA) monomers and cross-linkers (BIS, PEG), a small library of NPs was constructed. Their FITC-LPS binding behaviors were investigated and compared with those of commercially available LPS-binding products. Moreover, the LPS binding selectivity of the NPs was also explored by studying the NPs-BSA interactions. The results showed that all NPs obtained generally presented higher FITC-LPS binding capacity in lower ionic strength buffer than higher ionic strength. However, unlike commercial poly-lysine cellulose and polymyxin B agarose beads' nearly linear increase of FITC-LPS binding with particle concentration, NPs exhibited serious aggregation and the binding quickly saturated or even decreased at high particle concentration. Among various types of NPs, higher FITC-LPS binding capacity was observed for those containing more hydrophobic monomers (TBAm). However, surprisingly, more cationic NPs with higher content of APM exhibited decreased FITC-LPS binding in high ionic strength conditions. Additionally, when new cationic monomer and cross-linker, GUA and PEG, were applied to replace APM and BIS, the obtained NPs showed improved FITC-LPS binding capacity at low NP concentration. But compared with APM- and BIS-containing NPs, the FITC-LPS binding capacity of GUA- and PEG-containing NPs saturated earlier. To investigate the NPs' binding to proteins, we tested the NPs-bovine serum albumin (BSA) binding, which showed that, different from NPs FITC-LPS interactions, variation of TBAm's content in NPs had very little influence on BSA binding, instead, more cationic NPs with higher content of APM were found to possess higher BSA binding. Additionally, GUA-containing NPs exhibited particularly high BSA binding capacity, especially under low ionic strength conditions. In the current formulations, the aggregation and saturation effects make NPs unsuitable in practical applications. Nevertheless, we anticipate that by attaching NPs onto certain substrates, particles may be effectively separated from each other, and the NPs' LPS binding capacity could potentially be further improved.

  7. Coupling of Active Components to Synthetic Polymers

    DEFF Research Database (Denmark)

    Overgaard, Anne Kathrine Kattenhøj

    Arbejdet har fokuseret på fremstilling af kunstig ekstracellulær matrix (ECM) til fremme af den naturlige biologiske helingsproces ved vævsgendannelse efter store vævsskader. Særlig opmærksomhed har været på kemisk kobling af dermatan sulfat (DS), en naturlig glyco-saminoglycan (GAG), med en biok...

  8. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  9. Humic polymer complexes for purification of mineralized water

    OpenAIRE

    Z. Akkulova; A. Amirkhanova; A. Zhakina; A. Akhmetova

    2012-01-01

    The Estimation and shown to be effective of new sorbents based on polymer complexes of humic acids with natural and synthetic polymers to reduce the mineralization of mine water of the Karaganda coal basin in the of model conditions.

  10. Luminescent Metal-Containing Polymers for White Light Emission.

    Science.gov (United States)

    Ho, Cheuk-Lam; Wong, Wai-Yeung

    2016-10-01

    This chapter focuses on the recent developments in luminescent metallopolymers. Synthetic routes to these polymers are briefly described and their applications in polymer white light-emitting diodes are discussed. PMID:27573506

  11. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  12. Topological Polymer Chemistry for Designing New Macromolecular Architectures

    Institute of Scientific and Technical Information of China (English)

    Y. Tezuka

    2005-01-01

    @@ 1Introduction The precise control in polymer architectures has been an ongoing challenge in synthetic polymer chemistry, since new polymer topologies will realize unprecedented properties and functions in polymeric materials.In particular, topologically unique macromolecules comprising single cyclic and multicyclic polymer units have gained growing interests due to their distinctive behaviors from linear and branched counterparts[1-4]. See Fig. 1.

  13. Inorganic nanoparticles engineered to attack bacteria.

    Science.gov (United States)

    Miller, Kristen P; Wang, Lei; Benicewicz, Brian C; Decho, Alan W

    2015-11-01

    Antibiotics were once the golden bullet to constrain infectious bacteria. However, the rapid and continuing emergence of antibiotic resistance (AR) among infectious microbial pathogens has questioned the future utility of antibiotics. This dilemma has recently fueled the marriage of the disparate fields of nanochemistry and antibiotics. Nanoparticles and other types of nanomaterials have been extensively developed for drug delivery to eukaryotic cells. However, bacteria have very different cellular architectures than eukaryotic cells. This review addresses the chemistry of nanoparticle-based antibiotic carriers, and how their technical capabilities are now being re-engineered to attack, kill, but also non-lethally manipulate the physiologies of bacteria. This review also discusses the surface functionalization of inorganic nanoparticles with small ligand molecules, polymers, and charged moieties to achieve drug loading and controllable release.

  14. Polymer films

    Science.gov (United States)

    Granick, Steve; Sukhishvili, Svetlana A.

    2008-12-30

    A film contains a first polymer having a plurality of hydrogen bond donating moieties, and a second polymer having a plurality of hydrogen bond accepting moieties. The second polymer is hydrogen bonded to the first polymer.

  15. Glucose polymers in diarrhoea--risk of hypernatraemia.

    Science.gov (United States)

    Lindfors, A; Lundberg, B; Stenhammar, L

    1992-01-01

    An infant girl with congenital heart disease was fed glucose polymers as dietary supplements. During an attack of gastroenteritis with severe diarrhoea she developed hypernatraemic dehydration, probably due to the high osmotic load of the glucose polymers. This case illustrates the importance of giving adequate amounts of free water to a child on glucose polymers, especially during excessive fluid loss.

  16. Synthetic biology, inspired by synthetic chemistry

    OpenAIRE

    Malinova, V; Nallani, M.; Meier, W. P.; Sinner, E. K.

    2012-01-01

    The topic synthetic biology appears still as an 'empty basket to be filled'. However, there is already plenty of claims and visions, as well as convincing research strategies about the theme of synthetic biology. First of all, synthetic biology seems to be about the engineering of biology -about bottom-up and top-down approaches, compromising complexity versus stability of artificial architectures, relevant in biology. Synthetic biology accounts for heterogeneous approaches towards minimal an...

  17. Routing of individual polymers in designed patterns

    DEFF Research Database (Denmark)

    Knudsen, Jakob Bach; Liu, Lei; Kodal, Anne Louise Bank;

    2015-01-01

    Synthetic polymers are ubiquitous in the modern world, but our ability to exert control over the molecular conformation of individual polymers is very limited. In particular, although the programmable self-assembly of oligonucleotides and proteins into artificial nanostructures has been...... demonstrated, we currently lack the tools to handle other types of synthetic polymers individually and thus the ability to utilize and study their single-molecule properties. Here we show that synthetic polymer wires containing short oligonucleotides that extend from each repeat can be made to assemble...... into arbitrary routings. The wires, which can be more than 200 nm in length, are soft and bendable, and the DNA strands allow individual polymers to self-assemble into predesigned routings on both two- and three-dimensional DNA origami templates. The polymers are conjugated and potentially conducting, and could...

  18. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  19. Suicide Attacks on the Rise

    OpenAIRE

    CCS Research Staff

    2008-01-01

    This article was published in Culture and Conflict Review (March 2008), v.2 no.2 "The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star ...

  20. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  1. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  2. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  3. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  4. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  5. Polymers for Protein Conjugation

    Directory of Open Access Journals (Sweden)

    Gianfranco Pasut

    2014-01-01

    Full Text Available Polyethylene glycol (PEG at the moment is considered the leading polymer for protein conjugation in view of its unique properties, as well as to its low toxicity in humans, qualities which have been confirmed by its extensive use in clinical practice. Other polymers that are safe, biodegradable and custom-designed have, nevertheless, also been investigated as potential candidates for protein conjugation. This review will focus on natural polymers and synthetic linear polymers that have been used for protein delivery and the results associated with their use. Genetic fusion approaches for the preparation of protein-polypeptide conjugates will be also reviewed and compared with the best known chemical conjugation ones.

  6. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  7. Sertraline-induced panic attack.

    Science.gov (United States)

    González-Berríos, Nereida

    2009-01-01

    Selective Serotonin Reuptake Inhibitors are the treatment of choice for depression and anxiety disorders due to its tolerability, safety and side effects profile. However, with the current and frequent use of these medications in patients with these disorders, new side effects have been reported. This case report describes the development of panic attacks in a 24-year-old-female patient with depressive and anxiety symptoms, and no previous predisposing history for panic attacks. PMID:19954091

  8. Microarchitectural Side-Channel Attacks

    OpenAIRE

    Gallais, Jean-Francois

    2013-01-01

    Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weaknesses and flaws. Initially confined to the black-box model, where only the input and output data were considered, cryptanalysis is now broadened to the security evaluation of the physical implementation of a cryptosystem. The implementation attacks which compose physical cryptanalysis are divided into fault attacks, exploiting the effect of disruption of the normal functioning of the device, and s...

  9. Acute ischemic cerebral attack

    Directory of Open Access Journals (Sweden)

    Franco-Garcia Samir

    2010-12-01

    Full Text Available The decrease of the cerebral blood flow below the threshold of autoregulation led to changes of cerebral ischemia and necrosis that traduce in signs and symtoms of focal neurologic dysfunction called acute cerebrovascular symdrome (ACS or stroke. Two big groups according to its etiology are included in this category the hemorragic that constitue a 20% and the ischemic a 80% of cases. Great interest has wom the ischemic ACS because of its high social burden, being the third cause of no violent death in the world and the first of disability. Many risk factors favor the presentation of these events and some of them are susceptible of modification and therfore are objetives of primary prevention just as the control of diabetes, hypertension and the practice of healthy habits of life. The advances in the knowledge of the physiopatology, had taken to sustantial change in the nomenclature and management of ischemic ACS. Within these changes it was substituted the term cerebrovascular accident fo acute stroke, making emphasis in the key rol of a timely management with goals of time similiar to the acute coronary syndrome. It was redefined the time of acute ischemic attack to a one hour. Once stablished the cerebrovascular attack the semiology of symtoms with frecuency will led us make a topographic diagnosis of the in injury that joined to the cerebral TAC will allow us to exclude an hemorragic event and to start the treatment. In the management of these patients its essential the coordination of the differents teams of work, from the early recognition of symtoms on the part of patients andthe family, the rapid activation and response of emergency systems and the gearing of health care institutions. Are pillars of treatment: the abcde of reanimatiion, to avoid the hiperpirexis, the seizures, the hipoglicemy, the hiperglicemy, to achieve the thrombolysis in the first three hours of the begining of symtoms, to use antiplatelets, antithrombotic profilaxis

  10. Polymer Science Pilot Program

    Science.gov (United States)

    Maier, Mary L.

    1996-07-01

    Natural polymers such as cellulose, proteins, and DNA have been part of earth's store of chemicals long before chemists existed. However, polymers synthesized by chemists first appeared on this planet only sixty years ago. A veritable explosion of materials first known as plastics, later polymers, followed. Today polymers, natural and synthetic, are everywhere, and it is appropriate to include an introduction to polymers in the education of future scientists. The Polymer Science Pilot Program consists of a sequence of experiences with polymers, designed to focus upon the ways in which these materials resemble and/or compare with nonpolymers in physical properties, versatility, and function. The modular format makes it possible for educators to select specific sections of the program for integration into other college chemistry courses. The team learning aspect of he program can also be recommended to educators who select a specific module. When this program was presented at a Middle Atlantic Regional Meeting of the American Chemical Society, some attendees were concerned about the limited number of participants as compared with the seemingly large number of college instructors. It was explained that the concentrated format of the four day program necessitates this instructor-to-student ratio; one class consisting of eighteen participants was tried and it was found that some aspects of the program, especially the research paper preparation, were not as thoroughly moderated.

  11. "Synthetic Metals": A Novel Role for Organic Polymers (Nobel Lecture) Copyright((c)) The Nobel Foundation 2001. We thank the Nobel Foundation, Stockholm, for permission to print this lecture.

    Science.gov (United States)

    MacDiarmid, Alan G.

    2001-07-16

    Since the initial discovery in 1977, that polyacetylene (CH)(x), now commonly known as the prototype conducting polymer, could be p- or n-doped either chemically or electrochemically to the metallic state, the development of the field of conducting polymers has continued to accelerate at an unexpectedly rapid rate and a variety of other conducting polymers and their derivatives have been discovered. Other types of doping are also possible, such as "photo-doping" and "charge-injection doping" in which no counter dopant ion is involved. One exciting challenge is the development of low-cost disposable plastic/paper electronic devices. Conventional inorganic conductors, such as metals, and semiconductors, such as silicon, commonly require multiple etching and lithographic steps in fabricating them for use in electronic devices. The number of processing and etching steps involved limits the minimum price. On the other hand, conducting polymers combine many advantages of plastics, for example, flexibility and processing from solution, with the additional advantage of conductivity in the metallic or semiconducting regimes; however, the lack of simple methods to obtain inexpensive conductive polymer shapes/patterns limit many applications. Herein is described a novel, simple, and cheap method to prepare patterns of conducting polymers by a process which we term, "Line Patterning". PMID:11458347

  12. Pictures of Synthetic Biology

    OpenAIRE

    Cserer, Amelie; Seiringer, Alexandra

    2009-01-01

    This article is concerned with the representation of Synthetic Biology in the media and by biotechnology experts. An analysis was made of German-language media articles published between 2004 and 2008, and interviews with biotechnology-experts at the Synthetic Biology conference SB 3.0 in Zurich 2007. The results have been reflected in terms of the definition of Synthetic Biology, applications of Synthetic Biology and the perspectives of opportunities and risks. In the media, Synthetic Biolog...

  13. Radiation Synthesis of Superabsorbent Polymers Based on Natural Polymers

    International Nuclear Information System (INIS)

    The objectives of proposed research contract were first synthesize superabsorbent polymers based on natural polymers to be used as disposable diapers and soil conditioning materials in agriculture, horticulture and other super adsorbent using industries. We have planned to use the natural polymers; locust beam gum, tara gum, guar gum and sodium alginate on the preparation of natural superabsorbent polymers(SAP). The aqueous solution of natural polymers and their blends with trace amount of monomer and cross-linking agents will be irradiated in paste like conditions by gamma rays for the preparation of cross-linked superabsorbent systems. The water absorption and deswellling capacity of prepared super adsorbents and retention capacity, absorbency under load, suction power, swelling pressure and pet-rewet properties will be determined. Use of these materials instead of synthetic super absorbents will be examined by comparing the performance of finished products. The experimental studies achieved in the second year of project mainly on the effect of radiation on the chemistry of sodium alginate polymers in different irradiation conditions and structure-property relationship particularly with respect to radiation induced changes on the molecular weight of natural polymers and preliminary studies on the synthesis of natural-synthetic hydride super adsorbent polymers were given in details

  14. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  15. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  16. Synthetic jet actuation for load control

    Science.gov (United States)

    de Vries, H.; van der Weide, E. T. A.; Hoeijmakers, H. W. M.

    2014-12-01

    The reduction of wind turbine blade loads is an important issue in the reduction of the costs of energy production. Reduction of the loads of a non-cyclic nature requires so-called smart rotor control, which involves the application of distributed actuators and sensors to provide fast and local changes in aerodynamic performance. This paper investigates the use of synthetic jets for smart rotor control. Synthetic jets are formed by ingesting low-momentum fluid from the boundary layer along the blade into a cavity and subsequently ejecting this fluid with a higher momentum. We focus on the observed flow phenomena and the ability to use these to obtain the desired changes of the aerodynamic properties of a blade section. To this end, numerical simulations and wind tunnel experiments of synthetic jet actuation on a non-rotating NACA0018 airfoil have been performed. The synthetic jets are long spanwise slits, located close to the trailing edge and directed perpendicularly to the surface of the airfoil. Due to limitations of the present experimental setup in terms of performance of the synthetic jets, the main focus is on the numerical flow simulations. The present results show that high-frequency synthetic jet actuation close to the trailing edge can induce changes in the effective angle of attack up to approximately 2.9°.

  17. Polymer fractionation

    Energy Technology Data Exchange (ETDEWEB)

    Hadermann, A. F.

    1985-04-09

    Soluble polymers are fractionated according to molecular weight by cryogenically comminuting the polymer and introducing the polymer particles, while still in the active state induced by cryogenic grinding, into a liquid having a solvent power selected to produce a coacervate fraction containing high molecular weight polymer species and a dilute polymer solution containing lower molecular weight polymer species. The coacervate may be physically separated from the solution and finds use in the production of antimisting jet fuels and the like.

