WorldWideScience

Sample records for attack synthetic polymers

  1. Biopolymers Versus Synthetic Polymers

    Directory of Open Access Journals (Sweden)

    Florentina Adriana Cziple

    2008-10-01

    Full Text Available This paper present an overview of important synthetic and natural polymers with emphasis on polymer structure, the chemistry of polymer formation. an introduction to polymer characterization. The biodegradation process can take place aerobically and anaerobically with or without the presence of light. These factors allow for biodegradation even in landfill conditions which are normally inconducive to any degradation. The sheeting used to make these packages differs significantly from other “degradable plastics” in the market as it does not attempt to replace the current popular materials but instead enhances them by rendering them biodegradable.

  2. Integration of Natural Polymers and Synthetic Nanostructures

    Science.gov (United States)

    2014-11-20

    11/2014 Final Report August 15 2011- August 15 2014 INTEGRATION OF NATURAL POLYMERS AND SYNTHETIC NANOSTRUCTURES FA9550-11-1-0233 Vladimir V. Tsukruk...inorganic nanostructures . We employ fabrication techniques including layer-by-layer (LbL) deposition, vacuum-assisted self-assembly, and spin-assisted...writing. U U U UU 1 Final Performance Report August 2011 - August 2014 FA9550-11-1-0233: INTEGRATION OF NATURAL POLYMERS AND SYNTHETIC NANOSTRUCTURES

  3. Polymer dynamics from synthetic polymers to proteins

    Indian Academy of Sciences (India)

    D Richter; R Biehl; M Monkenbush; B Hoffmann; R Merkel

    2008-10-01

    Starting from the standard model of polymer motion - the Rouse model - we briefly present some key experimental results on the mesoscopic dynamics of polymer systems. We touch the role of topological confinement as expressed in the reptation model and discuss in some more detail processes limiting the confinement. In the second part we relate to some new developments concerning the measurement of large-scale internal dynamics of proteins by neutron spin echo.

  4. Multimodal separation and multistage mass spectrometry of synthetic polymers

    NARCIS (Netherlands)

    Song, J.

    2011-01-01

    Synthetic polymers and polymer-based materials are essential and indispensable in many aspects of our life. An increasing demand of polymers with tailor-made properties has led to an extraordinary range of new materials. Most of the methods for characterisation of polymers only produce results on an

  5. Hybrid protein-synthetic polymer nanoparticles for drug delivery.

    Science.gov (United States)

    Koseva, Neli S; Rydz, Joanna; Stoyanova, Ekaterina V; Mitova, Violeta A

    2015-01-01

    Among the most common nanoparticulate systems, the polymeric nanocarriers have a number of key benefits, which give a great choice of delivery platforms. Nevertheless, polymeric nanoparticles possess some limitations that include use of toxic solvents in the production process, polymer degradation, drug leakage outside the diseased tissue, and polymer cytotoxicity. The combination of polymers of biological and synthetic origin is an appealing modern strategy for the production of novel nanocarriers with unprecedented properties. Proteins' interface can play an important role in determining bioactivity and toxicity and gives perspective for future development of the polymer-based nanoparticles. The design of hybrid constructs composed of synthetic polymer and biological molecules such as proteins can be considered as a straightforward tool to integrate a broad spectrum of properties and biofunctions into a single device. This review discusses hybrid protein-synthetic polymer nanoparticles with different structures and levels in complexity and functionality, in view of their applications as drug delivery systems.

  6. Synthetic strategies for the generation of molecularly imprinted organic polymers.

    Science.gov (United States)

    Mayes, A G; Whitcombe, M J

    2005-12-06

    Molecular imprinting is a method of inducing molecular recognition properties in synthetic polymers in response to the presence of a template species during formation of the three-dimensional structure of the polymer. The molecularly imprinted polymers (MIPs) prepared in this way have been termed "plastic antibodies" and combine the robustness of the polymer scaffold with binding properties more readily associated with biological receptors. Smart polymers of this type may find applications in drug delivery, controlled release and monitoring of drug and metabolite concentrations. In this review the main synthetic strategies used in the preparation of imprinted organic polymers are described in terms of the chemical principles used in the templating step. These are illustrated with examples taken from the literature and are classified as covalent, semi-covalent, non-covalent, metal-mediated and non-polar. Finally strategies for the selection of monomers, optimisation and modification of the properties of imprinted polymers are reviewed.

  7. Synthetic Polymer Nanoparticle-Polysaccharide Interactions: A Systematic Study

    OpenAIRE

    Zeng, Zhiyang; Patel, Jiten; Lee, Shih-Hui; McCallum, Monica; Tyagi, Anuradha; Yan, Mingdi; Shea, Kenneth J.

    2012-01-01

    The interaction between synthetic polymer nanoparticles (NPs) and biomacromolecules (e.g. proteins, lipids and polysaccharides) can profoundly influence the NPs fate and function. Polysaccharides (e.g. heparin/heparin sulfate) are a key component of cell surfaces and the extracelluar matrix and play critical roles in many biological processes. We report a systematic investigation of the interaction between synthetic polymer nanoparticles and polysaccharides by ITC, SPR and an anticoagulant as...

  8. Novel synthetic methods to produce functionalized conducting polymers. 1. Polyanilines

    Energy Technology Data Exchange (ETDEWEB)

    Barbero, C.; Salavagione, H.J.; Acevedo, D.F.; Garay, F.; Planes, G.A.; Miras, M.C. [Universidad Nacional de Rio Cuarto (Argentina). Dpto. de Quimica; Grumelli, D.E. [INQUIMAE, Buenos Aires (Argentina). Dpto. de Quimica Inorganica; Morales, G.M. [University of Chicago (United States). Dept. of Chemistry

    2004-09-15

    Recent results, part of an ongoing research programme aimed to develop synthetic methods which could be used to functionalise conducting polymers, are described. Among those methods are the copolymerization of aniline with substituted anilines and post-modification reactions of polyaniline, such as: electrophilic substitution, nucleophilic addition and coupling with diazonium salts. Some of those methods could be chemically or electrochemically controlled allowing a quantitative tailoring of the modification. The effect of the added functionalities on the electrochemical properties of the polymers is investigated using spectroscopic and electrochemical techniques. The extension of the synthetic methods to combinatorial modification of conductive polymers is also discussed. (author)

  9. Synthetic polymers from readily available monosaccharides.

    Science.gov (United States)

    Galbis, J A; García-Martín, M G

    2010-01-01

    The low degradability of petroleum-based polymers and the massive use of these materials constitute a serious problem because of the environmental pollution that they can cause. Thus, sustained efforts have been extensively devoted to produce new polymers based on natural renewing resources and with higher degradability. Of the different natural sources, carbohydrates stand out as highly convenient raw materials because they are inexpensive, readily available, and provide great stereochemical diversity. New polymers, analogous to the more accredited technical polymers, but based on chiral monomers, have been synthesized from natural and available sugars. This chapter describes the potential of sugar-based monomers as precursors to a wide variety of macromolecular materials.

  10. Molecular weight characterisation of synthetic polymers

    CERN Document Server

    Holding, Steve R

    1995-01-01

    The report comprises a state-of-the-art overview of the subject of molecular weight characterisation, supported by an extensive, indexed bibliography. The bibliography contains over 400 references and abstracts, compiled from the Polymer Library.

  11. High-density polymer microarrays: identifying synthetic polymers that control human embryonic stem cell growth.

    Science.gov (United States)

    Hansen, Anne; Mjoseng, Heidi K; Zhang, Rong; Kalloudis, Michail; Koutsos, Vasileios; de Sousa, Paul A; Bradley, Mark

    2014-06-01

    The fabrication of high-density polymer microarray is described, allowing the simultaneous and efficient evaluation of more than 7000 different polymers in a single-cellular-based screen. These high-density polymer arrays are applied in the search for synthetic substrates for hESCs culture. Up-scaling of the identified hit polymers enables long-term cellular cultivation and promoted successful stem-cell maintenance.

  12. Diversity screening for novel enzymes degrading synthetic polymers

    DEFF Research Database (Denmark)

    Lezyk, Mateusz Jakub

    The objective of this PhD study was to evaluate the feasibility of enzymatic degradation of synthetic polymers used as binder materials in marine coatings. Enzymatic modification of synthetic polymers like epoxy resin, polyurethanes and various acrylics is desirable in several industrial processes...... is reported. First, a collection of fungal strains was screened for the capability to degrade several compounds of synthetic origin. Strains with the ability to modify colloidal polyester polyurethane, as well as various commercial emulsions of acrylates were identified. Secondly, we have used metagenomic...... and the choice of proper substrates for identification of promising enzyme candidates. Several genes coding for enzymes with the capability to oxidize various natural and synthetic substrates were identified, expressed heterologously and characterized. Three multicopper oxidases (MCOs) were identified encoded...

  13. Molecular Design of Synthetic Biodegradable Polymers as Cell Scaffold Materials

    Institute of Scientific and Technical Information of China (English)

    WANG Shen-guo; WAN Yu-qing; CAI Qing; HE Bin; CHEN Wen-na

    2004-01-01

    Poly(lactic acid) and its copolymers are regarded as the most useful biomaterials. The good biocompatibility, biodegradability and mechanical properties of them make the synthetic biodegradable polymers have primary application to tissue engineering. The advantages and disadvantages of the synthetic biodegradable polymers as cell scaffold materials are evaluated. This article reviews the modification of polylactide-family aliphatic polymers to improve the cell affinity when the polymers are used as cell scaffolds. We have developed four main approaches: to modify polyester cell scaffolds in combination of plasma treating and collagen coating; to introduce hydrophilic segments into aliphatic polyester backbones; to introduce pendant functional groups into polyester chains; to modify polyester with dextran. The results of the cell cultures prove that the approaches mentioned above have improved the cell affinity of the polyesters and have modulated cell function such as adhesion, proliferation and migration.

  14. The World of Synthetic Polymers.An Industrial Perspective

    Institute of Scientific and Technical Information of China (English)

    Lau Willie

    2004-01-01

    Synthetic polymers have become the building block in almost every aspects of our daily life. Billions of pounds of polymers are produced each year and the demand is continuously growing both in terms of volume and advanced performance. The general property of a class of polymers is often bounded by the synthetic process that produces the polymer. For example,polyolefins, are non-polar polymers due to the poor tolerance of transition metal catalysts toward polar monomers. Conversely, latices are polar polymers, since the emulsion polymerization process limits the use of non-polar monomers which have low solubility in water. It is highly desirable to be able to design polymer systems with optimum polarity balance to meet the application demand while staying within the industrial manufacturing constraints.An overview of industrial polymerization methods will be followed by a presentation on the recent development of a new emulsion polymerization technology. The technology involves the use of Cyclodextrin, acting as "Phase Transport Catalyst", facilitating the diffusion of very hydrophobic and water insoluble monomers through the aqueous medium. A new class of latex polymers and their attributes will be discussed.

  15. Solid state NMR of biopolymers and synthetic polymers

    Energy Technology Data Exchange (ETDEWEB)

    Jelinski, Lynn W. [Cornell Univ., Geneva, NY (United States)

    1995-12-31

    Solid state NMR has been invaluable in evaluating the structure, phase separation, and dynamics of polymers. Because polymers are generally used in the solid state, solid state NMR is especially powerful because it provides information about the materials in their native state. This review gives a general overview of solid state NMR, concentrating on solid state {sup 13} C and {sup 2} H NMR. It then focuses on two examples: the biopolymer spider silka and the engineering material polyurethane. It illustrates how solid state NMR can provide new information about synthetic and bio-polymers. (author) 11 refs., 5 figs., 3 tabs.

  16. Co-pyrolysis of wood biomass and synthetic polymers mixtures

    Energy Technology Data Exchange (ETDEWEB)

    Sharypov, V.I.; Beregovtsova, N.G.; Kuznetsov, B.N.; Baryshnikov, S.V. [Institute of Chemistry and Chemical Technology SB RAS, K. Marx Str., Krasnoyarsk 660049 (Russian Federation); Cebolla, V.L. [Instituto de Carboquimica, CSIC, Zaragoza (Spain); Weber, J.V.; Collura, S.; Finqueneisel, G.; Zimny, T. [Laboratoire de Chimie et Applications, Universite de Metz, IUT, rue V. Demange, 57500 Saint Avold (France)

    2006-06-01

    The pyrolysis in a hydrogen atmosphere of pine wood and synthetic polymers (polyethylene and polypropylene) mixtures was studied in a rotating autoclave. The effects of reaction temperature, wood/polymers mixture composition and catalysts, on the mixtures conversion into liquids and gases were established and discussed. The used catalysts were pyrrhotite and haematite materials activated by mechanochemical treatment. In the co-liquefaction processes the interaction between fragments of wood and polymers thermal decomposition took place. This results in non-additive increase of the wood/polymers conversion degree by 10-15wt.% and of the yield of distillate fractions by 14-19wt.%. Iron ore materials were found catalytically active in the process of hydropyrolysis of wood/polymers mixtures. By using these catalysts a significant increase of the distillable liquids amounts (by 14-21wt.%) and a sharp decrease of olefins and cycloparaffins content (by approximately two to three times) were observed. (author)

  17. Synthetic polymer nanoparticle-polysaccharide interactions: a systematic study.

    Science.gov (United States)

    Zeng, Zhiyang; Patel, Jiten; Lee, Shih-Hui; McCallum, Monica; Tyagi, Anuradha; Yan, Mingdi; Shea, Kenneth J

    2012-02-08

    The interaction between synthetic polymer nanoparticles (NPs) and biomacromolecules (e.g., proteins, lipids, and polysaccharides) can profoundly influence the NPs fate and function. Polysaccharides (e.g., heparin/heparin sulfate) are a key component of cell surfaces and the extracelluar matrix and play critical roles in many biological processes. We report a systematic investigation of the interaction between synthetic polymer nanoparticles and polysaccharides by ITC, SPR, and an anticoagulant assay to provide guidelines to engineer nanoparticles for biomedical applications. The interaction between acrylamide nanoparticles (~30 nm) and heparin is mainly enthalpy driven with submicromolar affinity. Hydrogen bonding, ionic interactions, and dehydration of polar groups are identified to be key contributions to the affinity. It has been found that high charge density and cross-linking of the NP can contribute to high affinity. The affinity and binding capacity of heparin can be significantly diminished by an increase in salt concentration while only slightly decreased with an increase of temperature. A striking difference in binding thermodynamics has been observed when the main component of a polymer nanoparticle is changed from acrylamide (enthalpy driven) to N-isopropylacryalmide (entropy driven). This change in thermodynamics leads to different responses of these two types of polymer NPs to salt concentration and temperature. Select synthetic polymer nanoparticles have also been shown to inhibit protein-heparin interactions and thus offer the potential for therapeutic applications.

  18. Natural and synthetic polymers for wounds and burns dressing.

    Science.gov (United States)

    Mogoşanu, George Dan; Grumezescu, Alexandru Mihai

    2014-03-25

    In the last years, health care professionals faced with an increasing number of patients suffering from wounds and burns difficult to treat and heal. During the wound healing process, the dressing protects the injury and contributes to the recovery of dermal and epidermal tissues. Because their biocompatibility, biodegradability and similarity to macromolecules recognized by the human body, some natural polymers such as polysaccharides (alginates, chitin, chitosan, heparin, chondroitin), proteoglycans and proteins (collagen, gelatin, fibrin, keratin, silk fibroin, eggshell membrane) are extensively used in wounds and burns management. Obtained by electrospinning technique, some synthetic polymers like biomimetic extracellular matrix micro/nanoscale fibers based on polyglycolic acid, polylactic acid, polyacrylic acid, poly-ɛ-caprolactone, polyvinylpyrrolidone, polyvinyl alcohol, polyethylene glycol, exhibit in vivo and in vitro wound healing properties and enhance re-epithelialization. They provide an optimal microenvironment for cell proliferation, migration and differentiation, due to their biocompatibility, biodegradability, peculiar structure and good mechanical properties. Thus, synthetic polymers are used also in regenerative medicine for cartilage, bone, vascular, nerve and ligament repair and restoration. Biocompatible with fibroblasts and keratinocytes, tissue engineered skin is indicated for regeneration and remodeling of human epidermis and wound healing improving the treatment of severe skin defects or partial-thickness burn injuries.

  19. 21 CFR 874.3620 - Ear, nose, and throat synthetic polymer material.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Ear, nose, and throat synthetic polymer material. 874.3620 Section 874.3620 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN..., and throat synthetic polymer material. (a) Identification. Ear, nose, and throat synthetic...

  20. Application of natural and synthetic polymers in a production of paper

    Directory of Open Access Journals (Sweden)

    Jovanović Slobodan

    2007-01-01

    Full Text Available This work gives the review of most frequently used natural and synthetic polymers in production of paper, board and cardboard. Physical and chemical interaction of natural and synthetic polymers with cellulose fibers, and thus the way these polymers influence the improvement of both production process and the paper characteristics, have been presented.

  1. The Mediterranean Plastic Soup: synthetic polymers in Mediterranean surface waters

    Science.gov (United States)

    Suaria, Giuseppe; Avio, Carlo G.; Mineo, Annabella; Lattin, Gwendolyn L.; Magaldi, Marcello G.; Belmonte, Genuario; Moore, Charles J.; Regoli, Francesco; Aliani, Stefano

    2016-11-01

    The Mediterranean Sea has been recently proposed as one of the most impacted regions of the world with regards to microplastics, however the polymeric composition of these floating particles is still largely unknown. Here we present the results of a large-scale survey of neustonic micro- and meso-plastics floating in Mediterranean waters, providing the first extensive characterization of their chemical identity as well as detailed information on their abundance and geographical distribution. All particles >700 μm collected in our samples were identified through FT-IR analysis (n = 4050 particles), shedding for the first time light on the polymeric diversity of this emerging pollutant. Sixteen different classes of synthetic materials were identified. Low-density polymers such as polyethylene and polypropylene were the most abundant compounds, followed by polyamides, plastic-based paints, polyvinyl chloride, polystyrene and polyvinyl alcohol. Less frequent polymers included polyethylene terephthalate, polyisoprene, poly(vinyl stearate), ethylene-vinyl acetate, polyepoxide, paraffin wax and polycaprolactone, a biodegradable polyester reported for the first time floating in off-shore waters. Geographical differences in sample composition were also observed, demonstrating sub-basin scale heterogeneity in plastics distribution and likely reflecting a complex interplay between pollution sources, sinks and residence times of different polymers at sea.

  2. Ferritin nanocontainers that self-direct in synthetic polymer systems

    Science.gov (United States)

    Sengonul, Merih C.