  18. A novel and simple synthetic route for a piperazine derivative

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Maria A.S. da; Pinheiro, Solange de O.; Francisco, Thiago dos S.; Silva, Francisco O.N. da; Carvalho, Idalina M.M.; Sousa, Jackson R. de; Dias-Filho, Francisco A.; Diogenes, Izaura C.N. [Universidade Federal do Ceara (UFC), Fortaleza, CE (Brazil). Dept. de Quimica Organica e Inorganica; Batista, Alzir A. [Universidade Federal de Sao Carlos (UFSCAR), Sao Carlos, SP (Brazil). Dept. de Quimica; Ellena, Javier [Universidade de Sao Paulo (USP), Sao Carlos, SP (Brazil). Inst. de Fisica; Longhinottid, Elisane, E-mail: izaura@dqoi.ufc.b [Universidade Federal do Ceara (UFC), Fortaleza, CE (Brazil). Dept. de Quimica Analitica e Fisico-Quimica

    2010-07-01

    A new derivative of piperazine, 5-oxopiperazinium-3-sulfonate monohydrate, was produced from a simple synthetic route as a result of the nucleophilic addition to HSO{sub 3} - bisulphite ion and of the nucleophilic attack of water molecules on pyrazine molecules. The isolated material was characterized by means of NMR, mass spectrometry, infrared, and X-ray diffraction. (author)

  19. Synthesis of cyanopyridine based conjugated polymer

    Directory of Open Access Journals (Sweden)

    B. Hemavathi

    2016-06-01

    Full Text Available This data file contains the detailed synthetic procedure for the synthesis of two new cyanopyridine based conjugated polymer P1 and P2 along with the synthesis of its monomers. The synthesised polymers can be used for electroluminescence and photovoltaic (PV application. The physical data of the polymers are provided in this data file along with the morphological data of the polymer thin films. The data provided here are in association with the research article entitled ‘Cyanopyridine based conjugated polymer-synthesis and characterisation’ (Hemavathi et al., 2015 [3].

  20. Low band gap polymers for organic photovoltaics

    DEFF Research Database (Denmark)

    Bundgaard, Eva; Krebs, Frederik C

    2007-01-01

    Low band gap polymer materials and their application in organic photovoltaics (OPV) are reviewed. We detail the synthetic approaches to low band gap polymer materials starting from the early methodologies employing quinoid homopolymer structures to the current state of the art that relies...

  1. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  2. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    reflected in the journalistic practices. The described norms form a coherent pattern if safeguarding the existing democracy and the general public is considered to be the main purpose. A coverage based on this pattern of norms can be compared to other forms of crisis management following attacks because...

  3. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  4. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  5. [Polygraphy of a panic attack].

    Science.gov (United States)

    Noffke, H U; Roser, M

    2001-09-01

    We studied a 24-year old female patient with Type 1 diabetes mellitus suffering for 4 weeks from a major depressive episode combined with panic disorder without agoraphobia. A spontaneous panic attack was serendipitously recorded by polygraph while the subject was at rest. Electrocardiogram, finger blood-flow, respiratory rhythm and muscle tone (forearm, forehead) were recorded. A triphasic course consisting of a "dynamic phase" (appr. 80 s) preceded by a discrete "initial phase" (appr. 140 s) and a "declining phase" (appr. 180 s) was observed. The dynamic phase is characterized by an acute increase of fingertip vasoconstriction and heart rate. The patient was not aware of the panic attack before the dynamic phase. The recognisable central regulation confirms previously published findings indicating a sympathetic-norepinephrine activation at the beginning of the panic attack without activating the musculoskeletal system. Furthermore, a paradoxical phenomenon involving heart and respiratory rate was observed before the onset of anxiety, i.e. an increase of the heart rate and a simultaneous decline of the respiratory rate, suggesting a non-antagonistic regulation of the ergotropic-trophotropic system. The autonomic state of the patient points to a lability in homeostasis from which panic attacks as a form of CNS response could develop. PMID:11572106

  6. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  7. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  8. The structural diversity of artificial genetic polymers

    OpenAIRE

    Anosova, Irina; Kowal, Ewa A.; Dunn, Matthew R.; Chaput, John C.; Van Horn, Wade D.; Egli, Martin

    2015-01-01

    Synthetic genetics is a subdiscipline of synthetic biology that aims to develop artificial genetic polymers (also referred to as xeno-nucleic acids or XNAs) that can replicate in vitro and eventually in model cellular organisms. This field of science combines organic chemistry with polymerase engineering to create alternative forms of DNA that can store genetic information and evolve in response to external stimuli. Practitioners of synthetic genetics postulate that XNA could be used to safeg...

  9. Active Polymer Gel Actuators

    Directory of Open Access Journals (Sweden)

    Shuji Hashimoto

    2010-01-01

    Full Text Available Many kinds of stimuli-responsive polymer and gels have been developed and applied to biomimetic actuators or artificial muscles. Electroactive polymers that change shape when stimulated electrically seem to be particularly promising. In all cases, however, the mechanical motion is driven by external stimuli, for example, reversing the direction of electric field. On the other hand, many living organisms can generate an autonomous motion without external driving stimuli like self-beating of heart muscles. Here we show a novel biomimetic gel actuator that can walk spontaneously with a wormlike motion without switching of external stimuli. The self-oscillating motion is produced by dissipating chemical energy of oscillating reaction. Although the gel is completely composed of synthetic polymer, it shows autonomous motion as if it were alive.

  10. Hydrolysis of synthetic mixed-acid phosphatides by phospholipase A from human pancreas

    NARCIS (Netherlands)

    Deenen, L.L.M. van; Haas, Gerard H. de; Heemskerk, C.H.Th.

    1963-01-01

    An investigation was made into the action of a human pancreatic phospholipase A on various synthetic phosphatides. L-α-Phosphatidyl ethanolamines were readily hydrolysed in an aqueous system by this enzyme. Synthetic lecithins, however, were not attacked in an appreciable rate by the mammalian phosp

  11. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  12. Bioderadable Polymers in Food Packaging

    Directory of Open Access Journals (Sweden)

    P.A.Pawar

    2013-01-01

    Full Text Available In recent years, there has been a marked increase in the interest in use of biodegradable materials in packaging. The principal function of packaging is protection and preservation of food from external contamination. This function involves retardation of deterioration, extension of shelf life, and maintenance of quality and safety of packaged food. Biodegradable polymers are the one which fulfill all these functions without causing any threat to the environment. The belief is that biodegradable polymer materials will reduce the need for synthetic polymer production (thus reducing pollution at a low cost, thereby producing a positive effect both environmentally and economically.

  13. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  14. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  15. Polymer electronics

    CERN Document Server

    Hsin-Fei, Meng

    2013-01-01

    Polymer semiconductor is the only semiconductor that can be processed in solution. Electronics made by these flexible materials have many advantages such as large-area solution process, low cost, and high performance. Researchers and companies are increasingly dedicating time and money in polymer electronics. This book focuses on the fundamental materials and device physics of polymer electronics. It describes polymer light-emitting diodes, polymer field-effect transistors, organic vertical transistors, polymer solar cells, and many applications based on polymer electronics. The book also disc

  16. Polymers in cell encapsulation from an enveloped cell perspective

    NARCIS (Netherlands)

    de Vos, Paul; Lazarjani, Hamideh Aghajani; Poncelet, Denis; Faas, Marijke M.

    2014-01-01

    In the past two decades, many polymers have been proposed for producing immunoprotective capsules. Examples include the natural polymers alginate, agarose, chitosan, cellulose, collagen, and xanthan and synthetic polymers poly(ethylene glycol), polyvinyl alcohol, polyurethane, poly(ether-sulfone), p

  17. Bio-based polycarbonate as synthetic toolbox

    Science.gov (United States)

    Hauenstein, O.; Agarwal, S.; Greiner, A.

    2016-01-01

    Completely bio-based poly(limonene carbonate) is a thermoplastic polymer, which can be synthesized by copolymerization of limonene oxide (derived from limonene, which is found in orange peel) and CO2. Poly(limonene carbonate) has one double bond per repeating unit that can be exploited for further chemical modifications. These chemical modifications allow the tuning of the properties of the aliphatic polycarbonate in nearly any direction. Here we show synthetic routes to demonstrate that poly(limonene carbonate) is the perfect green platform polymer, from which many functional materials can be derived. The relevant examples presented in this study are the transformation from an engineering thermoplastic into a rubber, addition of permanent antibacterial activity, hydrophilization and even pH-dependent water solubility of the polycarbonate. Finally, we show a synthetic route to yield the completely saturated counterpart that exhibits improved heat processability due to lower reactivity. PMID:27302694

  18. Bio-based polycarbonate as synthetic toolbox

    Science.gov (United States)

    Hauenstein, O.; Agarwal, S.; Greiner, A.

    2016-06-01

    Completely bio-based poly(limonene carbonate) is a thermoplastic polymer, which can be synthesized by copolymerization of limonene oxide (derived from limonene, which is found in orange peel) and CO2. Poly(limonene carbonate) has one double bond per repeating unit that can be exploited for further chemical modifications. These chemical modifications allow the tuning of the properties of the aliphatic polycarbonate in nearly any direction. Here we show synthetic routes to demonstrate that poly(limonene carbonate) is the perfect green platform polymer, from which many functional materials can be derived. The relevant examples presented in this study are the transformation from an engineering thermoplastic into a rubber, addition of permanent antibacterial activity, hydrophilization and even pH-dependent water solubility of the polycarbonate. Finally, we show a synthetic route to yield the completely saturated counterpart that exhibits improved heat processability due to lower reactivity.

  19. Fragmentation pathways of polymer ions.

    Science.gov (United States)

    Wesdemiotis, Chrys; Solak, Nilüfer; Polce, Michael J; Dabney, David E; Chaicharoen, Kittisak; Katzenmeyer, Bryan C

    2011-01-01

    Tandem mass spectrometry (MS/MS) is increasingly applied to synthetic polymers to characterize chain-end or in-chain substituents, distinguish isobaric and isomeric species, and determine macromolecular connectivities and architectures. For confident structural assignments, the fragmentation mechanisms of polymer ions must be understood, as they provide guidelines on how to deduce the desired information from the fragments observed in MS/MS spectra. This article reviews the fragmentation pathways of synthetic polymer ions that have been energized to decompose via collisionally activated dissociation (CAD), the most widely used activation method in polymer analysis. The compounds discussed encompass polystyrenes, poly(2-vinyl pyridine), polyacrylates, poly(vinyl acetate), aliphatic polyester copolymers, polyethers, and poly(dimethylsiloxane). For a number of these polymers, several substitution patterns and architectures are considered, and questions regarding the ionization agent and internal energy of the dissociating precursor ions are also addressed. Competing and consecutive dissociations are evaluated in terms of the structural insight they provide about the macromolecular structure. The fragmentation pathways of the diverse array of polymer ions examined fall into three categories, viz. (1) charge-directed fragmentations, (2) charge-remote rearrangements, and (3) charge-remote fragmentations via radical intermediates. Charge-remote processes predominate. Depending on the ionizing agent and the functional groups in the polymer, the incipient fragments arising by pathways (1)-(3) may form ion-molecule complexes that survive long enough to permit inter-fragment hydrogen atom, proton, or hydride transfers. PMID:20623599

  20. Controlled release from recombinant polymers.

    Science.gov (United States)

    Price, Robert; Poursaid, Azadeh; Ghandehari, Hamidreza

    2014-09-28

    Recombinant polymers provide a high degree of molecular definition for correlating structure with function in controlled release. The wide array of amino acids available as building blocks for these materials lend many advantages including biorecognition, biodegradability, potential biocompatibility, and control over mechanical properties among other attributes. Genetic engineering and DNA manipulation techniques enable the optimization of structure for precise control over spatial and temporal release. Unlike the majority of chemical synthetic strategies used, recombinant DNA technology has allowed for the production of monodisperse polymers with specifically defined sequences. Several classes of recombinant polymers have been used for controlled drug delivery. These include, but are not limited to, elastin-like, silk-like, and silk-elastinlike proteins, as well as emerging cationic polymers for gene delivery. In this article, progress and prospects of recombinant polymers used in controlled release will be reviewed.

  1. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  2. Polymer Chemistry and Liposome Technology

    OpenAIRE

    Tirrell, David A.

    1988-01-01

    Polymer chemistry has a great deal to offer in the construction of synthetic liposomal membranes for use in biology and medicine. This chapter explores the preparation and properties of polymeric liposomes , with particular emphasis on the use of controlled polyelectrolyte adsorption to manipulate liposomal membrane properties.

  3. Molecularly imprinted polymers for mycotoxins

    Science.gov (United States)

    Molecularly imprinted polymers (MIPs) are a class of synthetic receptors capable of selective recognition of analytes. Recent developments in imprinting technology have made it possible to apply this technology in a range of applications, including mycotoxin detection. Structure-activity relations...

  4. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  5. Heart attack - what to ask your doctor

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000231.htm Heart attack - what to ask your doctor To use the ... features on this page, please enable JavaScript. A heart attack occurs when blood flow to a part of ...

  6. Fat May Not Hike Heart Attack Risk

    Science.gov (United States)

    ... news/fullstory_160179.html Fat May Not Hike Heart Attack Risk: Study But it does raise diabetes risk, ... that obesity may not increase the risk of heart attack or premature death. Their study of identical twins ...

  7. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  8. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  9. Diabetes Ups Risk of Heart Attack Death

    Science.gov (United States)

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  10. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  11. DULOXETINE-RELATED PANIC ATTACKS

    OpenAIRE

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-01-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients’ trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who respon...

  12. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  13. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  14. Coyote Attacks: An Increasing Suburban Problem

    OpenAIRE

    Timm, Robert M.; Baker, Rex O.; Bennett, Joe R.; Coolahan, Craig C.

    2004-01-01

    Coyote attacks on humans and pets have increased within the past 5 years in California. We discuss documented occurrences of coyote aggression and attacks on people, using data from USDA Wildlife Services, the California Department of Fish & Game, and other sources. Forty-eight such attacks on children and adults were verified from 1998 through 2003, compared to 41 attacks during the period 1988 through 1997; most incidents occurred in Southern California near the suburban-wildland interfac...

  15. Sybil attack in Wireless Sensor Network

    OpenAIRE

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  16. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  17. Development of partially biodegradable foams from PP/HMSPP blends with natural and synthetic polymers; Desenvolvimento de espumas parcialmente biodegradaveis a partir de blendas de PP/HMSPP com polimeros naturais e sinteticos

    Energy Technology Data Exchange (ETDEWEB)

    Cardoso, Elizabeth Carvalho Leite

    2014-07-01

    Polymers are used in various application and in different industrial areas providing enormous quantities of wastes in environment. Among diverse components of residues in landfills are polymeric materials, including Polypropylene, which contribute with 20 to 30% of total volume of solid residues. As polymeric materials are immune to microbial degradation, they remain in soil and in landfills as a semi-permanent residue. Environmental concerning in litter reduction is being directed to renewable polymers development for manufacturing of polymeric foams. Foamed polymers are considered future materials, with a wide range of applications; high density structural foams are specially used in civil construction, in replacement of metal, woods and concrete with a final purpose of reducing materials costs. At present development, it was possible the incorporation of PP/HMSPP polymeric matrix blends with sugarcane bagasse, PHB and PLA, in structural foams production. Thermal degradation at 100, 120 and 160 deg C temperatures was not enough to induce biodegradability. Gamma irradiation degradation, at 50, 100, 200 and 500 kGy showed effective for biodegradability induction. Irradiated bagasse blends suffered surface erosion, in favor of water uptake and consequently, a higher biodegradation in bulk structure. (author)

  18. A Novel Attack against Android Phones

    CERN Document Server

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  19. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  20. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Stroke More Understand Your Risks to Prevent a Heart Attack Updated:Aug 2,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  1. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  2. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  3. Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures

    CERN Document Server

    Kiyavash, Negar; Borisov, Nikita

    2012-01-01

    In this paper, we analyze several recent schemes for watermarking network flows that are based on splitting the flow into timing intervals. We show that this approach creates time-dependent correlations that enable an attack that combines multiple watermarked flows. Such an attack can easily be mounted in nearly all applications of network flow watermarking, both in anonymous communication and stepping stone detection. The attack can be used to detect the presence of a watermark, recover the secret parameters, and remove the watermark from a flow. The attack can be effective even if different flows are marked with different values of a watermark. We analyze the efficacy of our attack using a probabilistic model and a Markov-Modulated Poisson Process (MMPP) model of interactive traffic. We also implement our attack and test it using both synthetic and real-world traces, showing that our attack is effective with as few as 10 watermarked flows. Finally, we propose possible countermeasures to defeat the multi-flo...

  4. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  5. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  6. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  7. Evolvable synthetic neural system

    Science.gov (United States)

    Curtis, Steven A. (Inventor)

    2009-01-01

    An evolvable synthetic neural system includes an evolvable neural interface operably coupled to at least one neural basis function. Each neural basis function includes an evolvable neural interface operably coupled to a heuristic neural system to perform high-level functions and an autonomic neural system to perform low-level functions. In some embodiments, the evolvable synthetic neural system is operably coupled to one or more evolvable synthetic neural systems in a hierarchy.

  8. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  9. Utilization of Nitrones in Radical Polymerizations and Polymer Conjugations

    OpenAIRE

    Ranieri Lynn, Kayte

    2015-01-01

    Much research has been performed in the last 10 years on the use of nitrones in synthetic polymer chemistry. Nitrone polymer chemistry represents an additional tool to the “polymer toolbox”, which contributes to the advancement of modern polymer science and technology. In this present thesis, four interconnecting themes centered on the use of nitrones in radical polymerizations and coupling have been investigated. (1) Synthesize nitrones with various functionalities. (2) Utilize controlled ra...

  10. Polymer and polymer-hybrid nanoparticles from synthesis to biomedical applications

    CERN Document Server

    Rangelov, Stanislav

    2013-01-01

    Polymeric and hybrid nanoparticles have received increased scientific interest in terms of basic research as well as commercial applications, promising a variety of uses for nanostructures in fields including bionanotechnology and medicine. Condensing the relevant research into a comprehensive reference, Polymer and Polymer-Hybrid Nanoparticles: From Synthesis to Biomedical Applications covers an array of topics from synthetic procedures and macromolecular design to possible biomedical applications of nanoparticles and materials based on original and unique polymers. The book presents a well-r

  11. Electrospun Synthetic Polypeptide Nanofibrous Biomaterials

    Science.gov (United States)

    Khadka, Dhan; Haynie, Donald

    2011-03-01

    Water-insoluble nanofiber mats of synthetic polypeptides of defined composition have been prepared from fibers electrospun from aqueous solution in the absence of organic co-solvents. 20-50 kDa poly(L-glutamate, L-tyrosine) 4:1 (PLGY) but not 15-50 kDa or 50-100 kDa poly(L-glutamate) was spinnable at 20-55% (w/v) polymer in water. Applied voltage and needle-collector distance were crucial for spinnability. Attractive fibers were obtained at 50% polymer. Fiber diameter and mat morphology have been characterized by electron microscopy. Exposure of spun fiber mats to 1-ethyl-3-(3-dimethylaminopropyl) carbodiimide hydrochloride (EDC), which reacts with carboxylate, decreased fiber solubility. Fluorescein-conjugated poly(L-lysine) (FITC-PLL) but not the fluorophore alone was able bind PLGY fiber mats electrostatically, judging by fluorescence microscopy. Key advances of this work are the avoidance of an animal source of peptides and of an inorganic co-solvent to achieve polypeptide spinnability. Polypeptide fiber mats are a promising type of nano-structured biomaterial for applications in biomedicine and biotechnology.

  12. Synthetic cornea: biocompatibility and optics

    Science.gov (United States)

    Parel, Jean-Marie A.; Kaminski, Stefan; Fernandez, Viviana; Alfonso, E.; Lamar, Peggy; Lacombe, Emmanuel; Duchesne, Bernard; Dubovy, Sander; Manns, Fabrice; Rol, Pascal O.

    2002-06-01

    Purpose. Experimentally find a method to provide a safe surgical technique and an inexpensive and long lasting mesoplant for the restoration of vision in patients with bilateral corneal blindness due to ocular surface and stromal diseases. Methods. Identify the least invasive and the safest surgical technique for synthetic cornea implantation. Identify the most compatible biomaterials and the optimal shape a synthetic cornea must have to last a long time when implanted in vivo. Results. Penetrating procedures were deemed too invasive, time consuming, difficult and prone to long term complications. Therefore a non-penetrating delamination technique with central trephination was developed to preserve the integrity of Descemet's membrane and the anterior segment. Even though this approach limits the number of indications, it is acceptable since the majority of patients only have opacities in the stroma. The prosthesis was designed to fit in the removed tissue plane with its skirt fitted under the delaminated stroma. To improve retention, the trephination wall was made conical with the smallest opening on the anterior surface and a hat-shaped mesoplant was made to fit. The skirt was perforated in its perimeter to allow passage of nutrients and tissues ingrowths. To simplify the fabrication procedure, the haptic and optic were made of the same polymer. The intrastromal biocompatibility of several hydrogels was found superior to current clinically used PMMA and PTFE materials. Monobloc mesoplants made of 4 different materials were implanted in rabbits and followed weekly until extrusion occurred. Some remained optically clear allowing for fundus photography. Conclusions. Hydrogel synthetic corneas can be made to survive for periods longer than 1 year. ArF excimer laser photoablation studies are needed to determine the refractive correction potential of these mesoplants. A pilot FDA clinical trial is needed to assess the mesoplant efficacy and very long-term stability.

  13. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  14. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  15. To mitigate Black-hole attack with CBDS in MANET

    OpenAIRE

    Navjot; Er.Pooja Ran

    2015-01-01

    Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperati...

  16. The use of azide-alkyne click chemistry in recent syntheses and applications of polytriazole-based nanostructured polymers

    Science.gov (United States)

    Shi, Yi; Cao, Xiaosong; Gao, Haifeng

    2016-02-01

    The rapid development of efficient organic click coupling reactions has significantly facilitated the construction of synthetic polymers with sophisticated branched nanostructures. This Feature Article summarizes the recent progress in the application of efficient copper-catalyzed and copper-free azide-alkyne cycloaddition (CuAAC and CuFAAC) reactions in the syntheses of dendrimers, hyperbranched polymers, star polymers, graft polymers, molecular brushes, and cyclic graft polymers. Literature reports on the interesting properties and functions of these polytriazole-based nanostructured polymers are also discussed to illustrate their potential applications as self-healing polymers, adhesives, polymer catalysts, opto-electronic polymer materials and polymer carriers for drug and imaging molecules.

  17. Shoulder injuries from attacking motion

    Science.gov (United States)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  18. Photoaddressable Polymers

    Science.gov (United States)

    Bieringer, T.

    Polymers are the perfect materials for a variety of applications in almost every field of technical as well as human life. Because of their macromolecular architecture there are a lot of degrees of freedom in the synthesis of polymers. Owing to the change of their functional composition, they can be tailored even for quite difficult demands. Since a whole industry deals with the processing of polymers, cheap production lines have been developed for almost every polymer. This is the reason why not only the molecular composition but even the price of polymers has been optimized. Therefore these materials can be considered as encouraging components even in highly sophisticated areas of applications.

  19. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  20. Variable Synthetic Capacitance

    Science.gov (United States)

    Kleinberg, L. L.

    1986-01-01

    Feedback amplifier circuit synthesizes electronically variable capacitance. Variable Synthetic Capacitor is amplifier circuit with follower/feedback configuration. Effective input capacitance depends on input set current. If synthetic capacitor is connected across resonant element of oscillator, oscillator frequency controlled via input set current. Circuit especially suitable for fine frequency adjustments of piezoelectric-crystal or inductor/capacitor resonant oscillators.

  1. Conjugated Polymers for Energy Production

    DEFF Research Database (Denmark)

    Livi, Francesco

    This dissertation is aimed at developing materials for flexible, large area, ITO-free polymer solar cells (PSCs) fully printed under ambient conditions. A large screening of conjugated polymers, both novel and well-known materials, has been carried out in order to find suitable candidates...... for scalable PSCs fully printed under ambient conditions [Adv. Energy Mater. 2015, 5, 1402186]. PPDTBT resulted to be the conjugated polymer with the best photovoltaic performance within the 104 synthesized macromolecules. Therefore, further studies have been done on such material. The impact of side chain...... arylation (DAr) and direct arylation polymerization (DArP) have been applied to the preparation of PPDTBT, making this polymer readily available in only 4 synthetic steps and thus easily transferable to a large scale-production setup. DArP avoids organometallic species and therefore is an appealing...

  2. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  3. Attack Penetration System for SQL Injection

    Directory of Open Access Journals (Sweden)

    Manju Kaushik

    2014-06-01

    Full Text Available The SQL Injection attack is a popular way of attack in terms of document structure and common threats now a day. There are several ways of attack detection as per our study and also prevention methods had been discussed in several research papers. So the main motivation of our paper to penetrate the attack. For this we have proposed an efficient framework from which the central authority can control all the visited IP and restrict those IP. If the IP is in the restricted zone then the contents are restricted by using SQL update command with some status modification states. If the restricted IP wish to access the data from their credentials, it is immediately inform to the admin and the time of attack alert will be stored in the log area of that attack. Finally by comparison we will justify our results which are better in comparison to the previous test and methodology.

  4. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  5. Polímeros sintéticos biodegradáveis: matérias-primas e métodos de produção de micropartículas para uso em drug delivery e liberação controlada Biodegradable synthetic polymers: raw-materials and production methods of microparticles for drug delivery and controlled release

    Directory of Open Access Journals (Sweden)

    Patrícia Severino

    2011-01-01

    Full Text Available Micropartículas produzidas a partir de polímeros sintéticos têm sido amplamente utilizadas na área farmacêutica para encapsulação de princípios ativos. Essas micropartículas apresentam as vantagens de proteção do princípio ativo, mucoadesão e gastrorresistência, melhor biodisponibilidade e maior adesão do paciente ao tratamento. Além disso, utiliza menores quantidade de princípio ativo para obtenção do efeito terapêutico proporcionando diminuição dos efeitos adversos locais, sistêmicos e menor toxidade. Os polímeros sintéticos empregados na produção das micropartículas são classificados biodegradáveis ou não biodegradáveis, sendo os biodegradáveis mais utilizados por não necessitam ser removidos cirurgicamente após o término de sua ação. A produção das micropartículas poliméricas sintéticas para encapsulação tanto de ativos hidrofílicos quanto hidrofóbicos pode ser emulsificação por extração e/ou evaporação do solvente; coacervação; métodos mecânicos e estão revisados neste artigo evidenciando as vantagens, desvantagens e viabilidade de cada metodologia. A escolha da metodologia e do polímero sintético a serem empregados na produção desse sistema dependem da aplicação terapêutica requerida, bem como a simplicidade, reprodutibilidade e factibilidade do aumento de escala da produção.Microparticles produced from synthetic polymers have been widely used in the pharmaceutical field for encapsulation of drugs. These microparticles show several advantages such as drug protection, mucoadhesion, gastro-resistance, improved bioavailability and increased patient's compliance. In addition, it is possible to use lower amount of drug to achieve therapeutic efficiency with reduced local/systemic adverse side effects and low toxicity. Synthetic polymers used for the production of microparticles are classified as biodegradable or non-biodegradable, being the former more popular since these do

  6. SQL INJECTION ATTACK DETECTION AND PREVENTION

    OpenAIRE

    Dr. SUNITHA ABBURU; PERUMALSAMY RAMASAMY

    2012-01-01

    Nowadays SQL injection attacks (SQLIAs) and cross scripting increased in real web applications very much, and the SQL injection attacks damages the databases through web applications. Injection queries are different type of way to attack the databases. This paper address the issue of SQLIA’s and script in an efficient way. The proposed approach detects and prevents all the Injection queries as well as the cross scripting through the Framework and Static analysis and Dynamic analysis. The cont...

  7. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  8. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to...... properties of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  9. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  10. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  11. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  12. Synthetic Base Fluids

    Science.gov (United States)

    Brown, M.; Fotheringham, J. D.; Hoyes, T. J.; Mortier, R. M.; Orszulik, S. T.; Randles, S. J.; Stroud, P. M.

    The chemical nature and technology of the main synthetic lubricant base fluids is described, covering polyalphaolefins, alkylated aromatics, gas-to-liquid (GTL) base fluids, polybutenes, aliphatic diesters, polyolesters, polyalkylene glycols or PAGs and phosphate esters.Other synthetic lubricant base oils such as the silicones, borate esters, perfluoroethers and polyphenylene ethers are considered to have restricted applications due to either high cost or performance limitations and are not considered here.Each of the main synthetic base fluids is described for their chemical and physical properties, manufacture and production, their chemistry, key properties, applications and their implications when used in the environment.

  13. Synthetic biological networks

    International Nuclear Information System (INIS)

    Despite their obvious relationship and overlap, the field of physics is blessed with many insightful laws, while such laws are sadly absent in biology. Here we aim to discuss how the rise of a more recent field known as synthetic biology may allow us to more directly test hypotheses regarding the possible design principles of natural biological networks and systems. In particular, this review focuses on synthetic gene regulatory networks engineered to perform specific functions or exhibit particular dynamic behaviors. Advances in synthetic biology may set the stage to uncover the relationship of potential biological principles to those developed in physics. (review article)

  14. Synthetic cathinone abuse

    Directory of Open Access Journals (Sweden)

    Capriola M

    2013-07-01

    Full Text Available Michael Capriola Thomasville Medical Center, Thomasville, NC, USA Abstract: The abuse of synthetic cathinones, widely known as bath salts, has been increasing since the mid-2000s. These substances are derivatives of the naturally occurring compound cathinone, which is the primary psychoactive component of khat. The toxicity of synthetic cathinones includes significant sympathomimetic effects, as well as psychosis, agitation, aggression, and sometimes violent and bizarre behavior. Mephedrone and methylenedioxypyrovalerone are currently the predominantly abused synthetic cathinones. Keywords: designer drugs/chemistry, street drugs/pharmacology, substance-related disorders/epidemiology, alkaloids/poisoning

  15. Nanoscale Study of Polymer Dynamics.

    Science.gov (United States)

    Keshavarz, Masoumeh; Engelkamp, Hans; Xu, Jialiang; Braeken, Els; Otten, Matthijs B J; Uji-I, Hiroshi; Schwartz, Erik; Koepf, Matthieu; Vananroye, Anja; Vermant, Jan; Nolte, Roeland J M; De Schryver, Frans; Maan, Jan C; Hofkens, Johan; Christianen, Peter C M; Rowan, Alan E

    2016-01-26

    The thermal motion of polymer chains in a crowded environment is anisotropic and highly confined. Whereas theoretical and experimental progress has been made, typically only indirect evidence of polymer dynamics is obtained either from scattering or mechanical response. Toward a complete understanding of the complicated polymer dynamics in crowded media such as biological cells, it is of great importance to unravel the role of heterogeneity and molecular individualism. In the present work, we investigate the dynamics of synthetic polymers and the tube-like motion of individual chains using time-resolved fluorescence microscopy. A single fluorescently labeled polymer molecule is observed in a sea of unlabeled polymers, giving access to not only the dynamics of the probe chain itself but also to that of the surrounding network. We demonstrate that it is possible to extract the characteristic time constants and length scales in one experiment, providing a detailed understanding of polymer dynamics at the single chain level. The quantitative agreement with bulk rheology measurements is promising for using local probes to study heterogeneity in complex, crowded systems. PMID:26688072

  16. Liquid crystalline order in polymers

    CERN Document Server

    Blumstein, Alexandre

    1978-01-01

    Liquid Crystalline Order in Polymers examines the topic of liquid crystalline order in systems containing rigid synthetic macromolecular chains. Each chapter of the book provides a review of one important area of the field. Chapter 1 discusses scattering in polymer systems with liquid crystalline order. It also introduces the field of liquid crystals. Chapter 2 treats the origin of liquid crystalline order in macromolecules by describing the in-depth study of conformation of such macromolecules in their unassociated state. The chapters that follow describe successively the liquid crystalli

  17. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  18. Entangled Polymer Melts in Extensional Flow

    DEFF Research Database (Denmark)

    Hengeller, Ludovica

    Many commercial materials derived from synthetic polymers exhibit a complex response under different processing operations such as fiber formation, injection moulding,film blowing, film casting or coatings. They can be processed both in the solid or in the melted state. Often they may contain two...... or more different polymers in addition to additives, fillers or solvents in order to modify the properties of the final product. Usually, it is also desired to improve the processability. For example the supplement of a high molecular weight component improves the stability in elongational flows....... Understanding the behaviour of polymer melts and solutions in complex non-linearflows is crucial for the design of polymeric materials and polymer processes. Through rheological characterization, in shear and extensional flow, of model polymer systems,i.e. narrow molar mass distribution polymer melts...