    Currently, there are many approaches to introduce functionality into synthetic polymers. Among these, for example, are copolymerization, grafting, and blending methods. However, modifications made by such methods also change the thermodynamics and rheological properties of the polymer system of interest, and each new modification often requires a costly reoptimization of polymer processing. Such a reoptimalization would not be necessary if new functionality could be introduced via a container whose external surface is chemically and physically tuned to interact with the parent polymer. The contents of the container could then be changed without changing other important properties of the parent polymer. In this context this thesis project explores an innovative nanocontainer platform which can be introduced into phase-separating homopolymer blends. Ferritin is a naturally existing nanocontainer that can be used synthetically to package and selectively transport functional moieties to a particular phase that is either in the bulk or on the surface of a homopolymer blend system. The principal focus of this work centers on modifying the surface of wild ferritin to: (1) render modified ferritin soluble in a non-aqueous solvent; and (2) impart it with self-directing properties when exposed to a homopolymer blend surface or incorporated into the bulk of a homopolymer blend. Wild ferritin is water soluble, and this research project successfully modified wild ferritin by grafting either amine-functional poly(ethylene glycol) (PEG) or short-chain alkanes to carbodiimide activated carboxylate groups on ferritin's surface. Such modified ferritin is soluble in dichloromethane (DCM). Modification was confirmed by ion-exchange chromatography, zeta-potential measurements, and electrospray mass spectroscopy. FT-IR was used to quantify the extent of PEGylation of the reaction products through area ratios of the -C-O-C asymmetric stretching vibration of the grafted PEG chains to the

  3. Characteristic and Synthetic Approach of Molecularly Imprinted Polymer

    Directory of Open Access Journals (Sweden)

    Kyung Ho Row

    2006-06-01

    Full Text Available Molecularly imprinted polymers (MIP exhibiting high selectivity and affinity tothe predetermined molecule (template are now seeing a fast growing research. However,optimization of the imprinted products is difficult due to the fact that there are manyvariables to consider, some or all of which can potentially impact upon the chemical,morphological and molecular recognition properties of the imprinted materials. This reviewpresent a summary of the principal synthetic considerations pertaining to good practice in thepolymerization aspects of molecular imprinting, and is primarily aimed at researcher familiarwith molecular imprinting methods but with little or no prior experience in polymersynthesis. The synthesis, characteristic, effect of molecular recognition and differentpreparation methods of MIP in recent few years are discussed in this review, unsolvedproblems and possible developments of MIP were also been briefly discussed.

  4. Identification of Synthetic Polymers and Copolymers by Analytical Pyrolysis-Gas Chromatography/Mass Spectrometry

    Science.gov (United States)

    Kusch, Peter

    2014-01-01

    An experiment for the identification of synthetic polymers and copolymers by analytical pyrolysis-gas chromatography/mass spectrometry (Py-GC/MS) was developed and performed in the polymer analysis courses for third-year undergraduate students of chemistry with material sciences, and for first-year postgraduate students of polymer sciences. In…

  5. A study of porosity of synthetic polymer nanoparticles using PALS

    Energy Technology Data Exchange (ETDEWEB)

    Pham, B; Smith, S V [Centre for Antimatter-Matter Studies, Australian Nuclear Science and Technology Organisation (ANSTO) NSW 2232 (Australia); Guagliardo, P; Williams, J; Samarin, S, E-mail: binh.pham@ansto.gov.au, E-mail: svs@ansto.gov.au [Centre for Antimatter-Matter Studies, School of Physics, University of Western Australia, WA 6009 (Australia)

    2011-01-01

    Positron annihilation lifetime spectroscopy (PALS) has been used to study the free volume in dry synthetic polymer nanoparticles of various sizes. A series of poly(styrene/divinyl benzene) particles with diameters in the range of 100 to 500 nm were synthesized and then carefully chemically treated using the sulfonation process, to increase their porosity. The particles were characterised by Scanning Electron Microscopy (SEM), light scattering and PALS. Light scattering gave larger size for the treated particles, reflecting the hydration effect and therefore the increase in porosity. PALS spectra of untreated and treated particles gave four and three life-time components, respectively. Analysis by PAScual version 1.3.0 program indicated there was a reduction in the intensity and the type of the micropores in the treated particles. The data suggest PALS is a sensitive tool for detecting changes in microporosity in particles. The conflicting results obtained for light scattering compared to PALS for chemically treated particles is difficult to resolve and suggests sample preparation of polymeric materials for PALS is the critical factor.

  6. Synthetic polymers and methods of making and using the same

    Energy Technology Data Exchange (ETDEWEB)

    Daily, Michael D.; Grate, Jay W.; Mo, Kai-For

    2016-06-14

    Monomer embodiments that can be used to make polymers, such as homopolymers, heteropolymers, and that can be used in particular embodiments to make sequence-defined polymers are described. Also described are methods of making polymers using such monomer embodiments. Methods of using the polymers also are described.

  7. Synthetic polymers and methods of making and using the same

    Energy Technology Data Exchange (ETDEWEB)

    Grate, Jay W.; Mo, Kai-For; Daily, Michael D.

    2017-02-07

    Monomer embodiments that can be used to make polymers, such as homopolymers, heteropolymers, and that can be used in particular embodiments to make sequence-defined polymers are described. Also described are methods of making polymers using such monomer embodiments. Methods of using the polymers also are described.

  8. Antifouling Activity of Synthetic Alkylpyridinium Polymers Using the Barnacle Model

    Directory of Open Access Journals (Sweden)

    Veronica Piazza

    2014-04-01

    Full Text Available Polymeric alkylpyridinium salts (poly-APS isolated from the Mediterranean marine sponge, Haliclona (Rhizoniera sarai, effectively inhibit barnacle larva settlement and natural marine biofilm formation through a non-toxic and reversible mechanism. Potential use of poly-APS-like compounds as antifouling agents led to the chemical synthesis of monomeric and oligomeric 3-alkylpyridinium analogues. However, these are less efficient in settlement assays and have greater toxicity than the natural polymers. Recently, a new chemical synthesis method enabled the production of poly-APS analogues with antibacterial, antifungal and anti-acetylcholinesterase activities. The present study examines the antifouling properties and toxicity of six of these synthetic poly-APS using the barnacle (Amphibalanus amphitrite as a model (cyprids and II stage nauplii larvae in settlement, acute and sub-acute toxicity assays. Two compounds, APS8 and APS12-3, show antifouling effects very similar to natural poly-APS, with an anti-settlement effective concentration that inhibits 50% of the cyprid population settlement (EC50 after 24 h of 0.32 mg/L and 0.89 mg/L, respectively. The toxicity of APS8 is negligible, while APS12-3 is three-fold more toxic (24-h LC50: nauplii, 11.60 mg/L; cyprids, 61.13 mg/L than natural poly-APS. This toxicity of APS12-3 towards nauplii is, however, 60-fold and 1200-fold lower than that of the common co-biocides, Zn- and Cu-pyrithione, respectively. Additionally, exposure to APS12-3 for 24 and 48 h inhibits the naupliar swimming ability with respective IC50 of 4.83 and 1.86 mg/L.

  9. FORMULATION AND EVALUATION OF METOPROLOL SUCCINATE CONTROLLED RELEASE TABLETS USING NATURAL AND SYNTHETIC POLYMER

    Directory of Open Access Journals (Sweden)

    A. Sathyaraj

    2012-01-01

    Full Text Available The objective of the present study to develop controlled release tablets of Metoprolol succinate using Natural polymer, guar gum and synthetic polymer, carbopol as a rate controlling polymers.. It was also desired to study the effect of polymer concentration. Metoprolol succinate, β1- selective adrenergic receptor- blocking agent used in the management of hypertension, angina pectoris, cardiac arrthymias, myocardial infarction, heart failure, hyperthyroidism and in the prophylactic treatment of migraine. The half-life of drug is relatively short approximately 4-6 hrs and in normal course of therapy drug administration is required every 4-6 hrs, thus warrants the use of controlled release formulation for prolong action and to improve patient compliance. In the present investigation Natural polymer, guar gum and synthetic polymer, carbopol have been selected as matrix forming materials for the drug. The formulations are made by employing the conventional wet granulation method, to achieve prolonged release of medicaments.

  10. Control of polymer-packing orientation in thin films through synthetic tailoring of backbone coplanarity

    KAUST Repository

    Chen, Mark S.

    2013-10-22

    Controlling solid-state order of π-conjugated polymers through macromolecular design is essential for achieving high electronic device performance; yet, it remains a challenge, especially with respect to polymer-packing orientation. Our work investigates the influence of backbone coplanarity on a polymer\\'s preference to pack face-on or edge-on relative to the substrate. Isoindigo-based polymers were synthesized with increasing planarity by systematically substituting thiophenes for phenyl rings in the acceptor comonomer. This increasing backbone coplanarity, supported by density functional theory (DFT) calculations of representative trimers, leads to the narrowing of polymer band gaps as characterized by ultraviolet-visible-near infrared (UV-vis-NIR) spectroscopy and cyclic voltammetry. Among the polymers studied, regiosymmetric II and TII polymers exhibited the highest hole mobilities in organic field-effect transistors (OFETs), while in organic photovoltaics (OPVs), TBII polymers that display intermediate levels of planarity provided the highest power conversion efficiencies. Upon thin-film analysis by atomic force microscropy (AFM) and grazing-incidence X-ray diffraction (GIXD), we discovered that polymer-packing orientation could be controlled by tuning polymer planarity and solubility. Highly soluble, planar polymers favor face-on orientation in thin films while the less soluble, nonplanar polymers favor an edge-on orientation. This study advances our fundamental understanding of how polymer structure influences nanostructural order and reveals a new synthetic strategy for the design of semiconducting materials with rationally engineered solid-state properties. © 2013 American Chemical Society.

  11. PEG-related polymer resins as synthetic supports

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Combinatorial chemistry has become a significant part of the discovery and optimization process for novel drugs,affinity ligands,and catalysts.The polymeric supports play a key role in combinatory chemistry.Therefore,various kinds of functional polymer resins have been exploited as supports,reagents,and catalysts in organic synthesis.In comparison to the conventional Merrifield resins,the poly(ethylene glycol)(PEG)-related polymer resins have advantages including good compatibilities with polar solvents,good solvent absorbency and swelling properties.This review focuses primarily on the more recent work in the field of developing PEG-related polymer resins as supports for organic synthesis.

  12. Review of Synthetic Methods to Form Hollow Polymer Nanocapsules

    Energy Technology Data Exchange (ETDEWEB)

    Barker, Madeline T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-13

    Syntactic foams have grown in interest due to the widened range of applications because of their mechanical strength and high damage tolerance. In the past, hollow glass or ceramic particles were used to create the pores. This paper reviews literature focused on the controlled synthesis of hollow polymer spheres with diameters ranging from 100 –200 nm. By using hollow polymer spheres, syntactic foams could reach ultra-low densities.

  13. Synthetic polymers active against Clostridium difficile vegetative cell growth and spore outgrowth.

    Science.gov (United States)

    Liu, Runhui; Suárez, Jose M; Weisblum, Bernard; Gellman, Samuel H; McBride, Shonna M

    2014-10-15

    Nylon-3 polymers (poly-β-peptides) have been investigated as synthetic mimics of host-defense peptides in recent years. These polymers are attractive because they are much easier to synthesize than are the peptides themselves, and the polymers resist proteolysis. Here we describe in vitro analysis of selected nylon-3 copolymers against Clostridium difficile, an important nosocomial pathogen that causes highly infectious diarrheal disease. The best polymers match the human host-defense peptide LL-37 in blocking vegetative cell growth and inhibiting spore outgrowth. The polymers and LL-37 were effective against both the epidemic 027 ribotype and the 012 ribotype. In contrast, neither vancomycin nor nisin inhibited outgrowth for the 012 ribotype. The best polymer was less hemolytic than LL-37. Overall, these findings suggest that nylon-3 copolymers may be useful for combatting C. difficle.

  14. Synthetic genetic polymers capable of heredity and evolution

    DEFF Research Database (Denmark)

    Pinheiro, Vitor B; Taylor, Alexander I; Cozens, Christopher

    2012-01-01

    Genetic information storage and processing rely on just two polymers, DNA and RNA, yet whether their role reflects evolutionary history or fundamental functional constraints is currently unknown. With the use of polymerase evolution and design, we show that genetic information can be stored...... in and recovered from six alternative genetic polymers based on simple nucleic acid architectures not found in nature [xeno-nucleic acids (XNAs)]. We also select XNA aptamers, which bind their targets with high affinity and specificity, demonstrating that beyond heredity, specific XNAs have the capacity...... for Darwinian evolution and folding into defined structures. Thus, heredity and evolution, two hallmarks of life, are not limited to DNA and RNA but are likely to be emergent properties of polymers capable of information storage....

  15. Novel polymer materials for protecting crew and structural elements of orbital station against microorganisms attack throughout long-term operation

    Science.gov (United States)

    Savelyev, Yu.; Rudenko, A.; Robota, L.; Koval, E.; Savelyeva, O.; Markovskaya, L.; Veselov, V.

    2009-01-01

    Novel polyurethanes, polyamidourethanes and polyurethane foams of stable to biocorrosion were synthesized. The polymers possess fungicidal/fungistatic and bactericidal/bacteriostatic activity. After the biological tests with using of mold fungi and yeasts, polymers totally keep their main exploitation characteristics: for most of polymers coefficients of strength and elasticity keeping are equal of 100%. Most of them possess the fungicidal properties of zero balls, according to the State Standard. Life-firmness investigation of the most aggressive extremophiles: mold fungi Penicillium and Aspergillus on the polymer surfaces showed that for some samples it made up from 3 to 10 days. Some polymers possess both anti-micotic and anti-bacterial action. Based on investigation results a special technological scheme of assured human protection against microorganisms attack in specific condition of his existence are to be elaborated.

  16. Characterization of chitosan composites with synthetic polymers and inorganic additives.

    Science.gov (United States)

    Lewandowska, Katarzyna

    2015-11-01

    In the present study, the results from thermogravimetric analysis (TGA), contact angle measurements, tensile tests, scanning electron microscopy (SEM) and atomic force microscopy (AFM) of polymer composites containing chitosan (Ch) and montmorillonite (MMT) with and without poly(vinyl alcohol) (PVA) are presented. Measurements of the contact angles for diiodomethane (D) and glycerol (G) on the surfaces of chitosan films, Ch/MMT and Ch/PVA/MMT, were made and surface free energies were calculated. It was found that the wettability of the chitosan/MMT or Ch/PVA/MMT composite films decreased relative to the wettability of chitosan. The microstructure of unmodified polymers and their composites, as observed by SEM and AFM, showed particles that are relatively well dispersed in the polymer matrix. The TGA thermograms and mass loss percentages at different decomposition temperatures showed that the thermal stability of the binary composite slightly decreases upon the addition of PVA. The film mechanical properties such as tensile strength, Young's modulus and tensile strain at break depend on the composition and varied non-uniformly. Both composites possessed a tensile strength and Young's modulus of 27.6-94.3MPa and 1.5-3.5GPa, respectively. The addition of PVA to the composite led to a reduction in tensile strength by approximately 40%.

  17. Impinging jet study of the deposition of colloidal particles on synthetic polymer (Zeonor)

    DEFF Research Database (Denmark)

    Vlček, Jakub; Lapčík, Lubomír; Cech, Jiri

    2014-01-01

    In this study, an impinging jet deposition experiments were performed on synthetic polymer (Zeonor) original and by micro-embossing modified substrates with exactly defined topology as confirmed by AFM and SEM. Deposition experiments were performed at ambient temperature and at selected flow regime...

  18. Multidimensional Mass Spectrometry of Synthetic Polymers and Advanced Materials.

    Science.gov (United States)

    Wesdemiotis, Chrys

    2017-02-01

    Multidimensional mass spectrometry interfaces a suitable ionization technique and mass analysis (MS) with fragmentation by tandem mass spectrometry (MS(2) ) and an orthogonal online separation method. Separation choices include liquid chromatography (LC) and ion-mobility spectrometry (IMS), in which separation takes place pre-ionization in the solution state or post-ionization in the gas phase, respectively. The MS step provides elemental composition information, while MS(2) exploits differences in the bond stabilities of a polymer, yielding connectivity and sequence information. LC conditions can be tuned to separate by polarity, end-group functionality, or hydrodynamic volume, whereas IMS adds selectivity by macromolecular shape and architecture. This Minireview discusses how selected combinations of the MS, MS(2) , LC, and IMS dimensions can be applied, together with the appropriate ionization method, to determine the constituents, structures, end groups, sequences, and architectures of a wide variety of homo- and copolymeric materials, including multicomponent blends, supramolecular assemblies, novel hybrid materials, and large cross-linked or nonionizable polymers.

  19. Synthetic Effect of Vivid Shark Skin and Polymer Additive on Drag Reduction Reinforcement

    Directory of Open Access Journals (Sweden)

    Huawei Chen

    2014-06-01

    Full Text Available Natural shark skin has a well-demonstrated drag reduction function, which is mainly owing to its microscopic structure and mucus on the body surface. In order to improve drag reduction, it is necessary to integrate microscopic drag reduction structure and drag reduction agent. In this study, two hybrid approaches to synthetically combine vivid shark skin and polymer additive, namely, long-chain grafting and controllable polymer diffusion, were proposed and attempted to mimic such hierarchical topography of shark skin without waste of polymer additive. Grafting mechanism and optimization of diffusion port were investigated to improve the efficiency of the polymer additive. Superior drag reduction effects were validated, and the combined effect was also clarified through comparison between drag reduction experiments.

  20. New synthetic amphiphilic polymers for steric protection of liposomes in vivo.

    Science.gov (United States)

    Torchilin, V P; Trubetskoy, V S; Whiteman, K R; Caliceti, P; Ferruti, P; Veronese, F M

    1995-09-01

    Carboxy group-terminated synthetic polymers--branched poly(ethylene glycol), poly(acryloylmorpholine), and poly(vinylpyrrolidone)--were made amphiphilic by derivatization with phosphatidyl ethanolamine via the terminal carboxy group and then incorporated into lecithin-cholesterol liposomes prepared by the detergent dialysis method. Following the biodistribution of liposomes in mice, all three polymers were shown to be effective steric protectors for liposomes and were able to sharply increase liposome circulation times in a concentration-dependent manner. The accumulation of liposomes in the liver decreases. The effects observed are similar to those found for liposomes modified with linear poly(ethylene glycol). At low polymer concentration, amphiphilic branched poly(ethylene glycol) seems to be the most effective liposome protector, most probably, because at the same molar content of anchoring groups, each attachment point carries two polymeric chains and doubles the quantity of liposome-grafted polymer comparing to linear poly(ethylene glycol).