  19. Controlled Synthesis of Polymer Brushes via Polymer Single Crystal Templates

    Science.gov (United States)

    Zhou, Tian

    A novel synthetic method of polymer brushes using polymer single crystals (PSCs) as solid-state templates is introduced in this study. PSC has a quasi-2D lamellae structure with polymer chains fold back-and-forth perpendicular to the lamellae surfaces. During crystallization, the chain ends are excluded from the unit cell onto the lamellae surfaces, which makes the material extremely versatile in its functionality. Such structure holds the unique capability to harvest nanoparticles, or being immobilized onto macroscopic flat surfaces. After dissolving PSCs in good solvent, polymer brushes are chemically tethered on either nanoparticles or flat macroscopic surfaces. Because the chain-folding structure can be conveniently tailored by changing the molecular weight of polymer and the crystallization temperature, the thickness, grafting density and morphology of resulted polymer brushes can be precisely controlled. As a model system, poly(?-caprolactone) with thiol or alkoxysilane terminal groups was used, and polymer brushes were successfully prepared on both nanoparticles and glass/Au flat surfaces. The structure-property relationships of the as-prepared polymer brushes were studied in detail using multiple characterization techniques. First of all, when functionalizing nanoparticles, by engineering the chain-folding structure of the PSCs, interesting complex nanostructures can be formed by nanoparticles including Janus nanoparticles and nanoparticle dimers. These unique structures render hybrid nanoparticles very interesting responsive behavior which have been studied in detail in this dissertation. When grafted onto a flat surface on the other hand, not only the molecular weight and grafting density can be precisely controlled, the tethering points of a single polymer chain can also be conveniently tailored, resulting polymer brushes with either tail or loop structures. Such difference in brush structure can significantly alter the properties of functional surface

  20. Polymer Chemistry

    Science.gov (United States)

    Williams, Martha; Roberson, Luke; Caraccio, Anne

    2010-01-01

    This viewgraph presentation describes new technologies in polymer and material chemistry that benefits NASA programs and missions. The topics include: 1) What are Polymers?; 2) History of Polymer Chemistry; 3) Composites/Materials Development at KSC; 4) Why Wiring; 5) Next Generation Wiring Materials; 6) Wire System Materials and Integration; 7) Self-Healing Wire Repair; 8) Smart Wiring Summary; 9) Fire and Polymers; 10) Aerogel Technology; 11) Aerogel Composites; 12) Aerogels for Oil Remediation; 13) KSC's Solution; 14) Chemochromic Hydrogen Sensors; 15) STS-130 and 131 Operations; 16) HyperPigment; 17) Antimicrobial Materials; 18) Conductive Inks Formulations for Multiple Applications; and 19) Testing and Processing Equipment.

  1. Bio-based and recycled polymers for cleaner production : an assessment of plastics and fibres

    NARCIS (Netherlands)

    Shen, L.

    2011-01-01

    Today, almost all man-made plastics and fibres are produced from synthetic polymers. Synthetic polymers, made from petroleum which took millions of years to form, have three sustainability challenges: (i) the limited fossil fuel resources, (ii) the environmental impacts caused by non-degradable plas

  2. An Integrated Laboratory Approach toward the Preparation of Conductive Poly(phenylene vinylene) Polymers

    Science.gov (United States)

    Knoerzer, Timm A.; Balaich, Gary J.; Miller, Hannah A.; Iacono, Scott T.

    2014-01-01

    Poly(phenylene vinylene) (PPV) represents an important class of conjugated, conducting polymers that have been readily exploited in the preparation of organic electronic materials. In this experiment, students prepare a PPV polymer via a facile multistep synthetic sequence with robust spectroscopic evaluation of synthetic intermediates and the…

  3. Building synthetic memory

    OpenAIRE

    Inniss, Mara C.; Silver, Pamela A.

    2013-01-01

    Cellular memory – conversion of a transient signal into a sustained response – is a common feature of biological systems. Synthetic biologists aim to understand and reengineer such systems in a reliable and predictable manner. Synthetic memory circuits have been designed and built in vitro and in vivo based on diverse mechanisms such as oligonucleotide hybridization, recombination, transcription, phosphorylation, and RNA editing. Thus far, building these circuits has helped us explore the bas...

  4. Synthetic biology and biosecurity.

    Science.gov (United States)

    Robienski, Jürgen; Simon, Jürgen

    2014-01-01

    This article discusses the conflict fields and legal questions of synthetic biology, esp. concerning biosecurity. A respective jurisprudential discussion has not taken place yet in Germany apart from few statements and recommendations. But in Germany, Europe and the USA, it is generally accepted that a broad discussion is necessary. This is esp. true for the question of biosecurity and the possible dangers arising from Synthetic Biology. PMID:25845204

  5. Synthetic Vision Systems

    Science.gov (United States)

    Prinzel, L.J.; Kramer, L.J.

    2009-01-01

    A synthetic vision system is an aircraft cockpit display technology that presents the visual environment external to the aircraft using computer-generated imagery in a manner analogous to how it would appear to the pilot if forward visibility were not restricted. The purpose of this chapter is to review the state of synthetic vision systems, and discuss selected human factors issues that should be considered when designing such displays.

  6. Electrospinning polymer blends for biomimetic scaffolds for ACL tissue engineering

    Science.gov (United States)

    Garcia, Vanessa Lizeth

    The anterior cruciate ligament (ACL) rupture is one of the most common knee injuries. Current ACL reconstructive strategies consist of using an autograft or an allograft to replace the ligament. However, limitations have led researchers to create tissue engineered grafts, known as scaffolds, through electrospinning. Scaffolds made of natural and synthetic polymer blends have the potential to promote cell adhesion while having strong mechanical properties. However, enzymes found in the knee are known to degrade tissues and affect the healing of intra-articular injuries. Results suggest that the natural polymers used in this study modify the thermal properties and tensile strength of the synthetic polymers when blended. Scanning electron microscopy display bead-free and enzyme biodegradability of the fibers. Raman spectroscopy confirms the presence of the natural and synthetic polymers in the scaffolds while, amino acid analysis present the types of amino acids and their concentrations found in the natural polymers.

  7. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  8. Cycloadditions in modern polymer chemistry.

    Science.gov (United States)

    Delaittre, Guillaume; Guimard, Nathalie K; Barner-Kowollik, Christopher

    2015-05-19

    Synthetic polymer chemistry has undergone two major developments in the last two decades. About 20 years ago, reversible-deactivation radical polymerization processes started to give access to a wide range of polymeric architectures made from an almost infinite reservoir of functional building blocks. A few years later, the concept of click chemistry revolutionized the way polymer chemists approached synthetic routes. Among the few reactions that could qualify as click, the copper-catalyzed azide-alkyne cycloaddition (CuAAC) initially stood out. Soon, many old and new reactions, including cycloadditions, would further enrich the synthetic macromolecular chemistry toolbox. Whether click or not, cycloadditions are in any case powerful tools for designing polymeric materials in a modular fashion, with a high level of functionality and, sometimes, responsiveness. Here, we wish to describe cycloaddition methodologies that have been reported in the last 10 years in the context of macromolecular engineering, with a focus on those developed in our laboratories. The overarching structure of this Account is based on the three most commonly encountered cycloaddition subclasses in organic and macromolecular chemistry: 1,3-dipolar cycloadditions, (hetero-)Diels-Alder cycloadditions ((H)DAC), and [2+2] cycloadditions. Our goal is to briefly describe the relevant reaction conditions, the advantages and disadvantages, and the realized polymer applications. Furthermore, the orthogonality of most of these reactions is highlighted because it has proven highly beneficial for generating unique, multifunctional polymers in a one-pot reaction. The overview on 1,3-dipolar cycloadditions is mostly centered on the application of CuAAC as the most travelled route, by far. Besides illustrating the capacity of CuAAC to generate complex polymeric architectures, alternative 1,3-dipolar cycloadditions operating without the need for a catalyst are described. In the area of (H)DA cycloadditions

  9. Triazolinediones as Highly Enabling Synthetic Tools.

    Science.gov (United States)

    De Bruycker, Kevin; Billiet, Stijn; Houck, Hannes A; Chattopadhyay, Subrata; Winne, Johan M; Du Prez, Filip E

    2016-03-23

    Triazolinediones (TADs) are unique reagents in organic synthesis that have also found wide applications in different research disciplines, in spite of their somewhat "exotic" reputation. In this review, we offer two case studies that demonstrate the possibilities of these versatile and reliable synthetic tools, namely, in the field of polymer science as well as in more recently emerging applications in the field of click chemistry. As the general use of triazolinediones has always been hampered by the limited commercial and synthetic availability of such reagents, we also offer a review of the available TAD reagents, together with a detailed discussion of their synthesis and reactivity. This review thus aims to serve as a practical guide for researchers that are interested in exploiting and further developing the exceptional click-like reactivity of triazolinediones in various applications. PMID:26900710

  10. Automated Detection System for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Dr K.V.N.Sunitha

    2010-10-01

    Full Text Available Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL Injection vulnerability (SQLIV, which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. The intent is that Web applications will limit the kinds of queries that can be generated to a safe subset of all possible queries, regardless of what input users provide. SQL Injection attacks are possible due to the design drawbacks of the web sites, which interact with back-end databases. Successful attacks may damage more. We introduce a system that deals with new automated technique for preventing SQLIA based on the novel concept of regular expressions is to detect SQL Injection attacks. The proposed system can detect the attacks that are from Internet and Insider Attacks, by analyzing the packets of the network servers.

  11. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    R.J.J.H. van Son

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  12. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  13. Polymer Synthesis and Organotransition Metal Chemistry

    Science.gov (United States)

    Grubbs, Robert H.; Tumas, William

    1989-02-01

    Mechanistic and synthetic studies in organometallic chemistry have provided considerable insight into olefin metathesis and Ziegler-Natta polymerization. New homogeneous olefin metathesis catalysts based on high oxidation state transition metals have opened new opportunities in polymer synthesis by providing unprecedented control in ring-opening polymerization of cyclic alkenes. The recent development of living coordinative polymerization systems has led to the preparation of a number of new, interesting materials, including block copolymers, conducting polymers or precursors, and ionophoric polymeric substrates.

  14. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  15. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  16. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  17. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  18. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  19. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  20. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  1. History of synthetic materials in alloplastic cranioplasty.

    Science.gov (United States)

    Harris, Dominic A; Fong, Abigail J; Buchanan, Edward P; Monson, Laura; Khechoyan, David; Lam, Sandi

    2014-04-01

    When faced with calvarial defects, surgeons have long searched for repair materials. General criteria include ease of use, low cost, availability, cosmetic shape, and osteointegrative potential. While autologous bone is widely used and favored in contemporary reconstructive procedures, synthetic alternatives have been used throughout history and are necessary in current practice for select cases when autograft reconstruction is not an option (such as cases with severe bony comminution, bone graft resorption, infection, and limited donor site options). For centuries, surgeons have experimented with metals, ceramics, plastics, and later, resorbable polymers. This paper provides a tour of the materials that have been used and experimented with throughout the history of alloplastic cranioplasty.

  2. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  3. Polymers & People

    Science.gov (United States)

    Lentz, Linda; Robinson, Thomas; Martin, Elizabeth; Miller, Mary; Ashburn, Norma

    2004-01-01

    Each Tuesday during the fall of 2002, teams of high school students from three South Carolina counties conducted a four-hour polymer institute for their peers. In less than two months, over 300 students visited the Charleston County Public Library in Charleston, South Carolina, to explore DNA, nylon, rubber, gluep, and other polymers. Teams of…

  4. Polymer Informatics

    Science.gov (United States)

    Adams, Nico

    Polymers are arguably the most important set of materials in common use. The increasing adoption of both combinatorial as well as high-throughput approaches, coupled with an increasing amount of interdisciplinarity, has wrought tremendous change in the field of polymer science. Yet the informatics tools required to support and further enhance these changes are almost completely absent. In the first part of the chapter, a critical analysis of the challenges facing modern polymer informatics is provided. It is argued, that most of the problems facing the field today are rooted in the current scholarly communication process and the way in which chemists and polymer scientists handle and publish data. Furthermore, the chapter reviews existing modes of representing and communicating polymer information and discusses the impact, which the emergence of semantic technologies will have on the way in which scientific and polymer data is published and transmitted. In the second part, a review of the use of informatics tools for the prediction of polymer properties and in silico design of polymers is offered.

  5. Research on First Attack Probability Model of an Attacker Level Bombing Anti-air Radars

    Institute of Scientific and Technical Information of China (English)

    LUO Peng-cheng; MU Fu-ling; ZHOU Jing-lun

    2007-01-01

    The paper mainly studies the first attack probability (FAP) of an attacker level bombing anti-air radars through analyzing the radiant point orientation and attack (RPOA) process of attackers. Firstly, the searching target process is analyzed, and a corresponding target finding model is brought forward. Secondly, the target approaching process is concretely analyzed when the attacker levelly bombs the anti-air radar, and a corresponding target approaching model is presented. Finally, a demonstration is given to analyze the major factors in the model and prove its validity.

  6. An Network Attack Modeling Method Based on MLL-AT

    Science.gov (United States)

    Fen, Yan; Xinchun, Yin; Hao, Huang

    In this paper, the method of modeling attack using attack tree is researched. The main goal is effectively using attack tree to model and express multi-stage network attacks. We expand and improve the traditional attack tree. The attack nodes in traditional attack tree are redefined, and the attack risk of leaf node is quantified. On those basis, the mentality and method of building MLL-AT (Multi-Level & Layer Attack Tree) are proposed. The improved attack tree can model attack more accurately, in particular to multi-stage network attacks. And the new model can also be used to evaluate system's risk, to distinguish between varying system security threat degrees caused by different attack sequences.

  7. Physiological and Chemical Investigations into Microbial Degradation of Synthetic Poly(cis-1,4-isoprene)

    OpenAIRE

    Bode, Helge B; Zeeck, Axel; Plückhahn, Kirsten; Jendrossek, Dieter

    2000-01-01

    Streptomyces coelicolor 1A and Pseudomonas citronellolis were able to degrade synthetic high-molecular-weight poly(cis-1,4-isoprene) and vulcanized natural rubber. Growth on the polymers was poor but significantly greater than that of the nondegrading strain Streptomyces lividans 1326 (control). Measurement of the molecular weight distribution of the polymer before and after degradation showed a time-dependent increase in low-molecular-weight polymer molecules for S. coelicolor 1A and P. citr...

  8. Synthesis of a Molecularly Imprinted Polymer for Dioxin

    Directory of Open Access Journals (Sweden)

    Magda Brattoli

    2006-08-01

    Full Text Available A molecularly imprinted polymer for recognising selectively 2,3,7,8-tetrachlorodibenzodioxin (TCDD was made by a new non-covalent method employing a“dummy” template. The proposed way represents a simplification of a synthetic schemeproposed by Lübke et al.[1] for covalent imprinting. Comparison of extraction yields of thenovel polymer, a non imprinted polymer and an imprinting polymer, prepared by theoriginal procedure demonstrates the binding capacity of the proposed polymer, which is inprinciple applicable to solid phase extraction (SPE of dioxin.

  9. Synthesis of regioregular pentacene-containing conjugated polymers

    KAUST Repository

    Okamoto, Toshihiro

    2011-01-01

    We report the synthesis and characterization of a new class of regioregular pentacene-containing conjugated polymers via our synthetic routes reported previously. We found that our regioregular pentacene polymers showed improved ordering than their regiorandom counterpart as well as ambipolar OFET performance. © 2011 The Royal Society of Chemistry.

  10. The response of healing corneal epithelium to grooved polymer surfaces.

    NARCIS (Netherlands)

    Evans, M.D.; McFarland, G.A.; Taylor, S.; Walboomers, X.F.

    2005-01-01

    Corneal epithelial wounds heal rapidly by the inwards growth of tissue with a contracting wound front. A synthetic polymer lens to correct refractive error (an implantable contact lens) could be incorporated into the cornea using this wound healing process. Topographical cues on the polymer surface

  11. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  12. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  13. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  14. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  15. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  16. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  17. Attack detection in unattended sensor networks

    Science.gov (United States)

    Wu, Curt; Monnier, Camille; Fry, Gerald; Girod, Lewis; Luke, Jahn

    2010-04-01

    Because sensor networks are often deployed in hostile environments where their security and integrity may be compromised, it is essential to maximize the reliability and trustworthiness of existing and envisioned sensor networks. During operations, the sensor network must be robust to deception, node compromise, and various other attacks, while maintaining the operator's situational awareness regarding the health and integrity of the system. To address these needs, we have designed a Framework to Ensure and Assess Trustworthiness in Sensor systems (FEATS) to identify attacks on sensor system integrity and inform the operator of sensor data trustworthiness. We have developed and validated unsupervised anomaly detection algorithms for sensor data captured from an experimental acoustic sensor platform under a number of attack scenarios. The platform, which contains four audio microphones, was exposed to two physical attacks (audio filtering and audio playback) as well as a live replay attack (replaying live audio data that is captured at a remote location), which is analogous to a wormhole attack in the routing layer. With our unsupervised learning algorithms, we were able to successfully identify the presence of various attacks.

  18. Bio-based and recycled polymers for cleaner production : an assessment of plastics and fibres

    OpenAIRE

    Shen, L.

    2011-01-01

    Today, almost all man-made plastics and fibres are produced from synthetic polymers. Synthetic polymers, made from petroleum which took millions of years to form, have three sustainability challenges: (i) the limited fossil fuel resources, (ii) the environmental impacts caused by non-degradable plastics waste, and (iii) greenhouse gas emissions caused by combusting fossil fuels. To tackle these sustainability challenges, two strategies have been proposed. First, use bio-based polymers to repl...

  19. Automated synthetic scene generation

    Science.gov (United States)

    Givens, Ryan N.

    Physics-based simulations generate synthetic imagery to help organizations anticipate system performance of proposed remote sensing systems. However, manually constructing synthetic scenes which are sophisticated enough to capture the complexity of real-world sites can take days to months depending on the size of the site and desired fidelity of the scene. This research, sponsored by the Air Force Research Laboratory's Sensors Directorate, successfully developed an automated approach to fuse high-resolution RGB imagery, lidar data, and hyperspectral imagery and then extract the necessary scene components. The method greatly reduces the time and money required to generate realistic synthetic scenes and developed new approaches to improve material identification using information from all three of the input datasets.

  20. Atomic Oxygen Erosion Yield Dependence Upon Texture Development in Polymers

    Science.gov (United States)

    Banks, Bruce A.; Loftus, Ryan J.; Miller, Sharon K.

    2016-01-01

    The atomic oxygen erosion yield (volume of a polymer that is lost due to oxidation per incident atom) of polymers is typically assumed to be reasonably constant with increasing fluence. However polymers containing ash or inorganic pigments, tend to have erosion yields that decrease with fluence due to an increasing presence of protective particles on the polymer surface. This paper investigates two additional possible causes for erosion yields of polymers that are dependent upon atomic oxygen. These are the development of surface texture which can cause the erosion yield to change with fluence due to changes in the aspect ratio of the surface texture that develops and polymer specific atomic oxygen interaction parameters. The surface texture development under directed hyperthermal attack produces higher aspect ratio surface texture than isotropic thermal energy atomic oxygen attack. The fluence dependence of erosion yields is documented for low Kapton H (DuPont, Wilmington, DE) effective fluences for a variety of polymers under directed hyperthermal and isotropic thermal energy attack.

  1. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  2. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  3. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  4. Synthetic guide star generation

    Science.gov (United States)

    Payne, Stephen A [Castro Valley, CA; Page, Ralph H [Castro Valley, CA; Ebbers, Christopher A [Livermore, CA; Beach, Raymond J [Livermore, CA

    2008-06-10

    A system for assisting in observing a celestial object and providing synthetic guide star generation. A lasing system provides radiation at a frequency at or near 938 nm and radiation at a frequency at or near 1583 nm. The lasing system includes a fiber laser operating between 880 nm and 960 nm and a fiber laser operating between 1524 nm and 1650 nm. A frequency-conversion system mixes the radiation and generates light at a frequency at or near 589 nm. A system directs the light at a frequency at or near 589 nm toward the celestial object and provides synthetic guide star generation.

  5. Synthetic Aperture Sequential Beamforming

    DEFF Research Database (Denmark)

    Kortbek, Jacob; Jensen, Jørgen Arendt; Gammelmark, Kim Løkke

    2008-01-01

    A synthetic aperture focusing (SAF) technique denoted Synthetic Aperture Sequential Beamforming (SASB) suitable for 2D and 3D imaging is presented. The technique differ from prior art of SAF in the sense that SAF is performed on pre-beamformed data contrary to channel data. The objective...... is stored. The second stage applies the focused image lines from the first stage as input data. The SASB method has been investigated using simulations in Field II and by off-line processing of data acquired with a commercial scanner. The performance of SASB with a static image object is compared with DRF...

  6. Who Is at Risk for a Heart Attack?

    Science.gov (United States)

    ... on Twitter. Who Is at Risk for a Heart Attack? Certain risk factors make it more likely that ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  7. CO2-stimulated diversiform deformations of polymer assemblies.

    Science.gov (United States)

    Yan, Qiang; Zhao, Yue

    2013-11-01

    Use of a given physiological stimulus to delicately deform polymer assemblies is a challenging topic. Here we develop synthetic block copolymers to construct a series of CO2-sensitive self-assembled nanostructures that can simulate controllable deformations of the organelles in different ways. By controlling the CO2 stimulation levels, one can modulate the size, shape, and morphology of the polymer aggregates, which is conducive to understanding the stimuli-triggered dynamic reshaping process of polymer assemblies in aqueous solution.

  8. Development of polymers for large scale roll-to-roll processing of polymer solar cells

    DEFF Research Database (Denmark)

    Carlé, Jon Eggert

    Development of polymers for large scale roll-to-roll processing of polymer solar cells Conjugated polymers potential to both absorb light and transport current as well as the perspective of low cost and large scale production has made these kinds of material attractive in solar cell research...... and how this affects the PSC parameters are presented. It is generally found that it is possible to synthetically control the absorption spectrum of conjugated polymer systems. One way to alter the spectrum is by incorporating alternating donor-acceptor motifs, resulting in an additional optical....... The research field of polymer solar cells (PSCs) is rapidly progressing along three lines: Improvement of efficiency and stability together with the introduction of large scale production methods. All three lines are explored in this work. The thesis describes low band gap polymers and why these are needed...

  9. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    OpenAIRE

    Patel, A K; Jaypalsinh. A. Gohil; D.T. Meva

    2010-01-01

    Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between commun...

  10. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  11. SQL INJECTION ATTACK DETECTION AND PREVENTION

    Directory of Open Access Journals (Sweden)

    Dr. SUNITHA ABBURU

    2012-04-01

    Full Text Available Nowadays SQL injection attacks (SQLIAs and cross scripting increased in real web applications very much, and the SQL injection attacks damages the databases through web applications. Injection queries are different type of way to attack the databases. This paper address the issue of SQLIA’s and script in an efficient way. The proposed approach detects and prevents all the Injection queries as well as the cross scripting through the Framework and Static analysis and Dynamic analysis. The contribution is twofold 1. SQL Injection AttackDetection and prevention 2. SQL Injection Reports. These techniques have been implemented in ASP.Net and SQL Server and tested by conducting various experiments and prove that the web applications and database is protected from scripting and SQL injection queries.

  12. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  13. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  14. Recovery of infrastructure networks after localised attacks

    Science.gov (United States)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  15. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  16. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  17. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  18. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  19. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  20. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  1. Karachi Commander Escapes Attack, 10 Dead

    Institute of Scientific and Technical Information of China (English)

    潘志强

    2004-01-01

    KARACHI: The army commander in the Pakistani city of Karachi narrowly① escaped assassination② yesterday when gunmen attacked his convoy③ with gunfire and a bomb, killing at least 10 and wounding his driver, officials said.

  2. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  3. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  4. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  5. Degradable vinyl polymers for biomedical applications

    Science.gov (United States)

    Delplace, Vianney; Nicolas, Julien

    2015-10-01

    Vinyl polymers have been the focus of intensive research over the past few decades and are attractive materials owing to their ease of synthesis and their broad diversity of architectures, compositions and functionalities. Their carbon-carbon backbones are extremely resistant to degradation, however, and this property limits their uses. Degradable polymers are an important field of research in polymer science and have been used in a wide range of applications spanning from (nano)medicine to microelectronics and environmental protection. The development of synthetic strategies to enable complete or partial degradation of vinyl polymers is, therefore, of great importance because it will offer new opportunities for the application of these materials. This Review captures the most recent and promising approaches to the design of degradable vinyl polymers and discusses the potential of these materials for biomedical applications.

  6. Synthetic Aperture Radar Interferometry

    Science.gov (United States)

    Rosen, P. A.; Hensley, S.; Joughin, I. R.; Li, F.; Madsen, S. N.; Rodriguez, E.; Goldstein, R. M.

    1998-01-01

    Synthetic aperture radar interferometry is an imaging technique for measuring the topography of a surface, its changes over time, and other changes in the detailed characteristics of the surface. This paper reviews the techniques of interferometry, systems and limitations, and applications in a rapidly growing area of science and engineering.

  7. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  8. CASE STUDY OF SQL INJECTION ATTACKS

    OpenAIRE

    Sonakshi*, Rakesh Kumar, Girdhar Gopal

    2016-01-01

    Today, most of the web applications are associated with database at back-end so there are possibilities of SQL injection attacks (SQLIA) on it. A number of preventive measures have also been discovered by various researchers to overcome this attack, but which measure is more convenient and provides fast access to application without compromising the security is also a major concern nowadays. This paper provides a clear distinction among different types of SQLIAs and how these can be performed...

  9. Textual Manipulation for SQL Injection Attacks

    OpenAIRE

    Hussein AlNabulsi; Izzat Alsmadi; Mohammad Al-Jarrah

    2013-01-01

    SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNOR...

  10. Panic Attack during Elective Gastrointestinal Endoscopy

    OpenAIRE

    Charalampos Mitsonis; Nikolaos Dimopoulos; Marianna Zavrou; Vassiliki Psarra; Christos Giofkos; Christos Fiorakis; Athanasios Dimitriadis; Dimitrios Valavanis; Eleni Vousoura; Iannis Zervas; Efstathios Papavassiliou

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatie...

  11. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  12. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  13. Two Improved Multiple-Differential Collision Attacks

    OpenAIRE

    An Wang; Liji Wu; Zongyue Wang; Xuexin Zheng; Man Chen; Jing Ma

    2014-01-01

    In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementat...

  14. Logical Modes of Attack in Argumentation Networks

    OpenAIRE

    Gabbay, Dov M.; Garcez, A. S. D. Avila

    2009-01-01

    This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the meta level to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, the...

  15. Chemical virology: Packing polymers in protein cages

    Science.gov (United States)

    Cornelissen, Jeroen J. L. M.

    2012-10-01

    The combination of addressable synthetic macromolecules with proteins of precise structure and function often leads to materials with unique properties, as is now shown by the efficient multi-site initiation of polymer growth inside the cavity of a virus capsid.

  16. Protein-polymer nanoreactors for medical applications

    OpenAIRE

    Palivan, C. G.; Fischer-Onaca, O.; Delcea, M.; Itel, F.; Meier, W

    2012-01-01

    Major challenges that confront nanoscience in medicine today include the development of efficacious therapies with minimum side effects, diagnostic methods featuring significantly higher sensitivities and selectivities, and personalized diagnostics and therapeutics for theragnostic approaches. With these goals in mind, combining biological molecules and synthetic carriers/templates, such as polymer supramolecular assemblies, represents a very promising strategy. In this critical review, we pr...

  17. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  18. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  19. Immunodiagnosis of parasitic diseases with synthetic peptides.

    Science.gov (United States)

    Noya, O; Patarroyo, M E; Guzmán, F; Alarcón de Noya, B

    2003-08-01

    Parasitic diseases remain as a major public health problem worldwide, not only based on their historically high morbidity and mortality rates, but also because risk factors associated with their transmission are increasing. Laboratory diagnosis and particularly immunodiagnosis is a basic tool for the demonstration, clinical management and control of these infections. Classically, the serological tests for the detection of antibodies or antigens are based on the use of crude and purified antigens. Synthetic peptides have opened a new field and perspectives, as the source of pure epitopes and molecules for diagnosis of malaria, Chagas' disease, leishmaniasis, schistosomiasis, hidatidosis, cysticercosis and fasciolosis based on the detection of antibodies and circulating antigens. Herein, are critically reviewed the relevant advances and applications of the synthetic peptides on immunodiagnosis of parasitic diseases. A variety of sequences, constructs (monomers, polymers, MAPs), immunological methods and samples have been used, demonstrating their diagnostic potential. However, in most parasitic infections it is necessary to use more than a single peptide in order to avoid the genetic restriction against certain epitopes, as well as to test them in well characteized groups of patients, in order to confirm their sensitivity and specificity. The concept of multidiagnosis with synthetic peptides, using a novel multi-dot blot assay is introduced. Finally, the chemical imitation of antigens, offers a tremendous posibilities in the diagnosis of parasitic infections in developing countries since this strategy is cheaper, simpler, reproducible, useful for large scale testing and in most cases, specific and sensitive. PMID:14529537

  20. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  1. Engineered Asymmetric Synthetic Vesicles

    Science.gov (United States)

    Lu, Li; Chiarot, Paul

    2013-11-01

    Synthetic vesicles are small, fluid-filled spheres that are enclosed by a bilayer of lipid molecules. They can be used as models for investigating membrane biology and as delivery vehicles for pharmaceuticals. In practice, it is difficult to simultaneously control membrane asymmetry, unilamellarity, vesicle size, vesicle-to-vesicle uniformity, and luminal content. Membrane asymmetry, where each leaflet of the bilayer is composed of different lipids, is of particular importance as it is a feature of most natural membranes. In this study, we leverage microfluidic technology to build asymmetric vesicles at high-throughput. We use the precise flow control offered by microfluidic devices to make highly uniform emulsions, with controlled internal content, that serve as templates to build the synthetic vesicles. Flow focusing, dielectrophoretic steering, and interfacial lipid self-assembly are critical procedures performed on-chip to produce the vesicles. Fluorescent and confocal microscopy are used to evaluate the vesicle characteristics.

  2. These Synthetic Times

    Institute of Scientific and Technical Information of China (English)

    KIT GILLET

    2008-01-01

    @@ Already slated to be one of the most important cultural events in the buildup to this summer's Olympic games, Synthetic Times-Media Art China 2008 will feature the works of more than 30 artists from around the world. Upwards of 40 media art installations will be exhibited in the National Art Museum of China alone, along with performances, workshops, presentations, and discussion panels focusing on the art works and the growth of media art as a discipline.

  3. Power analysis attacks revealing the secrets of smart cards

    CERN Document Server

    Mangard, Stefan; Popp, Thomas

    2008-01-01

    A comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. It discusses simple and differential power analysis as well as advanced techniques like template attacks.

  4. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  5. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  6. Engineering Polymer Informatics

    OpenAIRE

    Adams, Nico; Ryder, Jennifer; Jessop, David M; Corbett, Peter; Murray-Rust, Peter

    2007-01-01

    The poster describes a strategy of for the development of polymer informatics. In particular, the development of polymer markup language, a polymer ontology and natural language processing tools for polymer literature.

  7. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  8. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  9. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  10. Panic Attack during Elective Gastrointestinal Endoscopy.

    Science.gov (United States)

    Mitsonis, Charalampos; Dimopoulos, Nikolaos; Zavrou, Marianna; Psarra, Vassiliki; Giofkos, Christos; Fiorakis, Christos; Dimitriadis, Athanasios; Valavanis, Dimitrios; Vousoura, Eleni; Zervas, Iannis; Papavassiliou, Efstathios

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y). Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, P < 0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, P < 0.05). Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients. PMID:22007196

  11. Detecting and Localizing Wireless Network Attacks Techniques

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  12. Antimocrobial Polymer

    Energy Technology Data Exchange (ETDEWEB)

    McDonald, William F. (Utica, OH); Huang, Zhi-Heng (Walnut Creek, CA); Wright, Stacy C. (Columbus, GA)

    2005-09-06

    A polymeric composition having antimicrobial properties and a process for rendering the surface of a substrate antimicrobial are disclosed. The composition comprises a crosslinked chemical combination of (i) a polymer having amino group-containing side chains along a backbone forming the polymer, (ii) an antimicrobial agent selected from quaternary ammonium compounds, gentian violet compounds, substituted or unsubstituted phenols, biguanide compounds, iodine compounds, and mixtures thereof, and (iii) a crosslinking agent containing functional groups capable of reacting with the amino groups. In one embodiment, the polymer is a polyamide formed from a maleic anhydride or maleic acid ester monomer and alkylamines thereby producing a polyamide having amino substituted alkyl chains on one side of the polyamide backbone; the crosslinking agent is a phosphine having the general formula (A)3P wherein A is hydroxyalkyl; and the antimicrobial agent is chlorhexidine, dimethylchlorophenol, cetyl pyridinium chloride, gentian violet, triclosan, thymol, iodine, and mixtures thereof.