  1. Comparison of spatial frequency domain features for the detection of side attack explosive ballistics in synthetic aperture acoustics

    Science.gov (United States)

    Dowdy, Josh; Anderson, Derek T.; Luke, Robert H.; Ball, John E.; Keller, James M.; Havens, Timothy C.

    2016-05-01

    Explosive hazards in current and former conflict zones are a threat to both military and civilian personnel. As a result, much effort has been dedicated to identifying automated algorithms and systems to detect these threats. However, robust detection is complicated due to factors like the varied composition and anatomy of such hazards. In order to solve this challenge, a number of platforms (vehicle-based, handheld, etc.) and sensors (infrared, ground penetrating radar, acoustics, etc.) are being explored. In this article, we investigate the detection of side attack explosive ballistics via a vehicle-mounted acoustic sensor. In particular, we explore three acoustic features, one in the time domain and two on synthetic aperture acoustic (SAA) beamformed imagery. The idea is to exploit the varying acoustic frequency profile of a target due to its unique geometry and material composition with respect to different viewing angles. The first two features build their angle specific frequency information using a highly constrained subset of the signal data and the last feature builds its frequency profile using all available signal data for a given region of interest (centered on the candidate target location). Performance is assessed in the context of receiver operating characteristic (ROC) curves on cross-validation experiments for data collected at a U.S. Army test site on different days with multiple target types and clutter. Our preliminary results are encouraging and indicate that the top performing feature is the unrolled two dimensional discrete Fourier transform (DFT) of SAA beamformed imagery.

  2. Frontiers in biomaterials the design, synthetic strategies and biocompatibility of polymer scaffolds for biomedical application

    CERN Document Server

    Cao, Shunsheng

    2014-01-01

    Frontiers in Biomaterials: The Design, Synthetic Strategies and Biocompatibility of Polymer Scaffolds for Biomedical Application, Volume 1" highlights the importance of biomaterials and their interaction with biological system. The need for the development of biomaterials as scaffold for tissue regeneration is driven by the increasing demands for materials that mimic functions of extracellular matrices of body tissues.This ebook covers the latest challenges on the biocompatibility of scaffold overtime after implantation and discusses the requirement of innovative technologies and strategies f

  3. Synthetic microfluidic paper: high surface area and high porosity polymer micropillar arrays.

    Science.gov (United States)

    Hansson, Jonas; Yasuga, Hiroki; Haraldsson, Tommy; van der Wijngaart, Wouter

    2016-01-21

    We introduce Synthetic Microfluidic Paper, a novel porous material for microfluidic applications that consists of an OSTE polymer that is photostructured in a well-controlled geometry of slanted and interlocked micropillars. We demonstrate the distinct benefits of Synthetic Microfluidic Paper over other porous microfluidic materials, such as nitrocellulose, traditional paper and straight micropillar arrays: in contrast to straight micropillar arrays, the geometry of Synthetic Microfluidic Paper was miniaturized without suffering capillary collapse during manufacturing and fluidic operation, resulting in a six-fold increased internal surface area and a three-fold increased porous fraction. Compared to commercial nitrocellulose materials for capillary assays, Synthetic Microfluidic Paper shows a wider range of capillary pumping speed and four times lower device-to-device variation. Compared to the surfaces of the other porous microfluidic materials that are modified by adsorption, Synthetic Microfluidic Paper contains free thiol groups and has been shown to be suitable for covalent surface chemistry, demonstrated here for increasing the material hydrophilicity. These results illustrate the potential of Synthetic Microfluidic Paper as a porous microfluidic material with improved performance characteristics, especially for bioassay applications such as diagnostic tests.

  4. The Lone Ranger Mission: Understanding Synthetic Polymer Microbe Interactions In the Atlantic Ocean

    Science.gov (United States)

    Mielke, R.; Neal, A.; Stam, C. N.; Ferry, J. G.; Schlegel, R.; Tsapin, A. I.; Park, S.; Bhartia, R.; Salas, E.; Hug, W.; Behar, A. E.; Nadeau, J.

    2011-12-01

    Pollution is one of the most ubiquitous and insidious problems currently facing the oceans. As synthetic polymer debris degrades, it becomes increasingly accessible to organisms that forage or absorb food particles. However, research on this significant environmental pollution problem has not been able to keep up with the scope of the issue, since some of the first studies published in 1972 by Edward Carpenter. In January 2011, The Lone Ranger Atlantic Expedition, a collaboration between Blue Ocean Sciences (BOS) and the Schmidt Ocean Institute (SOI) transected the Atlantic Ocean covering 3,100 nautical miles sampling the first 15cm of the water column to investigate microbial interactions with synthetic polymer marine debris. Using established and novel techniques of Fourier transform infrared spectroscopy (FT-IR), scanning transmission electron microscopy (STEM), environmental scanning electron microscopy (ESEM), and gas chromatography-mass spectrometry (GC-MS), we were able to image and locate material degradation of pre-production, association of microbial biofilms, and accumulation of persistent organic pollutants (POP's) on environmental microplastics. We then used Spectroscopic Organic Analysis and ArcGIS mapping systems to observe the material degradation and the associated biofilm lattice on the environmental microplastics. This data sheds light on possible mechanisms of material weathering of synthetic polymers in deep ocean environments and new methods for identifying POP's association with them. These new techniques are highly transferable to many studies on material biofilm interactions in the environment.

  5. Thin-film solid-state proton NMR measurements using a synthetic mica substrate: Polymer blends

    Science.gov (United States)

    VanderHart, David L.; Prabhu, Vivek M.; Lavery, Kristopher A.; Dennis, Cindi L.; Rao, Ashwin B.; Lin, Eric K.

    2009-11-01

    Solid-state proton nuclear magnetic resonance (NMR) measurements are performed successfully on polymer blend thin films through the use of synthetic mica as a substrate. When used as a substrate, synthetic fluorophlogopite mica with its proton-free, diamagnetic character, allows for adequate measurement sensitivity while minimally perturbing the proton thin-film spectra, especially relative to more commonly available natural micas. Specifically, we use multiple-pulse techniques in the presence of magic-angle spinning to measure the degree of mixing in two different polymer blend thin films, polystyrene/poly(xylylene ether) and poly(1-methyladamantyl methacrylate) (PMAdMA)/triphenylsulfonium perfluorobutanesulfonate (TPS-PFBS), spin-coated onto mica substrates. Our earlier studies had focused on bulk systems where NMR signals are stronger, but may not be representative of thin films of the same systems that are relevant to many applications such as photoresist formulations in the electronics industry. The superiority of synthetic over natural paramagnetic mica is demonstrated by the maintenance of resolution and spinning sideband intensities (relative to bulk samples) for the synthetic mica samples. In contrast, degraded resolution and large spinning sidebands are shown to typify spectra of the natural mica samples. This approach can be applied to many other proton measurements of solid thin films, thereby greatly extending the types of systems to be investigated. Magnetic susceptibility measurements are also reported for all micas used.

  6. Synthetic Polymer Scaffolds for Stem Cell Transplantation in Retinal Tissue Engineering

    Directory of Open Access Journals (Sweden)

    Michael J. Young

    2011-05-01

    Full Text Available Age-related macular degeneration and retinitis pigmentosa are two leading causes of irreversible blindness characterized by photoreceptor loss. Cell transplantation may be one of the most promising approaches of retinal repair. However, several problems hinder the success of retinal regeneration, including cell delivery and survival, limited cell integration and incomplete cell differentiation. Recent studies show that polymer scaffolds can address these three problems. This article reviews the current literature on synthetic polymer scaffolds used for stem cell transplantation, especially retinal progenitor cells. The advantages and disadvantages of different polymer scaffolds, the role of different surface modifications on cell attachment and differentiation, and controlled drug delivery are discussed. The development of material and surface modification techniques is vital in making cell transplantation a clinical success.

  7. Emerging synthetic strategies for core cross-linked star (CCS) polymers and applications as interfacial stabilizers: bridging linear polymers and nanoparticles.

    Science.gov (United States)

    Chen, Qijing; Cao, Xueteng; Xu, Yuanyuan; An, Zesheng

    2013-10-01

    Core cross-linked star (CCS) polymers become increasingly important in polymer science and are evaluated in many value-added applications. However, limitations exist to varied degrees for different synthetic methods. It is clear that improvement in synthetic efficiency is fundamental in driving this field moving even further. Here, the most recent advances are highlighted in synthetic strategies, including cross-linking with cross-linkers of low solubility, polymerization-induced self-assembly in aqueous-based heterogeneous media, and cross-linking via dynamic covalent bonds. The understanding of CCS polymers is also further refined to advocate their role as an intermediate between linear polymers and polymeric nanoparticles, and their use as interfacial stabilizers is rationalized within this context.

  8. Synthetic strategies for the fluorescent labeling of epichlorohydrin-branched cyclodextrin polymers.

    Science.gov (United States)

    Malanga, Milo; Bálint, Mihály; Puskás, István; Tuza, Kata; Sohajda, Tamás; Jicsinszky, László; Szente, Lajos; Fenyvesi, Éva

    2014-01-01

    The fluorescent tagging of cyclodextrin derivatives enlarges their spectroscopic properties thus generating chemosensors, biological tools for visualization and sophisticated photoresponsive devices. Cyclodextrin polymers, due to the cooperative interactions, exhibit additional properties compared to their monomeric counterpart. These macromolecules can be prepared either in well water-soluble form or as gels of high swelling. Two versatile synthetic strategies for introducing a fluorescent tag (rhodamine, fluorescein, nitrobenzofuran or coumarin) into the water-soluble epichlorohydrin branched cyclodextrin polymers were worked out and compared. The fluorescent labeling was realized in three steps: 1) building in azido moieties, 2) transforming the azido groups into amino groups and 3) coupling the proper fluorescent compound to the amino groups. The other strategy started by functionalization of the monomer prior to the branching. Either the fluorescent-labeled monomer or the intermediate azido derivative of the monomer was branched. Further tuning of the properties of the polymer was achieved via branching of the methylated cyclodextrin derivative. The key intermediates and the fluorescent final products were characterized by various spectroscopic techniques and capillary electrophoresis. The applied synthetic routes were evaluated based on the molecular weight, cyclodextrin content of the products and the efficiency of labeling.

  9. Synthetic strategies for the fluorescent labeling of epichlorohydrin-branched cyclodextrin polymers

    Directory of Open Access Journals (Sweden)

    Milo Malanga

    2014-12-01

    Full Text Available The fluorescent tagging of cyclodextrin derivatives enlarges their spectroscopic properties thus generating chemosensors, biological tools for visualization and sophisticated photoresponsive devices. Cyclodextrin polymers, due to the cooperative interactions, exhibit additional properties compared to their monomeric counterpart. These macromolecules can be prepared either in well water-soluble form or as gels of high swelling. Two versatile synthetic strategies for introducing a fluorescent tag (rhodamine, fluorescein, nitrobenzofuran or coumarin into the water-soluble epichlorohydrin branched cyclodextrin polymers were worked out and compared. The fluorescent labeling was realized in three steps: 1 building in azido moieties, 2 transforming the azido groups into amino groups and 3 coupling the proper fluorescent compound to the amino groups. The other strategy started by functionalization of the monomer prior to the branching. Either the fluorescent-labeled monomer or the intermediate azido derivative of the monomer was branched. Further tuning of the properties of the polymer was achieved via branching of the methylated cyclodextrin derivative. The key intermediates and the fluorescent final products were characterized by various spectroscopic techniques and capillary electrophoresis. The applied synthetic routes were evaluated based on the molecular weight, cyclodextrin content of the products and the efficiency of labeling.

  10. Preparation of a zeolite-modified polymer monolith for identification of synthetic colorants in lipsticks

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Huiqi; Li, Zheng [College of Chemistry, Jilin University, Changchun 130012 (China); Niu, Qian [Jilin Entry-Exit Inspection and Quarantine Bureau, Changchun 130062 (China); Ma, Jiutong [College of Chemistry, Jilin University, Changchun 130012 (China); Jia, Qiong, E-mail: jiaqiong@jlu.edu.cn [College of Chemistry, Jilin University, Changchun 130012 (China)

    2015-10-30

    Graphical abstract: Poly(methacrylic acid-ethylene dimethacrylate) monolithic column embedded with zeolites was prepared and employed for the polymer monolith microextraction of colorants combined with HPLC. - Highlights: • Zeolite, as a kind of mesoporous material, was firstly combined with PMME. • Zeolite@poly(MAA-EDMA) monolith columns were prepared for the enrichment of colorants. • Zeolite@poly(MAA-EDMA) monolith columns demonstrated relatively high extraction capacity. - Abstract: A novel zeolite-modified poly(methacrylic acid-ethylenedimethacrylate) (zeolite@poly(MAA-EDMA)) monolithic column was prepared with the in situ polymerization method and employed in polymer monolith microextraction for the separation and preconcentration of synthetic colorants combined with high performance liquid chromatography. The polymer was characterized by scanning electronmicroscopy, Fourier-transform infrared spectroscopy, X-ray photoelectron spectroscopy, and thermo-gravimetric analysis. Various parameters affecting the extraction efficiency were investigated and optimized. Under the optimum experimental conditions, we obtained acceptable linearities, low limits of detection, and good intra-day/inter-day relative standard deviations. The method was applied to the determination of synthetic colorants in lipsticks with recoveries ranged from 70.7% to 109.7%. Compared with conventional methacrylic acid-based monoliths, the developed monolith exhibited high enrichment capacity because of the introduction of zeolites into the preparation process. The extraction efficiency followed the order: zeolite@poly(MAA-EDMA) > poly(MAA-EDMA) > direct HPLC analysis.

  11. Protein-polymer nano-machines. Towards synthetic control of biological processes

    Directory of Open Access Journals (Sweden)

    Alexander Cameron

    2004-09-01

    Full Text Available Abstract The exploitation of nature's machinery at length scales below the dimensions of a cell is an exciting challenge for biologists, chemists and physicists, while advances in our understanding of these biological motifs are now providing an opportunity to develop real single molecule devices for technological applications. Single molecule studies are already well advanced and biological molecular motors are being used to guide the design of nano-scale machines. However, controlling the specific functions of these devices in biological systems under changing conditions is difficult. In this review we describe the principles underlying the development of a molecular motor with numerous potential applications in nanotechnology and the use of specific synthetic polymers as prototypic molecular switches for control of the motor function. The molecular motor is a derivative of a TypeI Restriction-Modification (R-M enzyme and the synthetic polymer is drawn from the class of materials that exhibit a temperature-dependent phase transition. The potential exploitation of single molecules as functional devices has been heralded as the dawn of new era in biotechnology and medicine. It is not surprising, therefore, that the efforts of numerous multidisciplinary teams 12. have been focused in attempts to develop these systems. as machines capable of functioning at the low sub-micron and nanometre length-scales 3. However, one of the obstacles for the practical application of single molecule devices is the lack of functional control methods in biological media, under changing conditions. In this review we describe the conceptual basis for a molecular motor (a derivative of a TypeI Restriction-Modification enzyme with numerous potential applications in nanotechnology and the use of specific synthetic polymers as prototypic molecular switches for controlling the motor function 4.

  12. Mineralization of Synthetic Polymer Scaffolds: A Bottom-upApproach for the Development of Artificial Bone

    Energy Technology Data Exchange (ETDEWEB)

    Song, Jie; Viengkham, Malathong; Bertozzi, Carolyn R.

    2004-09-27

    The controlled integration of organic and inorganic components confers natural bone with superior mechanical properties. Bone biogenesis is thought to occur by templated mineralization of hard apatite crystals by an elastic protein scaffold, a process we sought to emulate with synthetic biomimetic hydrogel polymers. Crosslinked polymethacrylamide and polymethacrylate hydrogels were functionalized with mineral-binding ligands and used to template the formation of hydroxyapatite. Strong adhesion between the organic and inorganic materials was achieved for hydrogels functionalized with either carboxylate or hydroxy ligands. The mineral-nucleating potential of hydroxyl groups identified here broadens the design parameters for synthetic bone-like composites and suggests a potential role for hydroxylated collagen proteins in bone mineralization.

  13. Monte Carlo modeling of atomic oxygen attack of polymers with protective coatings on LDEF

    Science.gov (United States)

    Banks, Bruce A.; Degroh, Kim K.; Auer, Bruce M.; Gebauer, Linda; Edwards, Jonathan L.

    1993-01-01

    Characterization of the behavior of atomic oxygen interaction with materials on the Long Duration Exposure Facility (LDEF) assists in understanding of the mechanisms involved. Thus the reliability of predicting in-space durability of materials based on ground laboratory testing should be improved. A computational model which simulates atomic oxygen interaction with protected polymers was developed using Monte Carlo techniques. Through the use of an assumed mechanistic behavior of atomic oxygen interaction based on in-space atomic oxygen erosion of unprotected polymers and ground laboratory atomic oxygen interaction with protected polymers, prediction of atomic oxygen interaction with protected polymers on LDEF was accomplished. However, the results of these predictions are not consistent with the observed LDEF results at defect sites in protected polymers. Improved agreement between observed LDEF results and predicted Monte Carlo modeling can be achieved by modifying of the atomic oxygen interactive assumptions used in the model. LDEF atomic oxygen undercutting results, modeling assumptions, and implications are presented.

  14. Clinical efficacy and cost-effectiveness of a new synthetic polymer sheet wound dressing.

    Science.gov (United States)

    Motta, G; Dunham, L; Dye, T; Mentz, J; O'Connell-Gifford, E; Smith, E

    1999-10-01

    Stage II and III pressure ulcers present product development and product choice challenges to manufacturers and professional wound care clinicians respectively. We evaluated the clinical performance and cost of use associated with a new synthetic polymer dressing for the management of these wounds. A total of 10 home healthcare patients, each with a Stage II or III pressure ulcer, were enrolled and randomized for wound treatment using either the new polymer hydrogel wound dressing or the leading market hydrocolloid dressing. Dressings were changed on an as needed basis only. The wounds were assessed weekly and parameters recorded using the Bates-Jensen Pressure Sore Status Tool. In addition, the clinical performance of the dressing and treatment costs were evaluated. The overall healing rate for the two groups was similar. However the new polymer hydrogel dressing was found to have a more favorable overall clinical performance evaluation based largely on its more favorable support of autolytic debridement. The new polymeric dressing also had a more favorable cost of use based on the evaluation. We conclude that the new polymer dressing may be a favorable alternative to the leading market hydrocolloid dressing for the treatment of Stage II and III pressure ulcers due to a better clinical performance and the substantially lower treatment costs associated with its use.