  13. Antimicrobial Polymer

    Energy Technology Data Exchange (ETDEWEB)

    McDonald, William F. (Utica, OH); Wright, Stacy C. (Flint, MI); Taylor, Andrew C. (Ann Arbor, MI)

    2004-09-28

    A polymeric composition having antimicrobial properties and a process for rendering the surface of a substrate antimicrobial are disclosed. The polymeric composition comprises a crosslinked chemical combination of (i) a polymer having amino group-containing side chains along a backbone forming the polymer, (ii) an antimicrobial agent selected from metals, metal alloys, metal salts, metal complexes and mixtures thereof, and (iii) a crosslinking agent containing functional groups capable of reacting with the amino groups. In one example embodiment, the polymer is a polyamide formed from a maleic anhydride or maleic acid ester monomer and alkylamines thereby producing a polyamide having amino substituted alkyl chains on one side of the polyamide backbone; the crosslinking agent is a phosphine having the general formula (A).sub.3 P wherein A is hydroxyalkyl; and the metallic antimicrobial agent is selected from chelated silver ions, silver metal, chelated copper ions, copper metal, chelated zinc ions, zinc metal and mixtures thereof.

  14. Use of complementary nucleobase-containing synthetic polymers to prepare complex self-assembled morphologies in water† †Electronic supplementary information (ESI) available: Characterization of monomers, polymers and particles: NMR, SEC, TEM, SAXS, and DLS. See DOI: 10.1039/c6py00263c Click here for additional data file.

    Science.gov (United States)

    Kang, Yan; Pitto-Barry, Anaïs; S. Rolph, Marianne; Hua, Zan; Hands-Portman, Ian; Kirby, Nigel

    2016-01-01

    Amphiphilic nucleobase-containing block copolymers with poly(oligo(ethylene glycol) methyl ether methacrylate) as the hydrophilic block and nucleobase-containing blocks as the hydrophobic segments were successfully synthesized using RAFT polymerization and then self-assembled via solvent switch in aqueous solutions. Effects of the common solvent on the resultant morphologies of the adenine (A) and thymine (T) homopolymers, and A/T copolymer blocks and blends were investigated. These studies highlighted that depending on the identity of the common solvent, DMF or DMSO, spherical micelles or bicontinuous micelles were obtained. We propose that this is due to the presence of A–T interactions playing a key role in the morphology and stability of the resultant nanoparticles, which resulted in a distinct system compared to individual adenine or thymine polymers. Finally, the effects of annealing on the self-assemblies were explored. It was found that annealing could lead to better-defined spherical micelles and induce a morphology transition from bicontinuous micelles to onion-like vesicles, which was considered to occur due to a structural rearrangement of complementary nucleobase interactions resulting from the annealing process. PMID:27358655

  15. Polymer architectures via mass spectrometry and hyphenated techniques: A review.

    Science.gov (United States)

    Crotty, Sarah; Gerişlioğlu, Selim; Endres, Kevin J; Wesdemiotis, Chrys; Schubert, Ulrich S

    2016-08-17

    This review covers the application of mass spectrometry (MS) and its hyphenated techniques to synthetic polymers of varying architectural complexities. The synthetic polymers are discussed as according to their architectural complexity from linear homopolymers and copolymers to stars, dendrimers, cyclic copolymers and other polymers. MS and tandem MS (MS/MS) has been extensively used for the analysis of synthetic polymers. However, the increase in structural or architectural complexity can result in analytical challenges that MS or MS/MS cannot overcome alone. Hyphenation to MS with different chromatographic techniques (2D × LC, SEC, HPLC etc.), utilization of other ionization methods (APCI, DESI etc.) and various mass analyzers (FT-ICR, quadrupole, time-of-flight, ion trap etc.) are applied to overcome these challenges and achieve more detailed structural characterizations of complex polymeric systems. In addition, computational methods (software: MassChrom2D, COCONUT, 2D maps etc.) have also reached polymer science to facilitate and accelerate data interpretation. Developments in technology and the comprehension of different polymer classes with diverse architectures have significantly improved, which allow for smart polymer designs to be examined and advanced. We present specific examples covering diverse analytical aspects as well as forthcoming prospects in polymer science. PMID:27286765

  16. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    Directory of Open Access Journals (Sweden)

    A.K. Patel

    2010-05-01

    Full Text Available Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between communicating Access Points to prevent Rouge Access Points from masquerading as false neighbours. Our defense greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.

  17. Polymer Materials

    Institute of Scientific and Technical Information of China (English)

    Charles C. Han; DONG Jinyong; NIU Hui; CHENG He; HUANG Ye; ZHENG Jianfen; XU Shanshan

    2011-01-01

    @@ Since the second half of the 20th century, polymer materials have already become an essential part of our daily life.The use of polymeric materials has already exceeded that of metals and ceramics in terms of volume and is intimately connected to our clothing, food, household use, transportation, and medical needs.Meanwhile it also brought some recycle and environmental problems.In the 21 st century, human beings are facing ever increasing challenges on environmental protection, energy shortage, and health-medical problems, which have made even higher demand on polymer materials due to its light weight, flexibility and high functionality.

  18. Polymer electronics

    CERN Document Server

    Geoghegan, Mark

    2013-01-01

    Polymer electronics is the science behind many important new developments in technology, such as the flexible electronic display (e-ink) and many new developments in transistor technology. Solar cells, light-emitting diodes, and transistors are all areas where plastic electronics is likely to, or is already having, a serious impact on our daily lives. With polymer transistors and light-emitting diodes now being commercialised, there is a clear need for a pedagogic text thatdiscusses the subject in a clear and concise fashion suitable for senior undergraduate and graduate students. The content

  19. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  20. Viscoelasticity and primitive path analysis of entangled polymer liquids: From f-actin to polyethylene

    OpenAIRE

    Uchida, Nariya; Grest, Gary S.; Everaers, Ralf

    2007-01-01

    We combine computer simulations and scaling arguments to develop a unified view of polymer entanglement based on the primitive path analysis (PPA) of the microscopic topological state. Our results agree with experimentally measured plateau moduli for three different polymer classes over a wide rangeof reduced polymer densities: (i) semi-dilute theta solutions of synthetic polymers, (ii) the corresponding dense melts above the glass transition or crystallization temperature, and (iii) solution...

  1. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  2. Early Detection of SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hossain Shahriar

    2013-07-01

    Full Text Available SQL Injection (SQLI is a common vulnerability found in web applications.The starting point of SQLIattack is the client-side (browser. If attack inputs can be detected early at the browse side, then it could bethwarted early by not forwarding the malicious inputs to the server-side for further processing.This paperpresents a client-side approach to detect SQLI attacks1. The client-side accepts shadow SQL queries fromthe server-side and checks any deviation betweenshadow queries with dynamic queries generated withuser supplied inputs. We measure the deviation of shadow query and dynamic query based on conditionalentropy metrics and propose four metrics in this direction. We evaluate the approach with three PHPapplications containing SQLI vulnerabilities. The evaluation results indicate that our approach can detectwell-known SQLI attacks early at the client-side and impose negligible overhead.

  3. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  4. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria;

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  5. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    , localisation services and many others. These technologies can be classified under the name of ubiquitous systems. The term Ubiquitous System dates back to 1991 when Mark Weiser at Xerox PARC Lab first referred to it in writing. He envisioned a future where computing technologies would have been melted...... in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  6. Synthetic lubricants and high-performance functional fluids

    CERN Document Server

    Rudnick, Leslie R

    1999-01-01

    Offers state-of-the-art information on all the major synthetic fluids, describing established products as well as highly promising experimental fluids with commercial potential. This second edition contains chapters on polyinternalolefins, polymer esters, refrigeration lubes, polyphenyl ethers, highly refined mineral oils, automotive gear oils and industrial gear oils. The book also assesses automotive, industrial, aerospace, environmental, and commercial trends in Europe, Asia, South America, and the US.

  7. Quantifying Public Response towards Islam on Twitter after Paris Attacks

    OpenAIRE

    Magdy, Walid; Darwish, Kareem; Abokhodair, Norah

    2015-01-01

    The Paris terrorist attacks occurred on November 13, 2015 prompted a massive response on social media including Twitter, with millions of posted tweets in the first few hours after the attacks. Most of the tweets were condemning the attacks and showing support to Parisians. One of the trending debates related to the attacks concerned possible association between terrorism and Islam and Muslims in general. This created a global discussion between those attacking and those defending Islam and M...

  8. Defeating pharming attacks at the client-side

    OpenAIRE

    Gastellier-Prevost, Sophie; LAURENT, Maryline

    2011-01-01

    International audience With the deployment of "always-connected" broadband Internet access, personal networks are a privileged target for attackers and DNS-based corruption. Pharming attacks - an enhanced version of phishing attacks - aim to steal users' credentials by redirecting them to a fraudulent login website, using DNS-based techniques that make the attack imperceptible to the end-user. In this paper, we define an advanced approach to alert the end-user in case of pharming attacks a...

  9. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    Science.gov (United States)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  10. Resistance of the double random phase encryption against various attacks.

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-01

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  11. Molecularly Imprinted Polymers: synthetic receptors for diagnostic medical devices

    OpenAIRE

    Peeters, Marloes

    2013-01-01

    Irritable Bowel Syndrome (IBS) is a functional bowel disorder which is characterized by abdominal pain and changes in bowel habit. It has a profound negative impact on the quality of a patient’s life and is associated with more than €20 billion of indirect and direct medial costs per year. Most IBS therapies are based on relief of the symptoms, since the organic cause of the disease remains largely unknown. Recently, the involvement of biogenic amines such as serotonin and histamine has been ...

  12. Biomolecular conjugation inside synthetic polymer nanopores viaglycoprotein-lectin interactions

    Science.gov (United States)

    Ali, Mubarak; Ramirez, Patricio; Tahir, Muhammad Nawaz; Mafe, Salvador; Siwy, Zuzanna; Neumann, Reinhard; Tremel, Wolfgang; Ensinger, Wolfgang

    2011-04-01

    We demonstrate the supramolecular bioconjugation of concanavalin A (Con A) protein with glycoenzymehorseradish peroxidase (HRP) inside single nanopores, fabricated in heavy ion tracked polymermembranes. Firstly, the HRP-enzyme was covalently immobilized on the inner wall of the pores using carbodiimide coupling chemistry. The immobilized HRP-enzyme molecules bear sugar (mannose) groups available for the binding of Con A protein. Secondly, the bioconjugation of Con A on the pore wall was achieved through its biospecific interactions with the mannose residues of the HRP enzyme. The immobilization of biomolecules inside the nanopore leads to the reduction of the available area for ionic transport, and this blocking effect can be exploited to tune the conductance and selectivity of the nanopore in aqueous solution. Both cylindrical and conical nanopores were used in the experiments. The possibility of obtaining two or more conductance states (output), dictated by the degree of nanopore blocking resulted from the different biomolecules in solution (input), as well as the current rectification properties obtained with the conical nanopore, could also allow implementing information processing at the nanometre scale. Model simulations based on the transport equations further verify the feasibility of the sensing procedure that involves concepts from supramolecular chemistry, molecular imprinting, recognition, and nanotechnology.

  13. Hylotrupes bajulus (L. (Col., Cerambycidae: nutrition and attacked material

    Directory of Open Access Journals (Sweden)

    Chiappini, E

    2010-09-01

    Full Text Available Hylotrupes bajulus, attacks softwood utilising the cellulose contained in wood walls as food. The fibre is digested in variable percentages, depending on the type of analysis, 20 to 48% and, according to some authors, without the assistance of intestinal symbiotic microorganisms. Furthermore, there is published work referring to Hylotrupes, concluding that "starch” … “plays no role in the nutrition of the larvae". Nevertheless, considering that attacks of this species decrease with wood seasoning increasing and having been demonstrated, and that “lignin degradation products of spruce wood do not influence larvae development”, it is possible to suppose that cell walls alone are not sufficient to feed this wood boring species. Furthermore, Hylotrupes larvae have chisel shaped mandibles, similar to those of powder post beetle larvae that feed on starch and need to pulverise the wood to access the cellular content. Preliminary research suggests an utilization of wood fibre as well as of starch by larvae of H. bajulus. Therefore, the purpose of this research is to test the degree of digestion of wood fibre from different sources (sapwood or heartwood and the possible role of symbiotic microorganisms. Larvae of H. bajulus were grown on synthetic diets made of purified wood fibre and/or starch as main components supplied with mineral and vitamin. Substrates and frass were analysed for fibre fractions, starch and acid insoluble ash, the latter used as an indigestible marker. Larvae purified DNA was analysed by means of metagenomics approaches carried out by direct retrieval and analysis of 16S rRNA gene sequences free of cultural bias in order to discover the bacterial diversity from larva alimentary channel alone. Larvae of H. bajulus seem be able to digest either fibre or starch, and a role for symbiotic bacteria is supposed.

  14. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  15. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  16. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  17. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  18. Fast Collision Attack on MD5

    OpenAIRE

    Stevens, Marc

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfill restrictions to properly rotate the differentials in the first round. We will present a new algorithm to find the first block and we will use an algorithm of Klima to find the second block. To o...

  19. Rational design and synthesis of semi-conducting polymers.

    Energy Technology Data Exchange (ETDEWEB)

    Wong, Bryan Matthew; Reeder, Craig; Cordaro, Joseph Gabriel

    2010-12-01

    A rational approach was used to design polymeric materials for thin-film electronics applications, whereby theoretical modeling was used to determine synthetic targets. Time-dependent density functional theory calculations were used as a tool to predict the electrical properties of conjugated polymer systems. From these results, polymers with desirable energy levels and band-gaps were designed and synthesized. Measurements of optoelectronic properties were performed on the synthesized polymers and the results were compared to those of the theoretical model. From this work, the efficacy of the model was evaluated and new target polymers were identified.

  20. Polymer Science.

    Science.gov (United States)

    Frank, Curtis W.

    1979-01-01

    Described is a series of four graduate level courses in polymer science, offered or currently in preparation, at Stanford University. Course descriptions and a list of required and recommended texts are included. Detailed course outlines for two of the courses are presented. (BT)

  1. Polymer physics

    CERN Document Server

    Gedde, Ulf W

    1999-01-01

    This book is the result of my teaching efforts during the last ten years at the Royal Institute of Technology. The purpose is to present the subject of polymer physics for undergraduate and graduate students, to focus the fundamental aspects of the subject and to show the link between experiments and theory. The intention is not to present a compilation of the currently available literature on the subject. Very few reference citations have thus been made. Each chapter has essentially the same structure: starling with an introduction, continuing with the actual subject, summarizing the chapter in 30D-500 words, and finally presenting problems and a list of relevant references for the reader. The solutions to the problems presented in Chapters 1-12 are given in Chapter 13. The theme of the book is essentially polymer science, with the exclusion of that part dealing directly with chemical reactions. The fundamentals in polymer science, including some basic polymer chemistry, are presented as an introduction in t...

  2. CASH vs. SYNTHETIC CDOs

    Directory of Open Access Journals (Sweden)

    Silviu Eduard Dinca

    2016-01-01

    Full Text Available During the past few years, in the recent post-crisis aftermath, global asset managers are constantly searching new ways to optimize their investment portfolios while financial and banking institutions around the world are exploring new alternatives to better secure their financing and refinancing demands altogether with the enhancement of their risk management capabilities. We will exhibit herewith a comparison between the true-sale and synthetic CDO securitizations as financial markets-based funding, investment and risks mitigation techniques, highlighting certain key structuring and implementation specifics on each of them.

  3. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    OpenAIRE

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (200...

  4. Polymer/Silicate Nanocomposites Developed for Improved Thermal Stability and Barrier Properties

    Science.gov (United States)

    Campbell, Sandi G.

    2001-01-01

    The nanoscale reinforcement of polymers is becoming an attractive means of improving the properties and stability of polymers. Polymer-silicate nanocomposites are a relatively new class of materials with phase dimensions typically on the order of a few nanometers. Because of their nanometer-size features, nanocomposites possess unique properties typically not shared by more conventional composites. Polymer-layered silicate nanocomposites can attain a certain degree of stiffness, strength, and barrier properties with far less ceramic content than comparable glass- or mineral-reinforced polymers. Reinforcement of existing and new polyimides by this method offers an opportunity to greatly improve existing polymer properties without altering current synthetic or processing procedures.