  15. Influence of natural humic acids and synthetic phenolic polymers on fibrinolysis

    Science.gov (United States)

    Klöcking, Hans-Peter

    The influence of synthetic and natural phenolic polymers on the release of plasminogen activator was studied in an isolated, perfused, vascular preparation (pig ear). Of the tested synthetic phenolic polymers, the oxidation products of caffeic acid (KOP) and 3,4-dihydroxyphenylacetic acid (3,4-DHPOP), at a concentration of 50 µg/ml perfusate, were able to increase the plasminogen activator activity by 70%. The oxidation products of chlorogenic acid (CHOP), hydrocaffeic acid (HYKOP), pyrogallol (PYROP) and gallic acid (GALOP), at the same concentration, exerted no influence on the release of plasminogen activator. Of the naturally occurring humic acids, the influence of sodium humate was within the same order of magnitude as KOP and 3,4-DHPOP. Ammonium humate was able to increase the plasminogen activator release only at a concentration of 100 µg/ml perfusate. In rats, the t-PA activity increased after i.v. application of 10 mg/kg of KOP, Na-HS or NH4-HS.

  16. Compressive cyclic ratcheting and fatigue of synthetic, soft biomedical polymers in solution.

    Science.gov (United States)

    Miller, Andrew T; Safranski, David L; Smith, Kathryn E; Guldberg, Robert E; Gall, Ken

    2016-02-01

    The use of soft, synthetic materials for the replacement of soft, load-bearing tissues has been largely unsuccessful due to a lack of materials with sufficient fatigue and wear properties, as well as a lack of fundamental understanding on the relationship between material structure and behavior under cyclic loads. In this study, we investigated the response of several soft, biomedical polymers to cyclic compressive stresses under aqueous conditions and utilized dynamic mechanical analysis and differential scanning calorimetry to evaluate the role of thermo-mechanical transitions on such behavior. Studied materials include: polycarbonate urethane, polydimethylsiloxane, four acrylate copolymers with systematically varied thermo-mechanical transitions, as well as bovine meniscal tissue for comparison. Materials showed compressive moduli between 2.3 and 1900MPa, with polycarbonate urethane (27.3MPa) matching closest to meniscal tissue (37.0MPa), and also demonstrated a variety of thermo-mechanical transition behaviors. Cyclic testing resulted in distinct fatigue-life curves, with failure defined as either classic fatigue fracture or a defined increased in maximum strain due to ratcheting. Our study found that polymers with sufficient dissipation mechanisms at the testing temperature, as evidenced by tan delta values, were generally tougher than those with less dissipation and exhibited ratcheting rather than fatigue fracture much like meniscal tissue. Strain recovery tests indicated that, for some toughened polymers, the residual strain following our cyclic loading protocol could be fully recovered. The similarity in ratcheting behavior, and lack of fatigue fracture, between the meniscal tissue and toughened polymers indicates that such polymers may have potential as artificial soft tissue.

  17. Design of biomimetic catalysts by molecular imprinting in synthetic polymers: the role of transition state stabilization.

    Science.gov (United States)

    Wulff, Günter; Liu, Junqiu

    2012-02-21

    The impressive efficiency and selectivity of biological catalysts has engendered a long-standing effort to understand the details of enzyme action. It is widely accepted that enzymes accelerate reactions through their steric and electronic complementarity to the reactants in the rate-determining transition states. Thus, tight binding to the transition state of a reactant (rather than to the corresponding substrate) lowers the activation energy of the reaction, providing strong catalytic activity. Debates concerning the fundamentals of enzyme catalysis continue, however, and non-natural enzyme mimics offer important additional insight in this area. Molecular structures that mimic enzymes through the design of a predetermined binding site that stabilizes the transition state of a desired reaction are invaluable in this regard. Catalytic antibodies, which can be quite active when raised against stable transition state analogues of the corresponding reaction, represent particularly successful examples. Recently, synthetic chemistry has begun to match nature's ability to produce antibody-like binding sites with high affinities for the transition state. Thus, synthetic, molecularly imprinted polymers have been engineered to provide enzyme-like specificity and activity, and they now represent a powerful tool for creating highly efficient catalysts. In this Account, we review recent efforts to develop enzyme models through the concept of transition state stabilization. In particular, models for carboxypeptidase A were prepared through the molecular imprinting of synthetic polymers. On the basis of successful experiments with phosphonic esters as templates to arrange amidinium groups in the active site, the method was further improved by combining the concept of transition state stabilization with the introduction of special catalytic moieties, such as metal ions in a defined orientation in the active site. In this way, the imprinted polymers were able to provide both an

  18. Natural-Synthetic Hybrid Polymers Developed via Electrospinning: The Effect of PET in Chitosan/Starch System

    OpenAIRE

    2011-01-01

    Chitosan is an amino polysaccharide found in nature, which is biodegradable, nontoxic and biocompatible. It has versatile features and can be used in a variety of applications including films, packaging, and also in medical surgery. Recently a possibility to diversify chitosan properties has emerged by combining it with synthetic materials to produce novel natural-synthetic hybrid polymers. We have studied structural and thermophysical properties of chitosan + starch + poly(ethylene terephtha...

  19. Biodegradability of PP/HMSPP and natural and synthetic polymers blends in function of gamma irradiation degradation

    Science.gov (United States)

    Cardoso, Elisabeth C. L.; Scagliusi, Sandra R.; Lima, Luis F. C. P.; Bueno, Nelson R.; Brant, Antonio J. C.; Parra, Duclerc F.; Lugão, Ademar B.

    2014-01-01

    Polymers are used for numerous applications in different industrial segments, generating enormous quantities of discarding in the environment. Polymeric materials composites account for an estimated from 20 to 30% total volume of solid waste. Polypropylene (PP) undergoes crosslinking and extensive main chain scissions when submitted to ionizing irradiation; as one of the most widely used linear hydrocarbon polymers, PP, made from cheap petrochemical feed stocks, shows easy processing leading it to a comprehensive list of finished products. Consequently, there is accumulation in the environment, at 25 million tons per year rate, since polymeric products are not easily consumed by microorganisms. PP polymers are very bio-resistant due to involvement of only carbon atoms in main chain with no hydrolysable functional group. Several possibilities have been considered to minimize the environmental impact caused by non-degradable plastics, subjecting them to: physical, chemical and biological degradation or combination of all these due to the presence of moisture, air, temperature, light, high energy radiation or microorganisms. There are three main classes of biodegradable polymers: synthetic polymers, natural polymers and blends of polymers in which one or more components are readily consumed by microorganisms. This work aims to biodegradability investigation of a PP/HMSPP (high melt strength polypropylene) blended with sugarcane bagasse, PHB (poly-hydroxy-butyrate) and PLA (poly-lactic acid), both synthetic polymers, at a 10% level, subjected to gamma radiation at 50, 100, 150 and 200 kGy doses. Characterization will comprise IR, DSC, TGA, OIT and Laboratory Soil Burial Test (LSBT).

  20. Hemostatic potential of natural/synthetic polymer based hydrogels crosslinked by gamma radiation

    Science.gov (United States)

    Barba, Bin Jeremiah D.; Tranquilan-Aranilla, Charito; Abad, Lucille V.

    2016-01-01

    Various raw materials and hydrogels prepared from their combination were assessed for hemostatic capability using swine whole blood clotting analysis. Initial screening showed efficient coagulative properties from κ-carrageenan and its carboxymethylated form, and α-chitosan, even compared to commercial products like QuikClot Zeolite Powder. Blending natural and synthetic polymers formed into hydrogels using gamma radiation produced materials with improved properties. KC and CMKC hydrogels were found to have the lowest blood clotting index in granulated form and had the higher capacity for platelet adhesion in foamed form compared to GelFoam. Possible mechanisms involved in the evident thrombogenicity of the materials include adsorption of platelets and related proteins that aid in platelet activation (primary hemostasis), absorption of water to concentrate protein factors that control the coagulation cascade, contact activation by its negatively charged surface and the formation of gel-blood clots.

  1. Protein and synthetic polymer injection for induction of obstructive hydrocephalus in rats

    Directory of Open Access Journals (Sweden)

    Del Bigio Marc R

    2007-09-01

    Full Text Available Abstract Background The objective of this study was to develop a simple and inexpensive animal model of induced obstructive hydrocephalus with minimal tissue inflammation, as an alternative to kaolin injection. Materials Two-hundred and two male Sprague-Dawley rats aged 3 weeks received intracisternal injections of kaolin (25% suspension, Matrigel, type 1 collagen from rat tail, fibrin glue (Tisseel, n-butyl-cyanoacrylate (NBCA, or ethylene vinyl alcohol copolymer (Onyx-18 and Onyx-34. Magnetic resonance imaging was used to assess ventricle size. Animals were euthanized at 2, 5, 10 and 14 days post-injection for histological analysis. Results Kaolin was associated with 10% mortality and successful induction of hydrocephalus in 97% of survivors (ventricle area proportion 0.168 ± 0.018. Rapidly hardening agents (fibrin glue, NBCA, vinyl polymer had high mortality rates and low success rates in survivors. Only Matrigel had relatively low mortality (17% and moderate success rate (20%. An inflammatory response with macrophages and some lymphocytes was associated with kaolin. There was negligible inflammation associated with Matrigel. A severe inflammatory response with giant cell formation was associated with ethylene vinyl alcohol copolymer. Conclusion Kaolin predictably produces moderate to severe hydrocephalus with a mild chronic inflammatory reaction and fibrosis of the leptomeninges. Other synthetic polymers and biopolymers tested are unreliable and cause different types of inflammation.

  2. Synthetic

    Directory of Open Access Journals (Sweden)

    Anna Maria Manferdini

    2010-06-01

    Full Text Available Traditionally materials have been associated with a series of physical properties that can be used as inputs to production and manufacturing. Recently we witnessed an interest in materials considered not only as ‘true matter’, but also as new breeds where geometry, texture, tooling and finish are able to provoke new sensations when they are applied to a substance. These artificial materials can be described as synthetic because they are the outcome of various qualities that are not necessarily true to the original matter, but they are the combination of two or more parts, whether by design or by natural processes. The aim of this paper is to investigate the potential of architectural surfaces to produce effects through the invention of new breeds of artificial matter, using micro-scale details derived from Nature as an inspiration.

  3. Catechol-Functionalized Synthetic Polymer as a Dental Adhesive to Contaminated Dentin Surface for a Composite Restoration

    Science.gov (United States)

    2015-01-01

    This study reports a synthetic polymer functionalized with catechol groups as dental adhesives. We hypothesize that a catechol-functionalized polymer functions as a dental adhesive for wet dentin surfaces, potentially eliminating the complications associated with saliva contamination. We prepared a random copolymer containing catechol and methoxyethyl groups in the side chains. The mechanical and adhesive properties of the polymer to dentin surface in the presence of water and salivary components were determined. It was found that the new polymer combined with an Fe3+ additive improved bond strength of a commercial dental adhesive to artificial saliva contaminated dentin surface as compared to a control sample without the polymer. Histological analysis of the bonding structures showed no leakage pattern, probably due to the formation of Fe–catechol complexes, which reinforce the bonding structures. Cytotoxicity test showed that the polymers did not inhibit human gingival fibroblast cells proliferation. Results from this study suggest a potential to reduce failure of dental restorations due to saliva contamination using catechol-functionalized polymers as dental adhesives. PMID:26176305

  4. Catechol-Functionalized Synthetic Polymer as a Dental Adhesive to Contaminated Dentin Surface for a Composite Restoration.

    Science.gov (United States)

    Lee, Sang-Bae; González-Cabezas, Carlos; Kim, Kwang-Mahn; Kim, Kyoung-Nam; Kuroda, Kenichi

    2015-08-10

    This study reports a synthetic polymer functionalized with catechol groups as dental adhesives. We hypothesize that a catechol-functionalized polymer functions as a dental adhesive for wet dentin surfaces, potentially eliminating the complications associated with saliva contamination. We prepared a random copolymer containing catechol and methoxyethyl groups in the side chains. The mechanical and adhesive properties of the polymer to dentin surface in the presence of water and salivary components were determined. It was found that the new polymer combined with an Fe(3+) additive improved bond strength of a commercial dental adhesive to artificial saliva contaminated dentin surface as compared to a control sample without the polymer. Histological analysis of the bonding structures showed no leakage pattern, probably due to the formation of Fe-catechol complexes, which reinforce the bonding structures. Cytotoxicity test showed that the polymers did not inhibit human gingival fibroblast cells proliferation. Results from this study suggest a potential to reduce failure of dental restorations due to saliva contamination using catechol-functionalized polymers as dental adhesives.

  5. Removal of Chromium(III Using Synthetic Polymers, Copolymers and their Sulfonated Derivatives as Adsorbents

    Directory of Open Access Journals (Sweden)

    Farah Kanwal

    2012-01-01

    Full Text Available This study is concerned with the development of some synthetic polymers, copolymers and their sulfonated derivatives as adsorbents. The effectiveness of these adsorbents in removing Cr(III from aqueous solution was evaluated by batch technique. The influence of different experimental parameters on removal process such as solution pH, contact time, adsorbent dose, Cr(III concentration and temperature were evaluated. Adsorption equilibrium was achieved in 20 to 30 min. at pH > 5. The Langmuir, Freundlich and Temkin adsorption isotherms were used to elucidate the observed sorption phenomena. The maximum Cr(III37.8 mg/gram of PS(polystyrene and 37.2 mg/g of SAN (styrene/acrylonitrile copolymer was removed as evaluated from Langmuir isotherm while the heat of sorption was in the range 0.21–7.65 kJ/mol as evaluated from Temkin isotherm. It can be concluded that PS developed in this study exhibited considerable adsorption potential for application in removal of Cr(III from aqueous media as compared to its copolymers and other derivatives used in this study.

  6. Electron photodetachment dissociation for structural characterization of synthetic and bio-polymer anions.

    Science.gov (United States)

    Antoine, Rodolphe; Lemoine, Jérôme; Dugourd, Philippe

    2014-01-01

    Tandem mass spectrometry (MS-MS) is a generic term evoking techniques dedicated to structural analysis, detection or quantification of molecules based on dissociation of a precursor ion into fragments. Searching for the most informative fragmentation patterns has led to the development of a vast array of activation modes that offer complementary ion reactivity and dissociation pathways. Collisional activation of ions using atoms, molecules or surface resulting in unimolecular dissociation of activated ions still plays a key role in tandem mass spectrometry. The discovery of electron capture dissociation (ECD) and then the development of other electron-ion or ion/ion reaction methods, constituted a significant breakthrough, especially for structural analysis of large biomolecules. Similarly, photon activation opened promising new frontiers in ion fragmentation owing to the ability of tightly controlled internal energy deposition and easy implementation on commercial instruments. Ion activation by photons includes slow heating methods such as infrared multiple photon dissociation (IRMPD) and black-body infrared radiative dissociation (BIRD) and higher energy methods like ultra-violet photodissociation (UVPD) and electron photo detachment dissociation (EPD). EPD occurs after UV irradiation of multiply negatively charged ions resulting in the formation of oxidized radical anions. The present paper reviews the hypothesis regarding the mechanisms of electron photo-detachment, radical formation and direct or activated dissociation pathways that support the observation of odd and even electron product ions. Finally, the value of EPD as a complementary structural analysis tool is illustrated through selected examples of synthetic polymers, oligonucleotides, polypeptides, lipids, and polysaccharides.

  7. Fibrous scaffolds made by co-electrospinning soluble eggshell membrane protein with biodegradable synthetic polymers.

    Science.gov (United States)

    Xiong, Xi; Li, Qiang; Lu, Jian-Wei; Guo, Zhao-Xia; Sun, Zhao-Hui; Yu, Jian

    2012-01-01

    Soluble eggshell membrane protein (SEP), isolated from natural eggshell membrane, was co-electrospun with biodegradable synthetic polymers poly(propylene carbonate) (PPC) and poly(lactic acid) (PLA) in various proportions from 1,1,1,3,3,3-hexafluoro-2-propanol (HFIP) solutions in order to prepare fibrous scaffolds having simultaneously good mechanical properties and biocompatibility. The fiber morphology was observed by field emission scanning electron microscopy, showing uniform fibers with diameter of 1.2-1.0 and 1.3-0.7 um for PPC/SEP and PLA/SEP blend fibers, respectively. Transmission electron microscopy observation shows that the blend fibers have domain-matrix phase morphology with fiber-like SEP domains in the PPC or PLA matrix, indicating the occurrence of phase separation, although interaction exists between PPC (or PLA) and SEP, as revealed by attenuated total reflectance Fourier transform infrared spectroscopy. The mechanical properties were evaluated by uniaxial tensile tests and showed that both the tensile strength and elongation at break increase with increasing incorporation of PPC (or PLA). The surface composition was investigated by X-ray photoelectron spectroscopy and SEP was found on the fiber surfaces, and as a result the surfaces of the fibrous scaffolds are superhydrophilic. NIH3T3 cell culture tests demonstrate that the PPC/SEP and PLA/SEP blend fibrous scaffolds have a much improved biocompatibility compared to pure PPC or PLA fibrous scaffolds.

  8. Size exclusion chromatography of synthetic polymers and biopolymers on common reversed phase and hydrophilic interaction chromatography columns.

    Science.gov (United States)

    Caltabiano, Anna M; Foley, Joe P; Barth, Howard G

    2016-03-11

    This work describes the applicability of common reversed phase and HILIC columns for size exclusion chromatography of synthetic and natural polymers. Depending on the nature of the solute and column stationary phase, a "non-retention" condition must be created with the aid of the mobile phase to achieve a unique size-based separation in isocratic mode. The various bonded phases show remarkable differences in size separations that are controlled by mobile phase conditions. Polymer-mobile phase and column-mobile phase solvation interactions determine polymer hydrodynamic volume (or solute bulkiness) and polymer-column steric interaction. Solvation interactions in turn depend on polymer, mobile phase and stationary phase polarities. Column-mobile phase solvation interactions determine the structural order of the bonded ligands that can vary from ordered (extended, aligned away from the silica substrate) to disordered (folded, pointing toward the silica substrate). Chain order increases with increased solvent penetration into the bonded phase. Increased chain order reduces pore volume, and therefore decreases the size-separation efficiency of a column. Conversely, decreased chain order increases pore volume and therefore increases the size-separation efficiency. The thermodynamic quality of the mobile phase also plays a significant role in the separation of polymers. "Poor" solvents can significantly reduce the hydrodynamic diameter of a solute and thus change their retention behavior. Medium polarity stationary phases, such as fluoro-phenyl and cyano, exhibit a unique retention behavior. With an appropriate polarity mobile phase, polar and non-polar synthetic polymers of the same molecular masses can be eluted at the same retention volumes.

  9. Natural-synthetic hybrid polymers developed via electrospinning: the effect of PET in chitosan/starch system.

    Science.gov (United States)

    Espíndola-González, Adolfo; Martínez-Hernández, Ana Laura; Fernández-Escobar, Francisco; Castaño, Victor Manuel; Brostow, Witold; Datashvili, Tea; Velasco-Santos, Carlos

    2011-01-01

    Chitosan is an amino polysaccharide found in nature, which is biodegradable, nontoxic and biocompatible. It has versatile features and can be used in a variety of applications including films, packaging, and also in medical surgery. Recently a possibility to diversify chitosan properties has emerged by combining it with synthetic materials to produce novel natural-synthetic hybrid polymers. We have studied structural and thermophysical properties of chitosan + starch + poly(ethylene terephthalate) (Ch + S + PET) fibers developed via electrospinning. Properties of these hybrids polymers are compared with extant chitosan containing hybrids synthesized by electrospinning. Molecular interactions and orientation in the fibers are analyzed by infrared and Raman spectroscopies respectively, morphology by scanning electron microscopy and thermophysical properties by thermogravimetric analysis and differential scanning calorimetry. Addition of PET to Ch + S systems results in improved thermal stability at elevated temperatures.

  10. Natural-Synthetic Hybrid Polymers Developed via Electrospinning: The Effect of PET in Chitosan/Starch System

    Directory of Open Access Journals (Sweden)

    Carlos Velasco-Santos

    2011-03-01

    Full Text Available Chitosan is an amino polysaccharide found in nature, which is biodegradable, nontoxic and biocompatible. It has versatile features and can be used in a variety of applications including films, packaging, and also in medical surgery. Recently a possibility to diversify chitosan properties has emerged by combining it with synthetic materials to produce novel natural-synthetic hybrid polymers. We have studied structural and thermophysical properties of chitosan + starch + poly(ethylene terephthalate (Ch + S + PET fibers developed via electrospinning. Properties of these hybrids polymers are compared with extant chitosan containing hybrids synthesized by electrospinning. Molecular interactions and orientation in the fibers are analyzed by infrared and Raman spectroscopies respectively, morphology by scanning electron microscopy and thermophysical properties by thermogravimetric analysis and differential scanning calorimetry. Addition of PET to Ch + S systems results in improved thermal stability at elevated temperatures.

  11. Preparation of Dis-Azo Dyes Derived from p-Aminophenol and Their Fastness Properties for Synthetic Polymer-Fibres

    Science.gov (United States)

    Otutu, J. O.; Okoro, D.; Ossai, E. K.

    The preparation and properties of a series of dis-azo dyes derived from p-aminophenol is described. The influence on colour, dyeing fastness properties of the dyes on synthetic polymer-fibres is reported. Most of the dyes synthesized afford better light fastness and better wet (wash, perspiration) fastness on PET than on nylon 6 fabric. The structure of each compound was confirmed by using infrared, UV-VIS and elemental analysis.

  12. α-Amino acid containing degradable polymers as functional biomaterials: rational design, synthetic pathway, and biomedical applications.

    Science.gov (United States)

    Sun, Huanli; Meng, Fenghua; Dias, Aylvin A; Hendriks, Marc; Feijen, Jan; Zhong, Zhiyuan

    2011-06-13

    Currently, biomedical engineering is rapidly expanding, especially in the areas of drug delivery, gene transfer, tissue engineering, and regenerative medicine. A prerequisite for further development is the design and synthesis of novel multifunctional biomaterials that are biocompatible and biologically active, are biodegradable with a controlled degradation rate, and have tunable mechanical properties. In the past decades, different types of α-amino acid-containing degradable polymers have been actively developed with the aim to obtain biomimicking functional biomaterials. The use of α-amino acids as building units for degradable polymers may offer several advantages: (i) imparting chemical functionality, such as hydroxyl, amine, carboxyl, and thiol groups, which not only results in improved hydrophilicity and possible interactions with proteins and genes, but also facilitates further modification with bioactive molecules (e.g., drugs or biological cues); (ii) possibly improving materials biological properties, including cell-materials interactions (e.g., cell adhesion, migration) and degradability; (iii) enhancing thermal and mechanical properties; and (iv) providing metabolizable building units/blocks. In this paper, recent developments in the field of α-amino acid-containing degradable polymers are reviewed. First, synthetic approaches to prepare α-amino acid-containing degradable polymers will be discussed. Subsequently, the biomedical applications of these polymers in areas such as drug delivery, gene delivery and tissue engineering will be reviewed. Finally, the future perspectives of α-amino acid-containing degradable polymers will be evaluated.

  13. Enzymatic modification of natural and synthetic polymers using lipases and proteases

    Science.gov (United States)

    Chakraborty, Soma

    Enzymatic modification of natural/synthetic polymers [starch nanoparticles, poly (n-alkyl acrylates) and poly(vinyl formamide)] was studied. Enzymes used for catalysis were lipases and proteases. Starch nanoparticles (40nm diameter) were incorporated into AOT-coated reverse micelles. Reactions performed with the acylating agents vinyl stearate, epsilon-caprolactone and maleic anhydride in toluene in presence of Novozyme-435 at 40°C for 36h gave products with degrees of substitution of 0.8, 0.6 and 0.4 respectively. DEPT-135 NMR spectra revealed that the modification occurred regioselectively at the C-6 position of the glucose units. Infrared microspectroscopy showed that the surfactant coated starch nanoparticles diffuse into pores of Novozyme-435 beads, coming in close proximity with CALB to promote modification. The modified products retained nanoscale dimensions. Catalysis of amide bond formation between a low molar mass amine and ester side groups of poly(n-alkyl acrylates)[poly(ethyl acrylate), poly(methyl acrylate) and poly(butyl acrylate)] was also examined. The nucleophiles were mono and diamines. Among the poly(n-alkyl acrylates) and the lipases studied, poly(ethyl acrylate) was the preferred substrate and Novozyme-435 the most active lipase. Poly(ethyl acrylate) in 80% by-volume toluene was reacted with 1 equivalent per repeat unit of hexyl amine at 70°C in presence of Novozyme-435. The product contained 10.6 mol% amide groups. Attempts to increase the amidation beyond 10--11 mol% by increasing the reaction time or use of fresh enzyme were unsuccessful, showing that poly(ethylacrylate-co-10mol%hexylacrylamide) is a poor substrate for further acylation. When chiral amines ([R,S]-alpha-methyl benzylamine, [R,S]-beta-methyl phenyl amine) were used as nucleophiles, Novozyme-435 enantioselectively catalyzed amidation of poly(ethyl acrylate). Poly(vinyl formamide), P(VfAm) by acid or base-catalyzed hydrolysis leads to poly(vinylamine), P(VAm), and

  14. Mechanochemical Strengthening of a Synthetic Polymer in Response to Typically Destructive Shear Forces

    Science.gov (United States)

    2013-08-04

    shear conditions led to a solid polymer that, unlike extrusion of 1 alone, was insoluble in each of five different solvents and solvent combinations...but after 13 minutes of extrusion , the required torque begins to increase slightly in a manner not observed in control polymers , which suggests an...and the same ARM-1 polymer one week post- extrusion (ARM-1c, black). The dotted lines designate the precursor carboxylate absorbance peak at 1,571

  15. Understanding the folding process of synthetic polymers by small-molecule folding agents

    Indian Academy of Sciences (India)

    S G Ramkumar; S Ramakrishnan

    2008-01-01

    Two acceptor containing polyimides PDI and NDI carrying pyromellitic diimide units and 1,4,5,8-naphthalene tetracarboxy diimide units, respectively, along with hexa(oxyethylene) (EO6) segments as linkers, were prepared from the corresponding dianhydrides and diamines. These polyimides were made to fold by interaction with specifically designed folding agents containing a dialkoxynaphthalene (DAN) donor linked to a carboxylic acid group. The alkali-metal counter-ion of the donor carboxylic acid upon complexation with the EO6 segment brings the DAN unit in the right location to induce a charge-transfer complex formation with acceptor units in the polymer backbone. This two-point interaction between the folding agent and the polymer backbone leads to a folding of the polymer chain, which was readily monitored by NMR titrations. The effect of various parameters, such as structures of the folding agent and polymer, and the solvent composition, on the folding propensities of the polymer was studied.

  16. Synthetic polymers in the marine environment: a rapidly increasing, long-term threat.

    Science.gov (United States)

    Moore, Charles James

    2008-10-01

    Synthetic polymers, commonly known as plastics, have been entering the marine environment in quantities paralleling their level of production over the last half century. However, in the last two decades of the 20th Century, the deposition rate accelerated past the rate of production, and plastics are now one of the most common and persistent pollutants in ocean waters and beaches worldwide. Thirty years ago the prevailing attitude of the plastic industry was that "plastic litter is a very small proportion of all litter and causes no harm to the environment except as an eyesore" [Derraik, J.G.B., 2002. The pollution of the marine environment by plastic debris: a review. Mar. Pollut. Bull. 44(9), 842-852]. Between 1960 and 2000, the world production of plastic resins increased 25-fold, while recovery of the material remained below 5%. Between 1970 and 2003, plastics became the fastest growing segment of the US municipal waste stream, increasing nine-fold, and marine litter is now 60-80% plastic, reaching 90-95% in some areas. While undoubtedly still an eyesore, plastic debris today is having significant harmful effects on marine biota. Albatross, fulmars, shearwaters and petrels mistake floating plastics for food, and many individuals of these species are affected; in fact, 44% of all seabird species are known to ingest plastic. Sea turtles ingest plastic bags, fishing line and other plastics, as do 26 species of cetaceans. In all, 267 species of marine organisms worldwide are known to have been affected by plastic debris, a number that will increase as smaller organisms are assessed. The number of fish, birds, and mammals that succumb each year to derelict fishing nets and lines in which they become entangled cannot be reliably known; but estimates are in the millions. We divide marine plastic debris into two categories: macro, >5 mm and micro, pollutants. The potential bioavailability of compounds added to plastics at the time of manufacture, as well as those

  17. Adsorption of Synthetic Cationic Polymers on Model Phospholipid Membranes: Insight from Atomic-Scale Molecular Dynamics Simulations.

    Science.gov (United States)

    Kostritskii, Andrei Yu; Kondinskaia, Diana A; Nesterenko, Alexey M; Gurtovenko, Andrey A

    2016-10-11

    Although synthetic cationic polymers represent a promising class of effective antibacterial agents, the molecular mechanisms behind their antimicrobial activity remain poorly understood. To this end, we employ atomic-scale molecular dynamics simulations to explore adsorption of several linear cationic polymers of different chemical structure and protonation (polyallylamine (PAA), polyethylenimine (PEI), polyvinylamine (PVA), and poly-l-lysine (PLL)) on model bacterial membranes (4:1 mixture of zwitterionic phosphatidylethanolamine (PE) and anionic phosphatidylglycerol (PG) lipids). Overall, our findings show that binding of polycations to the anionic membrane surface effectively neutralizes its charge, leading to the reorientation of water molecules close to the lipid/water interface and to the partial release of counterions to the water phase. In certain cases, one has even an overcharging of the membrane, which was shown to be a cooperative effect of polymer charges and lipid counterions. Protonated amine groups of polycations are found to interact preferably with head groups of anionic lipids, giving rise to formation of hydrogen bonds and to a noticeable lateral immobilization of the lipids. While all the above findings are mostly defined by the overall charge of a polymer, we found that the polymer architecture also matters. In particular, PVA and PEI are able to accumulate anionic PG lipids on the membrane surface, leading to lipid segregation. In turn, PLL whose charge twice exceeds charges of PVA/PEI does not induce such lipid segregation due to its considerably less compact architecture and relatively long side chains. We also show that partitioning of a polycation into the lipid/water interface is an interplay between its protonation level (the overall charge) and hydrophobicity of the backbone. Therefore, a possible strategy in creating highly efficient antimicrobial polymeric agents could be in tuning these polycation's properties through proper

  18. Synthetic Enantiopure Carbohydrate Polymers that are Highly Soluble in Water and Noncytotoxic.

    Science.gov (United States)

    Dane, Eric L; Chin, Stacy L; Grinstaff, Mark W

    2013-10-15

    The first synthesis of poly-amido-saccharides (PASs) from a galactose(gal)-derived β-lactam sugar monomer is reported. The polymers are prepared using a controlled anionic ring-opening polymerization and characterized by NMR, optical rotation, IR, and GPC. Galactose-derived PASs display high solubility in aqueous solutions and are noncytotoxic to HepG2, CHO, and HeLa cell lines. To evaluate whether gal-derived PASs are recognized by the gal-specific lectin present on human hepatocytes, cellular uptake of rhodamine-labeled polymers is assessed using flow cytometry and fluorescence microscopy. Based on these results, the polymers are taken into cells via endocytosis that is not dependent on the gal-specific receptor on hepatocytes. Neutral, hydrophilic polymers, such as gal-derived PASs, are desirable materials for a range of biomedical applications, such as drug delivery, surface passivation, and hydrogel formation.

  19. Molecularly imprinted polymers as synthetic mimics of bioreceptors. 1. General principles of molecular imprinting

    Directory of Open Access Journals (Sweden)

    Sergeyeva T. A.

    2009-08-01

    Full Text Available The review is devoted to analysis of the publications in the area of synthesis of artificial mimics of biological receptors using the method of molecular imprinting. General principles of molecular imprinting as well as main types of polymers being used in molecular imprinting are described. The special attention is paid to the polymers-biomimics synthesized using the method of non-covalent molecular imprinting.

  20. Comparative study on composition, structure, and adsorption behavior of activated carbons derived from different synthetic waste polymers.

    Science.gov (United States)

    Lian, Fei; Xing, Baoshan; Zhu, Lingyan

    2011-08-15

    The composition, structure, and adsorption behavior of activated carbons (ACs) derived from three different types of waste polymers, i.e., tire rubber (TR), polyvinyl chloride (PVC), and polyethyleneterephtalate (PET), by KOH activation were compared. The AC derived from PET exhibited the largest surface area (2831 m(2)/g) and pore volume (1.68 cm(3)/g) due to the homogenous aromatic composition of PET. The AC derived from PVC exhibited relatively lower surface area (2666 m(2)/g) but more narrowed pore size distribution (2-3 nm). The complex composition and high ash content of tire particles resulted in AC product with significantly lower surface area (398.5 m(2)/g) and heterogeneous pore width. Adsorption data of methylene blue (MB) were fitted well by Langmuir equation, indicating monolayer coverage on the ACs. The high oxygen content of PET-derived AC heavily affected its adsorption to MB and iodine. Due to the remarkable surface area and highly mesoporous structures, ACs based on both PET and PVC exhibited much higher adsorption capacities than that of TR and commercial coal-based AC (F400). This study demonstrates that the properties of ACs are highly dependent on their starting polymers and the potential of converting synthetic polymer waste into effective adsorbents for environmental remediation and cleanup.

  1. A Tailor-Made Synthetic Polymer for Cell Encapsulation: Design Rationale, Synthesis, Chemical-Physics and Biological Characterizations.

    Science.gov (United States)

    Gerges, Irini; Tamplenizza, Margherita; Rossi, Eleonora; Tocchio, Alessandro; Martello, Federico; Recordati, Camilla; Kumar, Deepak; Forsyth, Nicholas R; Liu, Yang; Lenardi, Cristina

    2016-06-01

    This study presents a custom-made in situ gelling polymeric precursor for cell encapsulation. Composed of poly((2-hydroxyethyl)methacrylate-co-(3-aminopropyl)methacrylamide) (P(HEMA-co-APM) mother backbone and RGD-mimicking poly(amidoamine) (PAA) moiteis, the comb-like structured polymeric precursor is tailored to gather the advantages of the two families of synthetic polymers, i.e., the good mechanical integrity of PHEMA-based polymers and the biocompatibility and biodegradability of PAAs. The role of P(HEMA-co-APM) in the regulation of the chemico-physical properties of P(HEMA-co-APM)/PAA hydrogels is thoroughly investigated. On the basis of obtained results, namely the capability of maintaining vital NIH3T3 cell line in vitro for 2 d in a 3D cell culture, the in vivo biocompatibility in murine model for 16 d, and the ability of finely tuning mechanical properties and degradation kinetics, it can be assessed that P(HEMA-co-APM)/PAAs offer a cost-effective valid alternative to the so far studied natural polymer-based systems for cell encapsulation.

  2. Magnetic polymer beads: Recent trends and developments in synthetic design and applications

    KAUST Repository

    Philippova, Olga

    2011-04-01

    The paper describes the synthesis, properties and applications of magnetic polymer beads. State-of-the-art, future challenges, and promising trends in this field are analyzed. New applications in oil recovery are described. © 2010 Elsevier Ltd. All rights reserved.

  3. Synthetic approaches towards new polymer systems by the combination of living carbocationic and anionic polymerizations

    DEFF Research Database (Denmark)

    Feldthusen, Jesper; Ivan, Bela; Muller, Axel. H.E.

    1996-01-01

    to incomplete lithiation of this chain end.In another approach a new functionalization method was developed by end-quenching living polyisobutylene with 1,1-diphenylethylene. After transformation of the groups into 2,2-diphenylvinyl end groups and lithiation polymers were synthesized from protected acrylate...

  4. Synthetic genes specifying periodic polymers modelled on the repetitive domain of wheat gliadins: conception and expression.

    Science.gov (United States)

    Elmorjani, K; Thiévin, M; Michon, T; Popineau, Y; Hallet, J N; Guéguen, J

    1997-10-09

    In order to optimise new polypeptide based biomaterials, we developed a procedure for producing homoblock polypeptides using recombinant DNA technology. Synthetic genes encoding periodic polypeptides modelled on the consensus sequence of wheat gliadins (a family of wheat storage proteins) were devised to be expressed in Escherichia coli. The construction strategy followed allows the construction of three genes encoding 8, 16, and 32 copies of the PQQPY module. The optimal expression conditions in the enterobacteria were established and a convenient purification procedure was shown to be useful in recovery of sizable amounts of strictly periodic polypeptides. The identities of the synthesized polypeptides were assessed using positive cross reactions to antibodies raised against a synthetic decapeptide (PQQPYPQQPA) and amino acid composition was determined as well.