  5. The structural diversity of artificial genetic polymers.

    Science.gov (United States)

    Anosova, Irina; Kowal, Ewa A; Dunn, Matthew R; Chaput, John C; Van Horn, Wade D; Egli, Martin

    2016-02-18

    Synthetic genetics is a subdiscipline of synthetic biology that aims to develop artificial genetic polymers (also referred to as xeno-nucleic acids or XNAs) that can replicate in vitro and eventually in model cellular organisms. This field of science combines organic chemistry with polymerase engineering to create alternative forms of DNA that can store genetic information and evolve in response to external stimuli. Practitioners of synthetic genetics postulate that XNA could be used to safeguard synthetic biology organisms by storing genetic information in orthogonal chromosomes. XNA polymers are also under active investigation as a source of nuclease resistant affinity reagents (aptamers) and catalysts (xenozymes) with practical applications in disease diagnosis and treatment. In this review, we provide a structural perspective on known antiparallel duplex structures in which at least one strand of the Watson-Crick duplex is composed entirely of XNA. Currently, only a handful of XNA structures have been archived in the Protein Data Bank as compared to the more than 100 000 structures that are now available. Given the growing interest in xenobiology projects, we chose to compare the structural features of XNA polymers and discuss their potential to access new regions of nucleic acid fold space. PMID:26673703

  6. Polymer Therapeutics in Relation to Dentistry.

    Science.gov (United States)

    Rojo, Luis; Deb, Sanjukta

    2015-01-01

    The successful clinical application arising from advances in polymer and macromolecular sciences in different fields of medicine has opened new explorative approaches for the future design and development of the ever more sophisticated bio-/nanotechnologies that are needed to realise the full potential of modern dentistry. In this chapter, the most recent polymer therapeutic approaches for alveolar ridge augmentation, bone grafts, periodontal disease, restorative materials and scaffolds or carriers for cell-based therapies are presented highlighting the potential of either synthetic or natural polymers, such as polyesters, polyolefins, polyacrylates or chitosan for example, being tailored and engineered to yield a range of properties valuable in the design and development of dental polymer therapeutics. PMID:26201272

  7. Analog synthetic biology.

    Science.gov (United States)

    Sarpeshkar, R

    2014-03-28

    We analyse the pros and cons of analog versus digital computation in living cells. Our analysis is based on fundamental laws of noise in gene and protein expression, which set limits on the energy, time, space, molecular count and part-count resources needed to compute at a given level of precision. We conclude that analog computation is significantly more efficient in its use of resources than deterministic digital computation even at relatively high levels of precision in the cell. Based on this analysis, we conclude that synthetic biology must use analog, collective analog, probabilistic and hybrid analog-digital computational approaches; otherwise, even relatively simple synthetic computations in cells such as addition will exceed energy and molecular-count budgets. We present schematics for efficiently representing analog DNA-protein computation in cells. Analog electronic flow in subthreshold transistors and analog molecular flux in chemical reactions obey Boltzmann exponential laws of thermodynamics and are described by astoundingly similar logarithmic electrochemical potentials. Therefore, cytomorphic circuits can help to map circuit designs between electronic and biochemical domains. We review recent work that uses positive-feedback linearization circuits to architect wide-dynamic-range logarithmic analog computation in Escherichia coli using three transcription factors, nearly two orders of magnitude more efficient in parts than prior digital implementations. PMID:24567476

  8. Cryptographic Attacks and Countermeasures - A Mathematical View

    OpenAIRE

    Canright, David; Stanica, Pantelimon

    2009-01-01

    2009 CyberSecurity Summit, Naval Postgraduate School 1st NPS Cyber Summit was held at the Naval Postgraduate School in Monterey, California on October 29, 2009. Sessions were held on the following topics: security requirements, Kerchkoffs' principle, mathematics of cybersecurity, the data encryption standard, nonlinear equations, Cyber attacks on Bluetooth EQ, Crypto properties of S-boxes.

  9. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  10. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with…

  11. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  12. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  13. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  14. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  15. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  16. The diagnosis of transient ischemic attacks

    NARCIS (Netherlands)

    P.J. Koudstaal (Peter Jan)

    1989-01-01

    textabstractThe diagnosis of transient ischemic attack (TIA) is fraught with difficulty, since the diagnosis rests entirely upon the history of the patient's symptoms and the neurologist's skill in questioning the patient. The aim of this thesis is to investigate various measures to improve the reli

  17. Persistent cognitive impairment after transient ischemic attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.; Duijnhoven, D.A. van; Leeuw, F.E. de; Kessels, R.P.; Dijk, E.J. van

    2014-01-01

    BACKGROUND AND PURPOSE: By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whe

  18. Persistent Cognitive Impairment After Transient Ischemic Attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.M.M.; Duijnhoven, D.A. van; de Leeuw, F.E.; Kessels, R.P.C.; Dijk, E.J. van

    2014-01-01

    Background and Purpose—By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whet

  19. Synthetic biology: Understanding biological design from synthetic circuits

    OpenAIRE

    Mukherji, Shankar; van Oudenaarden, Alexander

    2009-01-01

    An important aim of synthetic biology is to uncover the design principles of natural biological systems through the rational design of gene and protein circuits. Here, we highlight how the process of engineering biological systems — from synthetic promoters to the control of cell–cell interactions — has contributed to our understanding of how endogenous systems are put together and function. Synthetic biological devices allow us to grasp intuitively the ranges of behaviour generated by simple...

  20. NEXAFS imaging of synthetic organic materials

    Directory of Open Access Journals (Sweden)

    Ben Watts

    2012-04-01

    Full Text Available The utilization of near edge x-ray absorption fine structure spectroscopy (NEXAFS in achieving strong, novel contrast for soft x-ray microscopy and scattering methods has been afforded significant success in elucidating outstanding issues in organic materials systems due to the unique combination of high sensitivity to chemical functionality and thus composition, moderately high spatial resolution and moderate radiation damage. We illustrate the basic operating principles of NEXAFS spectroscopy, scanning transmission x-ray microscopy, and resonant soft x-ray scattering, and exemplify the impact by discussing a few recent applications. The focus of this perspective will be the characterization of synthetic organic materials, with a further emphasis on applications involving semi-conducting polymers. We also provide a brief perspective of future instrument and method developments.

  1. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.;

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  2. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  3. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  4. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... that helps in structuring attack identification and can integrate physical, virtual, and social components. These models form a solid basis for guiding the manual identification of attack scenarios. Their main benefit, however, is in the analytic generation of attacks. In this work we present a systematic...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  5. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  6. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim. PMID:16936505

  7. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  8. Synthetic growth reference charts.

    Science.gov (United States)

    Hermanussen, M; Burmeister, J

    1999-08-01

    Distance standards of height (growth charts) tend to get out of date and must be actualized from time to time. The aim of the present meta-analysis was to investigate characteristics of the cross sectional incremental pattern of body stature, evaluating the possibility of generating distance standards of height without the need for extensive de novo measurements. In view of the differences in growth in early and late childhood, we divided the total period of child development into the period between birth and the age of 6y, and between 6 and early adulthood (15y in females, 18 y in males). With respect to birth length, we meta-analysed 50 European and US American growth studies; with respect to growth in early childhood, 14 studies were analysed; and with respect to growth in late childhood, we meta-analysed 40 male and 51 female growth studies, from 14 European countries and the USA. Variations in body stature were meta-analysed in very large data samples, including the 1992 German birth cohort with more than 500 000 measurements of newborns, 10 000 measurements of 2-y-old German children, more than 500 000 measurements of German school children, and 6 large growth surveys of Japan and Czechoslovakia, with altogether more than 24 000 000 measurements. We found a rigid pattern of cross sectional body stature increment between birth and early adulthood that could be expressed by age-specific linear regression coefficients. Body stature was found to be related between sexes. Male birth length correlated with female length (r = 0.933, p < 0.001, slope = 4.62, intercept = 0.89), stature of 6-y-old boys correlated with stature of 6-y-old girls (r = 0.96, p < 0.001, slope = 1.05, intercept= -6.75), and stature of 18-y-old boys correlated with stature of 15-y-old girls (r=0.96, p < 0.001, slope = 0.90, intercept = 2.85). The developmental pace was also strongly related in both sexes. In conclusion, age-specific linear regression coefficients can be utilized synthetically

  9. Fiber-reinforced polymer concrete: Property improvement by gamma irradiation

    Energy Technology Data Exchange (ETDEWEB)

    Martinez B, G. [Laboratorio de Investigacion y Desarrollo de Materiales Avanzados, Facultad de Quimica, Universidad Autonoma del Estado de Mexico, Km. 12 Carretera Toluca-Atlacomulco, San Cayetano 50200, Estado de Mexico (Mexico); Brostow, W. [Laboratory of Advanced Polymers and Optimized Materials, Department of Materials Science and Engineering, University of North Texas, Denton TX 76203-5310 (United States)], e-mail: gonzomartinez02@yahoo.com.mx

    2009-07-01

    Polymer concrete (PC) is a particulate composite in which a thermoset resin forms a polymeric matrix and binds inorganic aggregates (dispersed particles of strengthening phases). This in contrast to Portland cement concrete (PCC) in which the binding is a result of interaction of cement with water. Adding polymeric materials to the concrete one can obtain high compressive and flexural strength, high impact and abrasion resistance, lower weight and lower costs. Moreover, PC is a very good repair material for structure elements damaged by trapping water inside the structure and by acid attacks which take place in the PCC. In the present chapter we discuss uses of polymer concrete and the importance of using gamma radiation as a novel technology for manufacturing fiber-reinforced polymer concrete. Our technology is different from the costly and time consuming current procedures such as chemical attack or thermal treatment. (Author)

  10. Synthetic biology and genetic causation.

    Science.gov (United States)

    Oftedal, Gry; Parkkinen, Veli-Pekka

    2013-06-01

    Synthetic biology research is often described in terms of programming cells through the introduction of synthetic genes. Genetic material is seemingly attributed with a high level of causal responsibility. We discuss genetic causation in synthetic biology and distinguish three gene concepts differing in their assumptions of genetic control. We argue that synthetic biology generally employs a difference-making approach to establishing genetic causes, and that this approach does not commit to a specific notion of genetic program or genetic control. Still, we suggest that a strong program concept of genetic material can be used as a successful heuristic in certain areas of synthetic biology. Its application requires control of causal context, and may stand in need of a modular decomposition of the target system. We relate different modularity concepts to the discussion of genetic causation and point to possible advantages of and important limitations to seeking modularity in synthetic biology systems. PMID:23591049

  11. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  12. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  13. Synthetic circuits, devices and modules

    OpenAIRE

    Zhang, Hong; Jiang, Taijiao

    2010-01-01

    The aim of synthetic biology is to design artificial biological systems for novel applications. From an engineering perspective, construction of biological systems of defined functionality in a hierarchical way is fundamental to this emerging field. Here, we highlight some current advances on design of several basic building blocks in synthetic biology including the artificial gene control elements, synthetic circuits and their assemblies into devices and modules. Such engineered basic buildi...

  14. Synthetic Biology for Therapeutic Applications

    OpenAIRE

    Abil, Zhanar; Xiong, Xiong; Zhao, Huimin

    2014-01-01

    Synthetic biology is a relatively new field with the key aim of designing and constructing biological systems with novel functionalities. Today, synthetic biology devices are making their first steps in contributing new solutions to a number of biomedical challenges, such as emerging bacterial antibiotic resistance and cancer therapy. This review discusses some synthetic biology approaches and applications that were recently used in disease mechanism investigation and disease modeling, drug d...

  15. Synthetic antibiofilm peptides.

    Science.gov (United States)

    de la Fuente-Núñez, César; Cardoso, Marlon Henrique; de Souza Cândido, Elizabete; Franco, Octavio Luiz; Hancock, Robert E W

    2016-05-01

    Bacteria predominantly exist as multicellular aggregates known as biofilms that are associated with at least two thirds of all infections and exhibit increased adaptive resistance to conventional antibiotic therapies. Therefore, biofilms are major contributors to the global health problem of antibiotic resistance, and novel approaches to counter them are urgently needed. Small molecules of the innate immune system called host defense peptides (HDPs) have emerged as promising templates for the design of potent, broad-spectrum antibiofilm agents. Here, we review recent developments in the new field of synthetic antibiofilm peptides, including mechanistic insights, synergistic interactions with available antibiotics, and their potential as novel antimicrobials against persistent infections caused by biofilms. This article is part of a Special Issue entitled: Antimicrobial peptides edited by Karl Lohner and Kai Hilpert. PMID:26724202

  16. Synthetic Aperture Ultrasound Imaging

    DEFF Research Database (Denmark)

    Jensen, Jørgen Arendt; Nikolov, Svetoslav; Gammelmark, Kim Løkke;

    2006-01-01

    The paper describes the use of synthetic aperture (SA) imaging in medical ultrasound. SA imaging is a radical break with today's commercial systems, where the image is acquired sequentially one image line at a time. This puts a strict limit on the frame rate and the possibility of acquiring...... of SA imaging. Due to the complete data set, it is possible to have both dynamic transmit and receive focusing to improve contrast and resolution. It is also possible to improve penetration depth by employing codes during ultrasound transmission. Data sets for vector flow imaging can be acquired using...... short imaging sequences, whereby both the correct velocity magnitude and angle can be estimated. A number of examples of both phantom and in-vivo SA images will be presented measured by the experimental ultrasound scanner RASMUS to demonstrate the many benefits of SA imaging....

  17. Molecularly imprinted polymers: synthesis and characterisation.

    Science.gov (United States)

    Cormack, Peter A G; Elorza, Amaia Zurutuza

    2004-05-01

    This short review aims to present, in clear English, a summary of the principal synthetic considerations pertaining to good practice in the polymerisation aspects of molecular imprinting, and is primarily aimed at researchers familiar with molecular imprinting methods but with little or no prior experience in polymer synthesis. It is our hope that this will facilitate researchers to plan their own syntheses of molecular imprints in a more logical and structured fashion, and to begin to appreciate the limitations of the present synthetic approaches in this molecularly complex area, as well as the scope for rationally designing improved imprinted materials in the future.

  18. Life after the synthetic cell

    DEFF Research Database (Denmark)

    Rasmussen, Steen

    2010-01-01

    Nature asked eight synthetic-biology experts about the implications for science and society of the “synthetic cell” made by the J. Craig Venter Institute (JCVI). The institute's team assembled, modified and implanted a synthesized genome into a DNA-free bacterial shell to make a self-replicating ......Nature asked eight synthetic-biology experts about the implications for science and society of the “synthetic cell” made by the J. Craig Venter Institute (JCVI). The institute's team assembled, modified and implanted a synthesized genome into a DNA-free bacterial shell to make a self...

  19. Compartmentalization and Transport in Synthetic Vesicles

    Directory of Open Access Journals (Sweden)

    Christine eSchmitt

    2016-02-01

    Full Text Available Nano-scale vesicles have become a popular tool in life sciences. Besides liposomes that are generated from phospholipids of natural origin, polymersomes fabricated of synthetic block copolymers enjoy increasing popularity, as they represent more versatile membrane building blocks that can be selected based on their specific physicochemical properties, like permeability, stability or chemical reactivity.In this review, we focus on the application of simple and nested artificial vesicles in synthetic biology. First, we provide an introduction into the utilization of multi-compartmented vesosomes as compartmentalized nano-scale bioreactors. In the bottom-up development of protocells from vesicular nano-reactors, the specific exchange of pathway intermediates across compartment boundaries represents a bottleneck for future studies. To date, most compartmented bioreactors rely on unspecific exchange of substrates and products. This is either based on changes in permeability of the coblock polymer shell by physicochemical triggers or by the incorporation of unspecific porin proteins into the vesicle membrane. Since the incorporation of membrane transport proteins into simple and nested artificial vesicles offers the potential for specific exchange of substances between subcompartments, it opens new vistas in the design of protocells. Therefore we devote the main part of the review to summarize the technical advances in the use of phospholipids and block copolymers for the reconstitution of membrane proteins.

  20. Hybrid Nanomaterials by Surface Grafting of Synthetic Polypeptides Using N-Carboxyanhydride (NCA) Polymerization.

    Science.gov (United States)

    Borase, Tushar; Heise, Andreas

    2016-07-01

    The interaction of materials with their environment is largely dictated by interfacial phenomena. Polymers are very versatile materials to modulate material interfaces to provide functionality, stability and compatibility. A class of polymers that can close the gap between fully synthetic and natural macromolecules are polypeptides derived from N-carboxyanhydride (NCA) polymerization. Recent advances in using this technique to create biomimetic interfaces and hybrid materials are highlighted, with special emphasis on nanomaterials.

  1. Distributed detection of communities in complex networks using synthetic coordinates

    International Nuclear Information System (INIS)

    Various applications like finding Web communities, detecting the structure of social networks, and even analyzing a graph’s structure to uncover Internet attacks are just some of the applications for which community detection is important. In this paper, we propose an algorithm that finds the entire community structure of a network, on the basis of local interactions between neighboring nodes and an unsupervised distributed hierarchical clustering algorithm. The novelty of the proposed approach, named SCCD (standing for synthetic coordinate community detection), lies in the fact that the algorithm is based on the use of Vivaldi synthetic network coordinates computed by a distributed algorithm. The current paper not only presents an efficient distributed community finding algorithm, but also demonstrates that synthetic network coordinates could be used to derive efficient solutions to a variety of problems. Experimental results and comparisons with other methods from the literature are presented for a variety of benchmark graphs with known community structure, derived from varying a number of graph parameters and real data set graphs. The experimental results and comparisons to existing methods with similar computation cost on real and synthetic data sets demonstrate the high performance and robustness of the proposed scheme. (paper)

  2. Photothermal and morphological characterization of PLA/PCL polymer blends

    Science.gov (United States)

    Correa-Pacheco, Z. N.; Jiménez-Pérez, J. L.; Sabino, M. A.; Cruz-Orea, A.; Loaiza, M.