  5. Studies in Finishing Effects of Clay Mineral in Polymers and Synthetic Fibers

    Directory of Open Access Journals (Sweden)

    Faheem Uddin

    2013-01-01

    Full Text Available The use of clay mineral in modifying the properties of polymeric material is improved in application. The current interest in modifying the polymeric materials, particularly polyethylene, polypropylene, polystyrene, and nylon using clay mineral for improved flame retardancy, thermal stability, peak heat release rate, fracture, and strength properties generated significant research literature. This paper aims to review some of the important recent modification achieved in the performance of polymeric materials using organoclay mineral. Degradation of clay mineral-polymer (nm composite is discussed with appropriate known examples. Clay mineral (nm loading of 5 wt.% to 7 wt.% that was significantly smaller than the percent loading of conventional fillers in polymeric materials introduced significant improvement in terms of thermal and physical stability. An attempt is made to emphasize flammability and thermal stability and to indicate the areas that are relatively little explored in modification of fiber-forming polymers to enhance further research interest.

  6. S-Layer Based Bio-Imprinting - Synthetic S-Layer Polymers

    Science.gov (United States)

    2015-07-09

    synthesized  in  wet...synthesis  and  spin  coating   Polymers  were   synthesized   following  protocols  published   in  previous  work  [40,  54...ethanol,  and  containing   ammonia .  After  stirring,  the  resulting   silica  particles  have  diameters  between

  7. DNA Separation by Capillary Electrophoresis with Ultraviolet Detection using Mixed Synthetic Polymers

    Institute of Scientific and Technical Information of China (English)

    Qian WANG; Xu XU

    2003-01-01

    The mixtures of two polymers, poly (N,N-dimethylacrylamide) (PDMA) and polyvinylpyrrolidone (PVP) were synthesized and used as the separation medium for double-stranded and single-stranded DNA fragments by capillary electrophoresis with UV detector. On optimal conditions, 2%w/v PDMA ( 2%w/v PVP can be used to separate the doublet 123/124bp in pBR322/Hae III Markers.

  8. Preparation, Characterization and Efficacy Evaluation of Synthetic Biocompatible Polymers Linking Natural Antioxidants

    Directory of Open Access Journals (Sweden)

    Nevio Picci

    2012-10-01

    Full Text Available The purpose of this work was the synthesis, characterization and efficacy evaluation of new biocompatible antioxidant polymers linking trans-ferulic acid or a-lipoic acid. In particular, ferulic or lipoic acid were introduced in the preformed polymeric backbone. The new antioxidant biopolymers were characterized by Fourier transform infrared spectroscopy and gel permeation chromatography. The degree of functionalization (moles of antioxidant per gram of polymer was determined by the Gaur-Gupta method for free amino group determination and by the Folin method for the phenolic groups. Their ability to inhibit lipid peroxidation were estimated in rat liver microsomal membranes induced in vitro by tert-BOOH (tert-butyl hydroperoxide, as a source of free radicals. The DPPH (1,1-diphenyl-2-picrylhydrazyl radical-scavenging effect was also evaluated. The obtained systems, with different solubility, showed strong antioxidant and antiradical activities, suggesting potential use as packaging materials for foods, cosmetics, pharmaceuticals and personal care products. Moreover, the cytotoxicity of the synthesized polymers was also evaluated on Caco-2 cell cultures in order to verify their biocompatibility when exposed to an absorptive epithelial cell line.

  9. Porous organic polymers with anchored aldehydes: A new platform for post-synthetic amine functionalization en route for enhanced CO2 adsorption properties

    KAUST Repository

    Guillerm, Vincent

    2014-01-01

    A novel porous organic polymer has been synthesized using the molecular building block approach to deliberately encompass aldehyde functionalities amenable to post functionalization. The resultant porous framework allows a facile, one-step quantitative and post-synthetic functionalization by amines, permitting enhanced CO2 sorption properties. © 2014 The Royal Society of Chemistry.

  10. Reverse adhesion of a gecko-inspired synthetic adhesive switched by an ion-exchange polymer-metal composite actuator.

    Science.gov (United States)

    Guo, Dong-Jie; Liu, Rui; Cheng, Yu; Zhang, Hao; Zhou, Li-Ming; Fang, Shao-Ming; Elliott, Winston Howard; Tan, Wei

    2015-03-11

    Inspired by how geckos abduct, rotate, and adduct their setal foot toes to adhere to different surfaces, we have developed an artificial muscle material called ion-exchange polymer-metal composite (IPMC), which, as a synthetic adhesive, is capable of changing its adhesion properties. The synthetic adhesive was cast from a Si template through a sticky colloid precursor of poly(methylvinylsiloxane) (PMVS). The PMVS array of setal micropillars had a high density of pillars (3.8 × 10(3) pillars/mm(2)) with a mean diameter of 3 μm and a pore thickness of 10 μm. A graphene oxide monolayer containing Ag globular nanoparticles (GO/Ag NPs) with diameters of 5-30 nm was fabricated and doped in an ion-exchanging Nafion membrane to improve its carrier transfer, water-saving, and ion-exchange capabilities, which thus enhanced the electromechanical response of IPMC. After being attached to PMVS micropillars, IPMC was actuated by square wave inputs at 1.0, 1.5, or 2.0 V to bend back and forth, driving the micropillars to actively grip or release the surface. To determine the adhesion of the micropillars, the normal adsorption and desorption forces were measured as the IPMC drives the setal micropillars to grip and release, respectively. Adhesion results demonstrated that the normal adsorption forces were 5.54-, 14.20-, and 23.13-fold higher than the normal desorption forces under 1.0, 1.5, or 2.0 V, respectively. In addition, shear adhesion or friction increased by 98, 219, and 245%, respectively. Our new technique provides advanced design strategies for reversible gecko-inspired synthetic adhesives, which might be used for spiderman-like wall-climbing devices with unprecedented performance.

  11. EFFECT OF NATURAL AND SYNTHETIC POLYMER ON RELEASE OF KETOTIFEN FUMARATE MATRIX TABLETS: A SUSTAINED RELEASE DOSAGE FORM

    Directory of Open Access Journals (Sweden)

    Md. M. Rahman*, A. B. Ripon Khalipha , Md. A. K. Azad , MD. Z. Faruki , A. K. Chaurasiya and H. Hossain

    2013-04-01

    Full Text Available ABSTRACT: With the blend of Methocel K15, a synthetic polymer and xanthan gum, a natural polymer (3:1 was used in the formulation of matrix tablets to find out the effect of natural polymer in the sustained release dosage form. Direct compression process was applied for the preparation of Ketotifen fumarate tablets. The dissolution profiles were carried out by USP apparatus 2 (paddle at 50 rpm in 500 ml 0.1 N HCl and distilled water. For interpreting the results a one way analysis of variance (ANOVA was exploited. Statistically significant differences were found among the drug release profile from different matrices. At a higher polymeric content (60% of the total tablet weight, drug release from the combination of Methocel K15M and xanthan gum (3:1 was slower. On the contrary, at a lower polymeric level (30% of the total tablet weight; the rate of drug release was prominent. The best-fit release kinetics was accomplished with the Higuchi model followed by the zero-order plot, Korsmeyer and Hixson Crowell equations. One formulation showed drug release is more controlled. The data obtained proved that the formulations are useful for a sustained release of ketotifen fumarate. From these formulations corresponded more controlled of the drug release by the higher polymeric level of methocel K15M & xanthan gum and vice versa. The extended release of the model drug found from the higher proportion of methocel K15M and xanthan gum. As a result, the frequency of administration of such type of drug reduced.

  12. MS/MS-Assisted Design of Sequence-Controlled Synthetic Polymers for Improved Reading of Encoded Information

    Science.gov (United States)

    Charles, Laurence; Cavallo, Gianni; Monnier, Valérie; Oswald, Laurence; Szweda, Roza; Lutz, Jean-François

    2016-12-01

    In order to improve their MS/MS sequencing, structure of sequence-controlled synthetic polymers can be optimized based on considerations regarding their fragmentation behavior in collision-induced dissociation conditions, as demonstrated here for two digitally encoded polymer families. In poly(triazole amide)s, the main dissociation route proceeded via cleavage of the amide bond in each monomer, hence allowing the chains to be safely sequenced. However, a competitive cleavage of an ether bond in a tri(ethylene glycol) spacer placed between each coding moiety complicated MS/MS spectra while not bringing new structural information. Changing the tri(ethylene glycol) spacer to an alkyl group of the same size allowed this unwanted fragmentation pathway to be avoided, hence greatly simplifying the MS/MS reading step for such undecyl-based poly(triazole amide)s. In poly(alkoxyamine phosphodiester)s, a single dissociation pathway was achieved with repeating units containing an alkoxyamine linkage, which, by very low dissociation energy, made any other chemical bonds MS/MS-silent. Structure of these polymers was further tailored to enhance the stability of those precursor ions with a negatively charged phosphate group per monomer in order to improve their MS/MS readability. Increasing the size of both the alkyl coding moiety and the nitroxide spacer allowed sufficient distance between phosphate groups for all of them to be deprotonated simultaneously. Because the charge state of product ions increased with their polymerization degree, MS/MS spectra typically exhibited groups of fragments at one or the other side of the precursor ion depending on the original α or ω end-group they contain, allowing sequence reconstruction in a straightforward manner.

  13. PECTIN MICROGELS CONTAINING SYNTHETIC POLYMERS BASED ON NANOCAPSULES FOR THE CONTROLLED RELEASE OF INDOMETHACIN

    Directory of Open Access Journals (Sweden)

    Mihaela HOLBAN

    2015-12-01

    Full Text Available Nanocapsule-based Eudragit RS100 and Eudragit E100 containing indomethacin have been prepared. The nanosuspensions have been included into pectin microgels of different polysaccharide concentrations, 28-61 µm-ranged polymer microgels with size and size polydispersity highly depending on the pectin amount being thus obtained. Study of the drug release revealed that indomethacin was released at a slower and more controlled rate from the microgels containing nanocapsules than from the empty pectin microgels. Also, the rate of released indomethacin increased with the augmentation of pectin amount into the microgels.

  14. Surface chemical immobilization of bioactive peptides on synthetic polymers for cardiac tissue engineering.

    Science.gov (United States)

    Rosellini, Elisabetta; Cristallini, Caterina; Guerra, Giulio D; Barbani, Niccoletta

    2015-01-01

    The aim of this work was the development of new synthetic polymeric systems, functionalized by surface chemical modification with bioactive peptides, for myocardial tissue engineering. Polycaprolactone and a poly(ester-ether-ester) block copolymer synthesized in our lab, polycaprolactone-poly(ethylene oxide)-polycaprolactone (PCL-PEO-PCL), were used as the substrates to be modified. Two pentapeptides, H-Gly-Arg-Gly-Asp-Ser-OH (GRGDS) from fibronectin and H-Tyr-Ile-Gly-Ser-Arg-OH (YIGSR) from laminin, were used for the functionalization. Polymeric membranes were obtained by casting from solutions and then functionalized by means of alkaline hydrolysis and subsequent coupling of the bioactive molecules through 1-(3-dimethylaminopropyl)-3-ethylcarbodimide hydrochloride/N-hydroxysuccinimide chemistry. The hydrolysis conditions, in terms of hydrolysis time, temperature, and sodium hydroxide concentration, were optimized for the two materials. The occurrence of the coupling reaction was demonstrated by infrared spectroscopy, as the presence on the functionalized materials of the absorption peaks typical of the two peptides. The peptide surface density was determined by chromatographic analysis and the distribution was studied by infrared chemical imaging. The results showed a nearly homogeneous peptide distribution, with a density above the minimum value necessary to promote cell adhesion. Preliminary in vitro cell culture studies demonstrated that the introduction of the bioactive molecules had a positive effect on improving C2C12 myoblasts growth on the synthetic materials.

  15. Synthetic polyacrylate polymers as particulate intranasal vaccine delivery systems for the induction of mucosal immune response.

    Science.gov (United States)

    Zaman, Mehfuz; Simerska, Pavla; Toth, Istvan

    2010-04-01

    The nasal route as a site of vaccine delivery for both local and systemic effect is currently of considerable interest. The administration of vaccines to mucosal surfaces such as the nasopharynx associated lymphoid tissues confers many advantages since the nasal mucosa is a primary site through which most inhaled antigens are encountered. However, the success of intranasally delivered mucosal vaccines is limited by lack of effective vaccine formulations or delivery systems suitable for use in humans. This review provides a brief overview of the mucosal immune system at the nasal surface, enhancement techniques for induction of mucosal immune response after intranasal administration of particulate systems and an explanation of the inherent properties of polyacrylate polymer-based particulate systems that may facilitate mucosal immune responses.

  16. Design and Development of Transdermal Therapeutic system of Carvedilol using Combination of Natural and Synthetic Polymers

    Directory of Open Access Journals (Sweden)

    Patel DB

    2012-04-01

    Full Text Available The present study was mainly focused on investigating the influence of concentration and combinationof HPMC K4M, Carbopol 934P and Chitosan on physical characterization and drug release behavior ofcarvedilol transdermal films prepared by the solvent evaporation technique. The physicochemicalcompatibility of the drug and the polymers was studied by differential scanning calorimetry and infraredspectroscopy. The results suggested no physicochemical incompatibility between the drug and thepolymers. The prepared films were evaluated for physicochemical characteristics like weight variation,thickness, folding endurance, tensile strength, percentage moisture uptake, water vapor transmissionrate, percentage flatness and in vitro permeation study. In vitro permeation studies were performed byusing Franz diffusion cells. The drug release profiles of selected formulations were subjected to kinetictreatment using zero order, first order, Higuchi and korsmeyer’s peppas kinetic models. The resultsfollowed Higuchi kinetics (r2=0.951−0.995 and the mechanism of release was diffusion mediated.Based on physicochemical and in vitro permeation studies, transdermal film prepared by combination ofHPMC K4M and Chitosan with ratio 3:1 selected as optimized formulation shows the drug release morethan 24 hours with good flexibility and stability at 250C. The developed transdermal film increases theefficacy of carvedilol for the treatment of hypertension.

  17. Biopolymeric Mucin and Synthetic Polymer Analogs: Their Structure, Function and Role in Biomedical Applications

    Directory of Open Access Journals (Sweden)

    Sundar P. Authimoolam

    2016-03-01

    Full Text Available Mucin networks are viscoelastic fibrillar aggregates formed through the complex self-association of biopolymeric glycoprotein chains. The networks form a lubricious, hydrated protective shield along epithelial regions within the human body. The critical role played by mucin networks in impacting the transport properties of biofunctional molecules (e.g., biogenic molecules, probes, nanoparticles, and its effect on bioavailability are well described in the literature. An alternate perspective is provided in this paper, presenting mucin’s complex network structure, and its interdependent functional characteristics in human physiology. We highlight the recent advances that were achieved through the use of mucin in diverse areas of bioengineering applications (e.g., drug delivery, biomedical devices and tissue engineering. Mucin network formation is a highly complex process, driven by wide variety of molecular interactions, and the network possess structural and chemical variations, posing a great challenge to understand mucin’s bulk behavior. Through this review, the prospective potential of polymer based analogs to serve as mucin mimic is suggested. These analog systems, apart from functioning as an artificial model, reducing the current dependency on animal models, can aid in furthering our fundamental understanding of such complex structures.

  18. Improving the drug delivery characteristics of graphene oxide based polymer nanocomposites through the “one-pot” synthetic approach of single-electron-transfer living radical polymerization

    Energy Technology Data Exchange (ETDEWEB)

    Gao, Peng; Liu, Meiying; Tian, Jianwen; Deng, Fengjie [Department of Chemistry, Nanchang University, 999 Xuefu Avenue, Nanchang 330031 (China); Wang, Ke [Department of Chemistry and the Tsinghua Center for Frontier Polymer Research, Tsinghua University, Beijing 100084 (China); Xu, Dazhuang [Department of Chemistry, Nanchang University, 999 Xuefu Avenue, Nanchang 330031 (China); Liu, Liangji [Affiliated Hospital of Jiangxi University of Traditional Chinese Medicine, Nanchang 330006 (China); Zhang, Xiaoyong, E-mail: xiaoyongzhang1980@gmail.com [Department of Chemistry, Nanchang University, 999 Xuefu Avenue, Nanchang 330031 (China); Wei, Yen, E-mail: weiyen@tsinghua.edu.cn [Department of Chemistry and the Tsinghua Center for Frontier Polymer Research, Tsinghua University, Beijing 100084 (China)

    2016-08-15

    Graphical abstract: The PEGylated graphene oxides with high water dispersibility, good biocompatibility as well as high drug loading capability were fabricated via “one-pot” SET-LRP. - Highlights: • Surface modification of graphene oxide with polymers. • One-pot single-electron-transfer living radical polymerization. • Improving drug delivery characteristics. • The synthetic approach is rather simple, universal and effective. - Abstract: Graphene oxide (GO) based polymer nanocomposites have attracted extensive research interest recently for their outstanding physicochemical properties and potential applications. However, surface modification of GO with synthetic polymers has demonstrated to be trouble for most polymerization procedures are occurred under non-aqueous solution, which will in turn lead to the restacking of GO. In this work, a facile and efficient “one-pot” strategy has been developed for surface modification of GO with synthetic polymers through single-electron-transfer living radical polymerization (SET-LRP). The GO based polymer nanocomposites were obtained via SET-LRP in aqueous solution using poly(ethylene glycol) methyl ether methacrylate (PEGMA) as the monomer and 11-bromoundecanoic acid as the initiator, which could be effectively adsorbed on GO through hydrophobic interaction. The successful preparation of GO based polymer nanocomposites was confirmed by a series of characterization techniques such as {sup 1}H nuclear magnetic resonance, Fourier transform infrared spectroscopy, thermogravimetric analysis, transmission electron microscopy and X-ray photoelectron spectroscopy. The resultant products exhibit high water disperisibility, excellent biocompatibility and high efficient drug loading capability, making these PEGylated GO nanocomposites promising candidates for biomedical applications.

  19. Improving the drug delivery characteristics of graphene oxide based polymer nanocomposites through the "one-pot" synthetic approach of single-electron-transfer living radical polymerization

    Science.gov (United States)

    Gao, Peng; Liu, Meiying; Tian, Jianwen; Deng, Fengjie; Wang, Ke; Xu, Dazhuang; Liu, Liangji; Zhang, Xiaoyong; Wei, Yen

    2016-08-01

    Graphene oxide (GO) based polymer nanocomposites have attracted extensive research interest recently for their outstanding physicochemical properties and potential applications. However, surface modification of GO with synthetic polymers has demonstrated to be trouble for most polymerization procedures are occurred under non-aqueous solution, which will in turn lead to the restacking of GO. In this work, a facile and efficient "one-pot" strategy has been developed for surface modification of GO with synthetic polymers through single-electron-transfer living radical polymerization (SET-LRP). The GO based polymer nanocomposites were obtained via SET-LRP in aqueous solution using poly(ethylene glycol) methyl ether methacrylate (PEGMA) as the monomer and 11-bromoundecanoic acid as the initiator, which could be effectively adsorbed on GO through hydrophobic interaction. The successful preparation of GO based polymer nanocomposites was confirmed by a series of characterization techniques such as 1H nuclear magnetic resonance, Fourier transform infrared spectroscopy, thermogravimetric analysis, transmission electron microscopy and X-ray photoelectron spectroscopy. The resultant products exhibit high water disperisibility, excellent biocompatibility and high efficient drug loading capability, making these PEGylated GO nanocomposites promising candidates for biomedical applications.

  20. Space science applications for conducting polymer particles: synthetic mimics for cosmic dust and micrometeorites.

    Science.gov (United States)

    Fielding, Lee A; Hillier, Jon K; Burchell, Mark J; Armes, Steven P

    2015-12-11

    Over the last decade or so, a range of polypyrrole-based particles have been designed and evaluated for space science applications. This electrically conductive polymer enables such particles to efficiently acquire surface charge, which in turn allows their acceleration up to the hypervelocity regime (>1 km s(-1)) using a Van de Graaff accelerator. Either organic latex (e.g. polystyrene or poly(methyl methacrylate)) or various inorganic materials (such as silica, olivine or pyrrhotite) can be coated with polypyrrole; these core-shell particles are useful mimics for understanding the hypervelocity impact ionisation behaviour of micro-meteorites (a.k.a. cosmic dust). Impacts on metal targets at relatively low hypervelocities (10 km s(-1)) generate predominately atomic species, since many more chemical bonds are cleaved if the particles impinge with higher kinetic energy. Such fundamental studies are relevant to the calibration of the cosmic dust analyser (CDA) onboard the Cassini spacecraft, which was designed to determine the chemical composition of Saturn's dust rings. Inspired by volcanism observed for one of the Jupiter's moons (Io), polypyrrole-coated sulfur-rich latexes have also been designed to help space scientists understand ionisation spectra originating from sulfur-rich dust particles. Finally, relatively large (20 μm diameter) polypyrrole-coated polystyrene latexes have proven to be useful for understanding the extent of thermal ablation of organic projectiles when fired at ultralow density aerogel targets at up to 6.1 km s(-1) using a Light Gas Gun. In this case, the sacrificial polypyrrole overlayer simply provides a sensitive spectroscopic signature (rather than a conductive overlayer), and the scientific findings have important implications for the detection of organic dust grains during the Stardust space mission.

  1. Synthetic Polymers at Interfaces: Monodisperse Emulsions Multiple Emulsions and Liquid Marbles

    Science.gov (United States)

    Sun, Guanqing

    The adsorption of polymeric materials at interfaces is an energetically favorable process which is investigated in much diversified fields, such as emulsions, bubbles, foams, liquid marbles. Pickering emulsion, which is emulsion stabilized by solid particles has been investigated for over one century and preparation of Pickering emulsion with narrow size distribution is crucial for both the theoretical study of the stabilization mechanism and practical application, such as templated fabrication of colloidosomes. The precise control over the size and functionality of polymer latices allows the preparation of monodisperse Pickering emulsions with desired sizes through SPG membrane emulsification at rather rapid rate compared to microfludic production. Double or multiple emulsions have long been investigated but its rapid destabilization has always been a major obstacle in applying them into practical applications. The modern living polymerization techniques allow us to prepare polymers with designed structure of block copolymers which makes it possible to prepare ultra-stable multiple emulsions. The precise tuning of the ratio of hydrophobic part over the hydrophilic can unveil the stabilization mechanism. Liquid marble is a new type of materials of which liquid droplets are coated by dry particles. The coating of an outer layer of dry particles renders the liquid droplets non-sticky at solid surface which is useful in transportation of small amount of liquid without leakage at extreme low friction force. The property of liquid marbles relies largely on the stabilizers and the drying condition of polymeric latices is shown to have great influence on the property of liquid marbles. Firstly, an introduction to the interfacial and colloidal science with special attention to topics on emulsions, multiple emulsion and liquid marbles is given in Chapter 1. The unique features of an interface and a discussion on the definition of colloids are introduced prior to the

  2. Surface patterning with natural and synthetic polymers via an inverse electron demand Diels-Alder reaction employing microcontact chemistry.

    Science.gov (United States)

    Roling, Oliver; Mardyukov, Artur; Lamping, Sebastian; Vonhören, Benjamin; Rinnen, Stefan; Arlinghaus, Heinrich F; Studer, Armido; Ravoo, Bart Jan

    2014-10-21

    Bioorthogonal ligation methods are the focus of current research due to their versatile applications in biotechnology and materials science for post-functionalization and immobilization of biomolecules. Recently, inverse electron demand Diels-Alder (iEDDA) reactions employing 1,2,4,5-tetrazines as electron deficient dienes emerged as powerful tools in this field. We adapted iEDDA in microcontact chemistry (μCC) in order to create enhanced surface functions. μCC is a straightforward soft-lithography technique which enables fast and large area patterning with high pattern resolutions. In this work, tetrazine functionalized surfaces were reacted with carbohydrates conjugated with norbornene or cyclooctyne acting as strained electron rich dienophiles employing μCC. It was possible to create monofunctional as well as bifunctional substrates which were specifically addressable by proteins. Furthermore we structured glass supported alkene terminated self-assembled monolayers with a tetrazine conjugated atom transfer radical polymerization (ATRP) initiator enabling surface grafted polymerizations of poly(methylacrylate) brushes. The success of the surface initiated iEDDA via μCC as well as the functionalization with natural and synthetic polymers was verified via fluorescence and optical microscopy, X-ray photoelectron spectroscopy (XPS), time-of-flight secondary ion mass spectrometry (ToF-SIMS), atomic force microscopy (AFM) and attenuated total reflection Fourier transform infrared spectroscopy (ATR-FTIR).

  3. Radiation synthesis and characterisation of the network structure of natural/synthetic double-network superabsorbent polymers

    Science.gov (United States)

    Şen, Murat; Hayrabolulu, Hande

    2012-09-01

    In this study radiation synthesis and characterisation of the network structure of acrylic acid sodium salt/locust bean gum, (AAcNa/LBG) natural/synthetic double-network super absorbent polymers were investigated. Quartet systems composed of acrylic acid sodium salt/locust bean gum/N,N methylene bis acrylamide/water (AAcNa/LBG/MBAAm/water) were prepared at varying degree of neutralisations (DN) by controlling the DN value of AAc and irradiated with gamma rays at ambient temperature at a very low dose rate. The influences of the DN on the swelling and network properties were examined. It was observed that the DN strongly affected the gelation and super absorption properties of the gels. Molecular weight between crosslinks (M), effective crosslink density (νe) and mesh size (ξ) of SAPs were calculated from swelling and shear modules data obtained from compression and oscillatory frequency sweep tests. M values obtained from the uniaxial deformation experiments were very close to those obtained from the oscillatory shear experiments excluding the completely neutralised gel system. It was concluded that the uniaxial compression technique could be used for the characterisation of the network structure of a hydrogel as along with the rheological analyses; however, a very precise control of the gel size was also needed.

  4. Research Progress of Electrospun Biodegradable Synthetic Polymer Fibers%可降解合成高分子静电纺纤维的研究进展

    Institute of Scientific and Technical Information of China (English)

    江乙逵; 赖明河; 陈向标; 陈海宏

    2012-01-01

    The principle of electrospinning and the research progress of biodegradable synthetic polymer nanofibers prepared by electrospinning were introduced. The research progress of several major electrospun biodegradable synthetic polymer fibers such as poly-carboxylic acid, polylactic acid, polycaprolactone and their copolymers, etc was mainly described. The important application in biomedical field was pointedout.%介绍了静电纺丝的原理及利用静电纺丝方法制备生物可降解合成高分子纳米纤维的最新研究进展,主要讲述聚羧基乙酸、聚乳酸、聚己内酯及其共聚物等几种主要的生物可降解合成高分子电纺纤维的研究进展,并指出它们在生物医学领域的重要应用.

  5. Biodegradable Polymers

    Directory of Open Access Journals (Sweden)

    Isabelle Vroman

    2009-04-01

    Full Text Available Biodegradable materials are used in packaging, agriculture, medicine and other areas. In recent years there has been an increase in interest in biodegradable polymers. Two classes of biodegradable polymers can be distinguished: synthetic or natural polymers. There are polymers produced from feedstocks derived either from petroleum resources (non renewable resources or from biological resources (renewable resources. In general natural polymers offer fewer advantages than synthetic polymers. The following review presents an overview of the different biodegradable polymers that are currently being used and their properties, as well as new developments in their synthesis and applications.

  6. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  7. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  8. Molecularly imprinted polymers with synthetic dummy templates for the preparation of capsaicin and dihydrocapsaicin from chili peppers.

    Science.gov (United States)

    Ma, Xiuli; Ji, Wenhua; Chen, Lingxiao; Wang, Xiao; Liu, Jianhua; Wang, Xueyong

    2015-01-01

    In this work, dummy molecularly imprinted polymers with high selectivity and affinity to capsaicin and dihydrocapsaicin are designed using N-vanillylnonanamide as a dummy template. The performance of dummy molecularly imprinted polymers and nonimprinted polymers was evaluated using adsorption isotherms, adsorption kinetics, and selective recognition capacity. Dummy molecularly imprinted polymers were found to exhibit good site accessibility, taking just 20 min to achieve adsorption equilibrium; they were also highly selective toward capsaicin and dihydrocapsaicin. We successfully used dummy molecularly imprinted polymers as a specific sorbent for selectively enriching capsaicin and dihydrocapsaicin from chili pepper samples. In a scaled-up experiment, the selective recovery of capsaicinoids was calculated to be 77.8% using solid-phase extraction. To the best of our knowledge, this is the first example of the use of N-vanillylnonanamide as a dummy template in molecularly imprinted polymers to simultaneously enrich capsaicin and dihydrocapsaicin.

  9. 合成高分子聚合物生物降解研究进展%Research Progress on Biodegradation of Synthetic Polymers

    Institute of Scientific and Technical Information of China (English)

    高佳; 李琳琳; 杨翔华; 王战勇

    2012-01-01

    概述了目前常见的各类合成聚合物以及生物降解塑科的生物降解研究成果和进展,着重介绍了合成聚酯类化合物的生物降解情况,并为将来可降解高分子聚合物的开发研究提供了参考.%The research progresses and results in degradation of biodegradable plastics and all kinds of common synthetic polymers at present were reviewed, and the biodegradation situation of polyester compounds was introduced in detail.Besides, some references for the development research of biodegradable polymers in the future were provided.

  10. Thermoplastic biodegradable elastomers based on ε-caprolactone and L-lactide block co-polymers: a new synthetic approach.

    Science.gov (United States)

    Lipik, Vitali T; Kong, Jen Fong; Chattopadhyay, Sujay; Widjaja, Leonardus K; Liow, Sing S; Venkatraman, Subbu S; Abadie, Marc J M

    2010-11-01

    Although biodegradable polymers have found extensive application in medical devices, there are very few commercially available elastomeric biodegradable polymers. In this work, starting with the well-known monomers L-lactide and ε-caprolactone, we developed elastomers using a multiblock co-polymer approach. This ensures that the degradation products of such elastomers are also acceptable from a cytotoxicity standpoint. A series of polymers with various structures was synthesized utilizing a design of experiment approach. The basic structure is that of a diblock, with each block being modified by the addition of co-monomer. The synthesized polymers exhibited a range of mechanical properties from a typical thermoplastic polymer to that approaching a good thermoplastic elastomer. 13C nuclear magnetic resonance analysis, size exclusion chromatography and differential scanning calorimetry measurements have been utilized to relate the observed range of mechanical properties to the structure. In addition, the elastomeric nature has been established with the use of creep and recovery measurements. Such elastomers may find a variety of biomedical applications, ranging from stent coatings to atrial septal defect occluders.

  11. Solvent selection for matrix-assisted laser desorption/ionization time-of-flight mass spectrometric analysis of synthetic polymers employing solubility parameters.

    Science.gov (United States)

    Brandt, Heike; Ehmann, Thomas; Otto, Matthias

    2010-08-30

    The principle relating to the selection of a proper matrix, cationization reagent, and solvent for matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS) of synthetic polymers is still a topic of research. In this work we focused on the selection of a suitable MALDI solvent. Polystyrene PS7600 and poly(ethylene glycol) PEG4820 were analyzed by MALDI-TOF MS using various solvents which were selected based on the Hansen solubility parameter system. For polystyrene (PS), dithranol was used as the matrix and silver trifluoroacetate as the cationization reagent whereas, for poly(ethylene glycol) (PEG), the combination of 2,5-dihydroxybenzoic acid and sodium trifluoroacetate was used for all experiments. When employing solvents which dissolve PS and PEG, reliable MALDI mass spectra were obtained while samples in non-solvents (solvents which are not able to dissolve the polymer) failed to provide spectra. It seems that the solubility of the matrix and the cationization reagent are less important than the polymer solubility.

  12. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  13. Direct observation of the ultrafast electron transfer process in a polymer/fullerene blend. : Section Title: Physical Properties of Synthetic High Polymers

    NARCIS (Netherlands)

    Brabec, Ch J.; Zerza, G.; Sariciftci, N. S.; Cerullo, G.; Lanzani, G.; De Silvestri, S.; Hummelen, J. C.

    2001-01-01

    Optical studies on conjugated polymer-fullerene blends are performed with sub-10-fs temporal resoln. The photoinduced electron transfer process is directly monitored in the time domain, obtaining a forward electron transfer time const. of 45 fs. [on SciFinder(R)

  14. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  15. A seeded synthetic strategy for uniform polymer and carbon nanospheres with tunable sizes for high performance electrochemical energy storage.

    Science.gov (United States)

    Qian, Jiasheng; Liu, Mingxian; Gan, Lihua; Tripathi, Pranav K; Zhu, Dazhang; Xu, Zijie; Hao, Zhixian; Chen, Longwu; Wright, Dominic S

    2013-04-14

    We established a novel and facile strategy to synthesize uniform polymer and carbon nanospheres, the diameters of which can be precisely programmed between 35-105 and 30-90 nm, respectively, via time-controlled formation of colloidal seeds. The carbon nanospheres show promising prospects in high rate performance electrochemical energy storage.

  16. Synthetic approaches to parabens molecularly imprinted polymers and their applications to the solid-phase extraction of river water samples.

    Science.gov (United States)

    Beltran, A; Marcé, R M; Cormack, P A G; Borrull, F

    2010-09-10

    In this paper we describe the synthesis, characterisation and use of two distinct molecularly imprinted polymers (MIPs) prepared using esters of p-hydroxybenzoic acid (parabens) as templates: one MIP was synthesised by precipitation polymerisation using a semi-covalent molecularly imprinting strategy with methyl paraben as the template/target (MIP 1); the second MIP was prepared in monolithic form through a conventional non-covalent molecular imprinting strategy, with butyl paraben as the template (MIP 2). MIP 1 recognized methyl paraben, showed cross-selectivity for other parabens analytes used in the study and higher affinity towards these compounds than did a non-imprinted control polymer. Similarly, MIP 2 demonstrated higher affinity towards paraben analytes than a non-imprinted control polymer. For the analysis of environmental water samples, a solid-phase extraction (SPE) protocol was developed using MIP 2 as sorbent, and results were compared to a SPE using a commercial sorbent (Oasis HLB). With MIP 2 as sorbent and butyl paraben as target, when percolating 500 mL of river water spiked at 1 μg L(-1) through the SPE cartridge, and using 1 mL of isopropanol as cleaning solvent, a higher recovery of butyl 4-hydroxybenzoate (butyl paraben) and a cleaner chromatogram where achievable when using the MIP compared to the commercial sorbent.

  17. Rapid, nondestructive estimation of surface polymer layer thickness using attenuated total reflection fourier transform infrared (ATR FT-IR) spectroscopy and synthetic spectra derived from optical principles.

    Science.gov (United States)

    Weinstock, B André; Guiney, Linda M; Loose, Christopher

    2012-11-01

    We have developed a rapid, nondestructive analytical method that estimates the thickness of a surface polymer layer with high precision but unknown accuracy using a single attenuated total reflection Fourier transform infrared (ATR FT-IR) measurement. Because the method is rapid, nondestructive, and requires no sample preparation, it is ideal as a process analytical technique. Prior to implementation, the ATR FT-IR spectrum of the substrate layer pure component and the ATR FT-IR and real refractive index spectra of the surface layer pure component must be known. From these three input spectra a synthetic mid-infrared spectral matrix of surface layers 0 nm to 10,000 nm thick on substrate is created de novo. A minimum statistical distance match between a process sample's ATR FT-IR spectrum and the synthetic spectral matrix provides the thickness of that sample. We show that this method can be used to successfully estimate the thickness of polysulfobetaine surface modification, a hydrated polymeric surface layer covalently bonded onto a polyetherurethane substrate. A database of 1850 sample spectra was examined. Spectrochemical matrix-effect unknowns, such as the nonuniform and molecularly novel polysulfobetaine-polyetherurethane interface, were found to be minimal. A partial least squares regression analysis of the database spectra versus their thicknesses as calculated by the method described yielded an estimate of precision of ±52 nm.

  18. Synthetic biology, inspired by synthetic chemistry.

    Science.gov (United States)

    Malinova, V; Nallani, M; Meier, W P; Sinner, E K

    2012-07-16

    The topic synthetic biology appears still as an 'empty basket to be filled'. However, there is already plenty of claims and visions, as well as convincing research strategies about the theme of synthetic biology. First of all, synthetic biology seems to be about the engineering of biology - about bottom-up and top-down approaches, compromising complexity versus stability of artificial architectures, relevant in biology. Synthetic biology accounts for heterogeneous approaches towards minimal and even artificial life, the engineering of biochemical pathways on the organismic level, the modelling of molecular processes and finally, the combination of synthetic with nature-derived materials and architectural concepts, such as a cellular membrane. Still, synthetic biology is a discipline, which embraces interdisciplinary attempts in order to have a profound, scientific base to enable the re-design of nature and to compose architectures and processes with man-made matter. We like to give an overview about the developments in the field of synthetic biology, regarding polymer-based analogs of cellular membranes and what questions can be answered by applying synthetic polymer science towards the smallest unit in life, namely a cell.

  19. Surface-Directed Assembly of Sequence-Defined Synthetic Polymers into Networks of Hexagonally Patterned Nanoribbons with Controlled Functionalities

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Chun-Long; Zuckermann, Ronald N.; DeYoreo, James J.