    2015-09-01

    Nowadays, some synthetic polymers have been replaced by biodegradable polymers in order to avoid environmental contamination. Among these biodegradables polymers, aliphatic polyesters such as polylactic acid (PLA) and polycaprolactone (PCL) have been widely used. In the present study, solvent-casting films of PLA, PCL and polymer blends with and without compatibilizer (PLA grafted with maleic anhydride) were prepared. The thermal diffusivity ( α) of each sample was obtained by using the open photoacoustic cell technique. Morphology and thermal properties were determined by using scanning electron microscopy, transmission electron microscopy and differential scanning calorimetry (DSC), respectively. The blends showed lower thermal diffusivity compared to pure polymers. However, when the compatibilizer was used, the highest value of thermal diffusivity was obtained. Also, cold crystallization with the highest value of enthalpy of fusion was observed for the compatibilized sample, which was revealed by DSC. To our knowledge, this is the first time that the thermal diffusivity of these biodegradable polymer blends is reported.

  3. Comparative Analysis of Routing Attacks in Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Bipul Syam Purkayastha

    2012-03-01

    Full Text Available In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.

  4. Concrete Deterioration under Alternate Action of Carbonation and Sulfate Attack

    Directory of Open Access Journals (Sweden)

    Fenglan Li

    2013-11-01

    Full Text Available By micro- and macro-observations, the study reveals the deterioration mechanisms of concrete under alternate action of carbonation and sodium sulfate solution attack (C-SA comparied with the single sodium sulfate solution attack (SA. The studies indicate that in both cases, the main attack product is ettringite, some gypsum is checked only in the first layer of case SA, the thaumasite form of sulfate attack is not initiated in case C-SA. Compared with the single sodium sulfate solution attack, although the carbonation layer mitigates the extent of sulfate attack in limited exposure period, the alternate action of carbonation and sulfate attack still leads to strength degradation to some extent. The effect of carbonation on sulfate attack for longer exposure period deserves further research.

  5. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    Science.gov (United States)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  6. Heart Attack Help? There's an App for That

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159504.html Heart Attack Help? There's an App for That Emergency medicine ... American Heart Association. When someone is suffering a heart attack, stroke or cardiac arrest, quick action can be ...

  7. New attacks on Wi-Fi Protected Setup

    Directory of Open Access Journals (Sweden)

    Hamed Mohtadi

    2015-09-01

    Full Text Available Wi-Fi Protected Setup (WPS is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weaknesses in the implementation of WPS and provides an improved evil twin attack. This attack shows that even by completely disabling the WPS on the routers, all vulnerabilities are not covered.

  8. Heart Attack Before 50 Ups Early Death Risk

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_160692.html Heart Attack Before 50 Ups Early Death Risk But healthy ... News) -- The risk of early death after a heart attack has lessened over the past 30 years among ...

  9. An Attack Modeling Based on Colored Petri Net

    Institute of Scientific and Technical Information of China (English)

    ZHOU Shijie; QIN Zhiguang; ZHANG Feng; LIU Jinde

    2004-01-01

    A color petri net (CPN) based attack modeling approach is addressed.Compared with graph-based modeling,CPN based attack model is fiexible enough to model Intemet intrusions,because of their static and dynamic features.The processes and rules of building CPN based attack model from attack tree are also presented.In order to evaluate the risk of intrusion,some cost elements are added to CPN based attack modeling.This extended model is useful in intrusion detection and risk evaluation.Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions,such as intrusion response and intrusion defense.A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn't.

  10. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof;

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  11. Flooding attack and defence in Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Hou Yafei; Zhong Yiping; Zhang Shiyong; Dai Zhoulin

    2006-01-01

    Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

  12. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  13. Making MANET secured against malicious attack

    Science.gov (United States)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  14. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  15. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  16. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  17. Incidence of Fungal attack on Aircraft Fuselage

    Directory of Open Access Journals (Sweden)

    H. M. Dayal

    1968-10-01

    Full Text Available Incidence of fungal attack on the fuselage of a few Vampire aircraft has been observed. The fungus isolated from the infected regions has been tentatively indentified as TorulaSp. Laboratory experiments have revealed that within four weeks this fungus causes about 44 percent loss in the tensile strength of the brich plywood used in the manufacture of the fuselage of the aircraft.

  18. Coal Slag Attack-A Review

    Institute of Scientific and Technical Information of China (English)

    GUO Zongqi

    2004-01-01

    Although slagging coal gasifiers have served the commercial systems of electricity and chemical fertilizer productions for more than ten years, refractory service life still is a critical factor for gasifier availability. Some investigations were attracted, focusing on coal slag attack on high chromia refractories. A general introduction is made in order to have further understanding about slag corrosion in coal gasification environment. Microstructural deterioration and wear process of high chromia refractory in slagging gasifiers are discussed.

  19. An Analysis of Various Attacks in MANET

    OpenAIRE

    M.Udhayamoorthi; C. Senthilkumar; Dr S. Karthik; Dr. T.Kalaikumaran

    2014-01-01

    An Ad-hoc network is a self-organized network, without a central coordinator, and which frequently changes its topology. According to the perspective of our paper, we try to connect the current status of computers era to adhoc networking. As adhoc networks has been unleashing several updated technologies, it is the most growing area in the field of networks in information and communication Engineering has ever seen .we start with area introduction, deeply reviewed about the various attacks es...

  20. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  1. Quantum Key Distribution against Trojan Horse Attacks

    Institute of Scientific and Technical Information of China (English)

    CAI Qing-Yu; LV Hua

    2007-01-01

    Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology.

  2. Detecting man-in-the-middle attacks by precise timing

    OpenAIRE

    Aziz, Benjamin; Hamilton, G.

    2009-01-01

    Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a s...

  3. A Structured Multi-signature Scheme Against Forgery Attack

    Directory of Open Access Journals (Sweden)

    Wenjun Luo

    2011-12-01

    Full Text Available There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s schemes that can not resist inside attack and outside attack. In this paper, we briefly review Burmester’s program and relate safety analysis, Burmester’s scheme vulnerable to forgery attack. Then we propose a structured multi-signature scheme against forgery attack. In the new scheme, we increase the signature parameter verification to improve security.

  4. Defending Against LDoS Attacks Using Fair AQM

    Directory of Open Access Journals (Sweden)

    Bianqin Wang

    2011-12-01

    Full Text Available According to the instant high rate and high intensity of LDoS attacks, this paper explores using fair queue management mechanism to mitigate their effect. We perform simulation experiments to evaluate the performance of fair AQM FRED and CHOKe under LDoS attacks. The simulation results show that they are able to reduce the impact of the attacks in various degrees. FRED outperforms CHOKe in throttling the attacks, but it is slightly inferior to CHOKe in time performance.

  5. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    OpenAIRE

    Honglong Chen; Wei Lou; Xice Sun; Zhi Wang

    2010-01-01

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against worm...

  6. Migraineurs with exercise-triggered attacks have a distinct migraine

    OpenAIRE

    Koppen, Hille; van Veldhoven, Peter LJ

    2013-01-01

    Background Sport as a migraine trigger has been reported, but extensive information on these triggered attacks and the patients experiencing these attacks is lacking. Goal of this study was to investigate the lifetime prevalence of exercise triggered migraine attacks in migraine patients and if patients with exercise triggered attacks experience specific prodromal or ictal migraine symptoms. Methods 103 consecutive migraine patients seen during their first visit at a Dutch headache clinic wer...

  7. Sequential Beamforming Synthetic Aperture Imaging

    DEFF Research Database (Denmark)

    Kortbek, Jacob; Jensen, Jørgen Arendt; Gammelmark, Kim Løkke

    2013-01-01

    Synthetic aperture sequential beamforming (SASB) is a novel technique which allows to implement synthetic aperture beamforming on a system with a restricted complexity, and without storing RF-data. The objective is to improve lateral resolution and obtain a more depth independent resolution...

  8. A Review of Man-in-the-Middle Attacks

    OpenAIRE

    Gangan, Subodh

    2015-01-01

    This paper presents a survey of man-in-the-middle (MIM) attacks in communication networks and methods of protection against them. In real time communication, the attack can in many situations be discovered by the use of timing information. The most common attacks occur due to Address Resolution Protocol (ARP) cache poisoning, DNS spoofing, session hijacking, and SSL hijacking.

  9. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  10. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Yee Wei; Hartel, Pieter; Hartog, den Jerry; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. W

  11. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    . Colloquially, then, "S is liable to attack" means roughly that S is a legitimate target. Given this, it should be clear that when I talk about the criteria of "liability to attack," I am talking in effect about the features separating people who may and may not be attacked. Unless I indicate otherwise, I also...

  12. Attacks Prevention and Detection Techniques In MANET: A Survey

    Directory of Open Access Journals (Sweden)

    Pranjali D. Nikam,

    2014-11-01

    Full Text Available Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node which is dynamically moves from one location to another location. Both attacks Active as well as Passive attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as compare to wired networks. In last few years many security and attacks issue are face many researchers in MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks and Packet modification attacks found in MANET. At the time of data communication all the above mentioned attacks access data easily without permission. To solve the problem of attacks in MANET and secure data communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid algorithm for secure intrusion detection in MANET.

  13. Recent advances in synthetic biosafety

    Science.gov (United States)

    Simon, Anna J.; Ellington, Andrew D.

    2016-01-01

    Synthetically engineered organisms hold promise for a broad range of medical, environmental, and industrial applications. Organisms can potentially be designed, for example, for the inexpensive and environmentally benign synthesis of pharmaceuticals and industrial chemicals, for the cleanup of environmental pollutants, and potentially even for biomedical applications such as the targeting of specific diseases or tissues. However, the use of synthetically engineered organisms comes with several reasonable safety concerns, one of which is that the organisms or their genes could escape their intended habitats and cause environmental disruption. Here we review key recent developments in this emerging field of synthetic biocontainment and discuss further developments that might be necessary for the widespread use of synthetic organisms. Specifically, we discuss the history and modern development of three strategies for the containment of synthetic microbes: addiction to an exogenously supplied ligand; self-killing outside of a designated environment; and self-destroying encoded DNA circuitry outside of a designated environment. PMID:27635235

  14. Synthesis of Conjugated Polymers for Light Emitting and Photovoltalc Applications

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    1 Results The initial report of polymeric light-emitting diodes (PLEDs) based on poly(p-phenylenevinylene) gave birth to an intense research effort in conjugated polymers, primarily focused on the development of optoelectronic and electrochemical devices. Significant developments in modern synthetic chemistry, especially the chemistry of carbon-carbon bond formation have allowed the synthesis of various well-defined conjugated polymers and oligomers with optimized physical properties.Meanwhile, these re...

  15. Nanotribology of charged polymer brushes

    Science.gov (United States)

    Klein, Jacob

    Polymers at surfaces, whose modern understanding may be traced back to early work by Sam Edwards1, have become a paradigm for modification of surface properties, both as steric stabilizers and as remarkable boundary lubricants2. Charged polymer brushes are of particular interest, with both technological implications and especially biological relevance where most macromolecules are charged. In the context of biolubrication, relevant in areas from dry eye syndrome to osteoarthritis, charged polymer surface phases and their complexes with other macromolecules may play a central role. The hydration lubrication paradigm, where tenaciously-held yet fluid hydration shells surrounding ions or zwitterions serve as highly-efficient friction-reducing elements, has been invoked to understand the excellent lubrication provided both by ionized3 and by zwitterionic4 brushes. In this talk we describe recent advances in our understanding of the nanotribology of such charged brush systems. We consider interactions between charged end-grafted polymers, and how one may disentangle the steric from the electrostatic surface forces5. We examine the limits of lubrication by ionized brushes, both synthetic and of biological origins, and how highly-hydrated zwitterionic chains may provide extremely effective boundary lubrication6. Finally we describe how the lubrication of articular cartilage in the major joints, a tribosystem presenting some of the greatest challenges and opportunities, may be understood in terms of a supramolecular synergy between charged surface-attached polymers and zwitterionic groups7. Work supported by European Research Council (HydrationLube), Israel Science Foundation (ISF), Petroleum Research Fund of the American Chemical Society, ISF-NSF China Joint Program.

  16. Synthetic plasma ion source

    International Nuclear Information System (INIS)

    An improved crossed-beam charge-exchange ion gun in which a synthetic plasma is formed by injecting an electron beam into a collimated molecular beam just before the molecules are ionized by charge exchange with a crossed primary ion beam, thereby forming a secondary ion beam from the ionized but space-charge-neutralized and substantially undeflected molecular beam. The plasma thus formed extends to an aperture stop in an aperture tube which extends upstream from an anode downstream of which anode a cathode is placed. A field is formed within the cathode/anode space and within the aperture tube into which the plasma extends. The sheath edge of the plasma within the tube is curved by the field to form a meniscus, and the aperture, being smaller in area than the secondary ion beam upstream of the aperture, both collimates the secondary ion beam and acts as a lens stop for the subsequent immersion lens formed by the meniscus and the field region

  17. Ecotoxicology of synthetic pyrethroids.

    Science.gov (United States)

    Maund, S J; Campbell, P J; Giddings, J M; Hamer, M J; Henry, K; Pilling, E D; Warinton, J S; Wheeler, J R

    2012-01-01

    In this chapter we review the ecotoxicology of the synthetic pyrethroids (SPs). SPs are potent, broad-spectrum insecticides. Their effects on a wide range of nontarget species have been broadly studied, and there is an extensive database available to evaluate their effects. SPs are highly toxic to fish and aquatic invertebrates in the laboratory, but effects in the field are mitigated by rapid dissipation and degradation. Due to their highly lipophilic nature, SPs partition extensively into sediments. Recent studies have shown that toxicity in sediment can be predicted on the basis of equilibrium partitioning, and whilst other factors can influence this, organic carbon content is a key determining variable. At present for SPs, there is no clear evidence for adverse population-relevant effects with an underlying endocrine mode of action. SPs have been studied intensively in aquatic field studies, and their effects under field conditions are mitigated from those measured in the laboratory by their rapid dissipation and degradation. Studies with a range of test systems have shown consistent aquatic field endpoints across a variety of geographies and trophic states. SPs are also highly toxic to bees and other nontarget arthropods in the laboratory. These effects are mitigated in the field through repellency and dissipation of residues, and recovery from any adverse effects tends to be rapid.

  18. Computing with synthetic protocells.

    Science.gov (United States)

    Courbet, Alexis; Molina, Franck; Amar, Patrick

    2015-09-01

    In this article we present a new kind of computing device that uses biochemical reactions networks as building blocks to implement logic gates. The architecture of a computing machine relies on these generic and composable building blocks, computation units, that can be used in multiple instances to perform complex boolean functions. Standard logical operations are implemented by biochemical networks, encapsulated and insulated within synthetic vesicles called protocells. These protocells are capable of exchanging energy and information with each other through transmembrane electron transfer. In the paradigm of computation we propose, protoputing, a machine can solve only one problem and therefore has to be built specifically. Thus, the programming phase in the standard computing paradigm is represented in our approach by the set of assembly instructions (specific attachments) that directs the wiring of the protocells that constitute the machine itself. To demonstrate the computing power of protocellular machines, we apply it to solve a NP-complete problem, known to be very demanding in computing power, the 3-SAT problem. We show how to program the assembly of a machine that can verify the satisfiability of a given boolean formula. Then we show how to use the massive parallelism of these machines to verify in less than 20 min all the valuations of the input variables and output a fluorescent signal when the formula is satisfiable or no signal at all otherwise. PMID:25969126

  19. Modeling of Polymer Erosion

    OpenAIRE

    Göpferich, Achim; Langer, Robert S.

    1993-01-01

    The erosion of bioerodible polymers depends on many factors including the polymer chain length, bond cleavage velocity, swellability, crystallinity, and water diffusivity in the polymer matrix. This multitude of parameters makes modeling of erosion difficult. Only a few models exist that describe morphological changes of polymers during erosion qualitatively. In the present approach the polymer matrix was represented as the sum of small individual polymer matrix parts. The factors that determ...

  20. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that