    2016-05-24

    The exquisite self-assembly of proteins and peptides in nature into highly ordered functional materials has inspired innovative approaches to biomimetic materials design and synthesis. Here we report the assembly of peptoids—a class of highly stable sequence-defined synthetic polymers—into biomimetic materials on mica surfaces. The assembling 12-mer peptoid contains alternating acidic and aromatic residues, and the presence of Ca2+ cations creates peptoid-peptoid and peptoid-mica interactions that drive assembly. In situ atomic force microscopy (AFM) shows that peptoids first assemble into discrete nanoparticles, these particles then transform into hexagonally-patterned nanoribbons on mica surfaces. AFM-based dynamic force spectroscopy (DFS) studies show that peptoid-mica interactions are much stronger than peptoidpeptoid interactions in the presence of Ca2+, illuminating the physical parameters that drive peptoid assembly. We further demonstrate the display of functional groups at the N-terminus of assembling peptoid sequence to produce biomimetic materials with similar hierarchical structures. This research demonstrates that surface-directed peptoid assembly can be used as a robust platform to develop biomimetic coating materials for applications.

  20. Formulation and evaluation of a sustained-release tablets of metformin hydrochloride using hydrophilic synthetic and hydrophobic natural polymers.

    Science.gov (United States)

    Wadher, K J; Kakde, R B; Umekar, M J

    2011-03-01

    Metformin hydrochloride has relatively short plasma half-life, low absolute bioavailability. The need for the administration two to three times a day when larger doses are required can decrease patient compliance. Sustained release formulation that would maintain plasma level for 8-12 h might be sufficient for daily dosing of metformin. Sustained release products are needed for metformin to prolong its duration of action and to improve patient compliances. The overall objective of this study was to develop an oral sustained release metformin hydrochloride tablet by using hydrophilic Eudragit RSPO alone or its combination with hydrophobic natural polymers Gum copal and gum damar as rate controlling factor. The tablets were prepared by wet granulation method. The in vitro dissolution study was carried out using USP 22 apparatus I, paddle method and the data was analysed using zero order, first order, Higuchi, Korsmeyer and Hixson-Crowell equations. The drug release study revealed that Eudragit RSPO alone was unable to sustain the drug release. Combining Eudragit with gum Copal and gum Damar sustained the drug release for more than 12 h. Kinetic modeling of in vitro dissolution profiles revealed the drug release mechanism ranges from diffusion controlled or Fickian transport to anomalous type or non-Fickian transport. Fitting the in vitro drug release data to Korsmeyer equation indicated that diffusion along with erosion could be the mechanism of drug release.

  1. Synthetic Architecture of MgO/C Nanocomposite from Hierarchical-Structured Coordination Polymer toward Enhanced CO2 Capture.

    Science.gov (United States)

    Li, Ping; Liu, Wen; Dennis, John S; Zeng, Hua Chun

    2017-03-22

    Highly efficient, durable, and earth-abundant solid sorbents are of paramount importance for practical carbon capture, storage, and utilization. Here, we report a novel and facile two-step strategy to synthesize a group of hierarchically structured porous MgO/C nanocomposites using flowerlike Mg-containing coordination polymer as a precursor. The new nanocomposites exhibit superb CO2 capture performance with sorption capacity up to 30.9 wt % (at 27 °C, 1 bar CO2), fast sorption kinetics, and long cycling life. Importantly, the achieved capacity is >14 times higher than that of commercial MgO, and favorably exceeds the highest value recorded to date for MgO-based sorbents under similar operating conditions. On the basis of the morphological and textural property analysis, together with CO2 sorption mechanism study using CO2-TPD and DRIFT techniques, the outstanding performance in CO2 uptake originates from unique features of this type of sorbent materials, which include hierarchical architecture, porous building blocks of nanosheets, high specific surface area (ca. 300 m(2)/g), evenly dispersed MgO nanocrystallites (ca. 3 nm) providing abundant active sites, and the in situ generated carbon matrix that acts as a stabilizer to prevent the growth and agglomeration of MgO crystallites. The nanocomposite system developed in this work shows good potential for future low-cost CO2 abatement and utilization.

  2. Formulation and evaluation of a sustained-release tablets of metformin hydrochloride using hydrophilic synthetic and hydrophobic natural polymers

    Directory of Open Access Journals (Sweden)

    K J Wadher

    2011-01-01

    Full Text Available Metformin hydrochloride has relatively short plasma half-life, low absolute bioavailability. The need for the administration two to three times a day when larger doses are required can decrease patient compliance. Sustained release formulation that would maintain plasma level for 8-12 h might be sufficient for daily dosing of metformin. Sustained release products are needed for metformin to prolong its duration of action and to improve patient compliances. The overall objective of this study was to develop an oral sustained release metformin hydrochloride tablet by using hydrophilic Eudragit RSPO alone or its combination with hydrophobic natural polymers Gum copal and gum damar as rate controlling factor. The tablets were prepared by wet granulation method. The in vitro dissolution study was carried out using USP 22 apparatus I, paddle method and the data was analysed using zero order, first order, Higuchi, Korsmeyer and Hixson-Crowell equations. The drug release study revealed that Eudragit RSPO alone was unable to sustain the drug release. Combining Eudragit with gum Copal and gum Damar sustained the drug release for more than 12 h. Kinetic modeling of in vitro dissolution profiles revealed the drug release mechanism ranges from diffusion controlled or Fickian transport to anomalous type or non-Fickian transport. Fitting the in vitro drug release data to Korsmeyer equation indicated that diffusion along with erosion could be the mechanism of drug release.

  3. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  4. Mechanical properties and in vivo behavior of a biodegradable synthetic polymer microfiber-extracellular matrix hydrogel biohybrid scaffold.

    Science.gov (United States)

    Hong, Yi; Huber, Alexander; Takanari, Keisuke; Amoroso, Nicholas J; Hashizume, Ryotaro; Badylak, Stephen F; Wagner, William R

    2011-05-01

    A biohybrid composite consisting of extracellular matrix (ECM) gel from porcine dermal tissue and biodegradable elastomeric fibers was generated and evaluated for soft tissue applications. ECM gel possesses attractive biocompatibility and bioactivity with weak mechanical properties and rapid degradation, while electrospun biodegradable poly(ester urethane)urea (PEUU) has good mechanical properties but limited cellular infiltration and tissue integration. A concurrent gel electrospray/polymer electrospinning method was employed to create ECM gel/PEUU fiber composites with attractive mechanical properties, including high flexibility and strength. Electron microscopy revealed a structure of interconnected fibrous layers embedded in ECM gel. Tensile mechanical properties could be tuned by altering the PEUU/ECM weight ratio. Scaffold tensile strengths for PEUU/ECM ratios of 67/33, 72/28 and 80/20 ranged from 80 to 187 kPa in the longitudinal axis (parallel to the collecting mandrel axis) and 41-91 kPa in the circumferential axis with 645-938% breaking strains. The 72/28 biohybrid composite and a control scaffold generated from electrospun PEUU alone were implanted into Lewis rats, replacing a full-thickness abdominal wall defect. At 4 wk, no infection or herniation was found at the implant site. Histological staining showed extensive cellular infiltration into the biohybrid scaffold with the newly developed tissue well integrated with the native periphery, while minimal cellular ingress into the electrospun PEUU scaffold was observed. Mechanical testing of explanted constructs showed evidence of substantial remodeling, with composite scaffolds adopting properties more comparable to the native abdominal wall. The described elastic biohybrid material imparts features of ECM gel bioactivity with PEUU strength and handling to provide a promising composite biomaterial for soft tissue repair and replacement.

  5. Molecular weight recognition in the multiple-stranded helix of a synthetic polymer without specific monomer-monomer interaction.

    Science.gov (United States)

    Kumaki, Jiro; Kawauchi, Takehiro; Ute, Koichi; Kitayama, Tatsuki; Yashima, Eiji

    2008-05-21

    Stereoregular isotactic and syndiotactic poly(methyl methacrylate)s (it- and st-PMMAs) are known to form a multiple-stranded complementary helix, so-called stereocomplex (SC) through van der Waals interactions, which is a rare example of helical supramolecular structures formed by a commodity polymer. In this study, we prepared SCs by using uniform it- and st-PMMAs and those with a narrow molecular weight distribution having different molecular weights and investigated their structures in detail using high-resolution atomic force microscopy as a function of the molecular weight and molecular weight distribution of the component PMMAs. We found that complementary it- and st-PMMAs with the longer molecular length determine the total length of the SC, and molecules of the shorter component associate until they fill up or cover the longer component. These observations support a supramolecular triple-stranded helical structure of the SCs composed of a double-stranded helix of two intertwined it-PMMA chains included in a single helix of st-PMMA, and this triple-stranded helix model of the SCs appears to be applicable to the it- and st-PMMAs having a wide range of molecular weights we employed in this study. In homogeneous double-stranded helices of it-PMMA, it has been found that, in mixtures of two it-PMMAs with different molecular weights, chains of the same molecular weight selectively form a double-stranded it-PMMA helix, or recognize the molecular weights of each other ("molecular sorting"). We thus demonstrate that molecular weight recognition is possible, without any specific interaction between monomer units, through the formation of a topological multiple-stranded helical structure based upon van der Waals interaction.

  6. Analytical development of the sup 252 Cf-plasma desorption mass spectroscopy for the structure analysis of biopolymers and synthetic polymers. Analytische Entwicklung der sup 252 Cf-Plasmadesorptions-Massenspektrometrie zur Strukturanalyse von Biopolymeren und synthetischen Polymeren

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, K.

    1991-01-01

    The dissertation had the following aims: A systematic, analytical development of the plasma desorption method, and applications of the plasma desorption mass spectroscopy (PDMS) in primary structure investigations of polypeptides and proteins, and for the determination of the molecular weight of synthetic polymers. For the analytical development of the PDMS, aspects of main interest were the preparation and characterization techniques, and systematic model investigations of the analytical sensitivity, reproducibility and accuray of the molecular weight determination, as well as of the mixture analysis. The objective in the second part of the dissertation was to show application potentials and limits of the PDMS within the framework of analytical tasks of a primary structure characterization of polypeptides and proteins, as well as with regard to the determination of molecular weight and molecular weight distribution of synthetic polymers. (orig.).

  7. Synthetic Versus Tissue-Engineered Implants for Joint Replacement

    Directory of Open Access Journals (Sweden)

    Duncan E. T. Shepherd

    2007-01-01

    Full Text Available Human synovial joints are remarkable as they can last for a lifetime. However, they can be affected by disease that may lead to destruction of the joint surface. The most common treatment in the advanced stages of joint disease is artificial joint replacement, where the diseased synovial joint is replaced with an artificial implant made from synthetic materials, such as metals and polymers. A new technique for repairing diseased synovial joints is tissue engineering where cells are used to grow replacement tissue. This paper explores the relative merits of synthetic and tissue-engineered implants, using joint replacement as an example. Synthetic joint replacement is a well-established procedure with the advantages of early mobilisation, pain relief and high patient satisfaction. However, synthetic implants are not natural tissues; they can cause adverse reactions to the body and there could be a mismatch in mechanical properties compared to natural tissues. Tissue-engineered implants offer great potential and have major advantages over synthetic implants as they are natural tissue, which should ensure that they are totally biocompatible, have the correct mechanical properties and integrate well with the existing tissue. However, there are still many limitations to be addressed in tissue engineering such as scaling up for production, bioreactor design, appropriate regulation and the potential for disease to attack the new tissue-engineered implant.

  8. Biodegradable synthetic bone composites

    Science.gov (United States)

    Liu, Gao; Zhao, Dacheng; Saiz, Eduardo; Tomsia, Antoni P.

    2013-01-01

    The invention provides for a biodegradable synthetic bone composition comprising a biodegradable hydrogel polymer scaffold comprising a plurality of hydrolytically unstable linkages, and an inorganic component; such as a biodegradable poly(hydroxyethylmethacrylate)/hydroxyapatite (pHEMA/HA) hydrogel composite possessing mineral content approximately that of human bone.

  9. Expected and unexpected achievements and trends in radiation processing of polymers

    Energy Technology Data Exchange (ETDEWEB)

    Czvikovszky, T. E-mail: czvikovszky@pt.bme.hu

    2003-06-01

    The last four decades produced exponential development in the polymer processing. Radiation processing--initiated also about 40 years ago--yielded a similar pathway of development in the beginning, mostly in the radiation crosslinking of polymers and in the radiation sterilization of polymer products. There are some unexpected results in the developments of the radiation chemistry of polymers utilized well in the polymer processing today. The most dynamical developments of the microelectronics in our days are based on the efficient utilization of radiation-crosslinkable negative photoresist polymers and the radiation degradable positive photoresist polymers. Rapid prototyping and rapid tooling are indispensable methods in the continuously renewing manufacturing technologies of metal and plastic parts for almost all the industrial branches. Polymer composite manufacturing is also profited in many ways from the experiences of radiation technology. Compatibilization through radiation-reactive monomers and oligomers is attacking two great fields of the future polymer processing. Recycling of commingled polymer wastes, and manufacturing new type of alloys of different synthetic as well as natural polymers are requiring well-engineered interface, which can be achieved by radiation processing in a technically feasible and economically viable way.

  10. Expected and unexpected achievements and trends in radiation processing of polymers

    Science.gov (United States)

    Czvikovszky, T.

    2003-06-01

    The last four decades produced exponential development in the polymer processing. Radiation processing—initiated also about 40 years ago—yielded a similar pathway of development in the beginning, mostly in the radiation crosslinking of polymers and in the radiation sterilization of polymer products. There are some unexpected results in the developments of the radiation chemistry of polymers utilized well in the polymer processing today. The most dynamical developments of the microelectronics in our days are based on the efficient utilization of radiation-crosslinkable negative photoresist polymers and the radiation degradable positive photoresist polymers. Rapid prototyping and rapid tooling are indispensable methods in the continuously renewing manufacturing technologies of metal and plastic parts for almost all the industrial branches. Polymer composite manufacturing is also profited in many ways from the experiences of radiation technology. Compatibilization through radiation-reactive monomers and oligomers is attacking two great fields of the future polymer processing. Recycling of commingled polymer wastes, and manufacturing new type of alloys of different synthetic as well as natural polymers are requiring well-engineered interface, which can be achieved by radiation processing in a technically feasible and economically viable way.

  11. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  12. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  13. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  14. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  15. Dendritic polyurea polymers.

    Science.gov (United States)

    Tuerp, David; Bruchmann, Bernd

    2015-01-01

    Dendritic polymers, subsuming dendrimers as well as hyperbranched or highly branched polymers are well established in the field of polymer chemistry. This review article focuses on urea based dendritic polymers and summarizes their synthetic routes through both isocyanate and isocyanate-free processes. Furthermore, this article highlights applications where dendritic polyureas show their specific chemical and physical potential. For these purposes scientific publications as well as patent literature are investigated to generate a comprehensive overview on this topic.

  16. Nature Inspired Solutions for Polymers: Will Cutinase Enzymes Make Polyesters and Polyamides Greener?

    Directory of Open Access Journals (Sweden)

    Valerio Ferrario

    2016-12-01

    Full Text Available The polymer and plastic sectors are under the urge of mitigating their environmental impact. The need for novel and more benign catalysts for polyester synthesis or targeted functionalization led, in recent years, to an increasing interest towards cutinases due to their natural ability to hydrolyze ester bonds in cutin, a natural polymer. In this review, the most recent advances in the synthesis and hydrolysis of various classes of polyesters and polyamides are discussed with a critical focus on the actual perspectives of applying enzymatic technologies for practical industrial purposes. More specifically, cutinase enzymes are compared to lipases and, in particular, to lipase B from Candida antarctica, the biocatalyst most widely employed in polymer chemistry so far. Computational and bioinformatics studies suggest that the natural role of cutinases in attacking natural polymers confer some essential features for processing also synthetic polyesters and polyamides.

  17. Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack

    OpenAIRE

    2014-01-01

    We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, P...

  18. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  19. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  20. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  1. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  2. Supply Chain Attack Framework and Attack Patterns

    Science.gov (United States)

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  3. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  4. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  5. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  6. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  7. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  8. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  9. Polymers – A New Open Access Scientific Journal on Polymer Science

    Directory of Open Access Journals (Sweden)

    Shu-Kun Lin

    2009-12-01

    Full Text Available Polymers is a new interdisciplinary, Open Access scientific journal on polymer science, published by Molecular Diversity Preservation International (MDPI. This journal welcomes manuscript submissions on polymer chemistry, macromolecular chemistry, polymer physics, polymer characterization and all related topics. Both synthetic polymers and natural polymers, including biopolymers, are considered. Manuscripts will be thoroughly peer-reviewed in a timely fashion, and papers will be published, if accepted, within 6 to 8 weeks after submission. [...

  10. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  11. Water Soluble Polymers for Pharmaceutical Applications

    Directory of Open Access Journals (Sweden)

    Veeran Gowda Kadajji

    2011-11-01

    Full Text Available Advances in polymer science have led to the development of novel drug delivery systems. Some polymers are obtained from natural resources and then chemically modified for various applications, while others are chemically synthesized and used. A large number of natural and synthetic polymers are available. In the present paper, only water soluble polymers are described. They have been explained in two categories (1 synthetic and (2 natural. Drug polymer conjugates, block copolymers, hydrogels and other water soluble drug polymer complexes have also been explained. The general properties and applications of different water soluble polymers in the formulation of different dosage forms, novel delivery systems and biomedical applications will be discussed.

  12. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  13. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  14. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  15. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  16. Polymer-solvent molecular compounds

    CERN Document Server

    Guenet, Jean-Michel

    2010-01-01

    Crystallisable polymers represent a large share of the polymers used for manufacturing a wide variety of objects, and consequently have received continuous attention from scientists these past 60 years. Molecular compounds from crystallisable polymers, particularly from synthetic polymers, are receiving growing interest due to their potential application in the making of new materials such as multiporous membranes capable of capturing large particles as well as small pollutant molecules. The present book gives a detailed description of these promising systems. The first chapter

  17. Synthetic environments

    Science.gov (United States)

    Lukes, George E.; Cain, Joel M.

    1996-02-01

    The Advanced Distributed Simulation (ADS) Synthetic Environments Program seeks to create robust virtual worlds from operational terrain and environmental data sources of sufficient fidelity and currency to interact with the real world. While some applications can be met by direct exploitation of standard digital terrain data, more demanding applications -- particularly those support operations 'close to the ground' -- are well-served by emerging capabilities for 'value-adding' by the user working with controlled imagery. For users to rigorously refine and exploit controlled imagery within functionally different workstations they must have a shared framework to allow interoperability within and between these environments in terms of passing image and object coordinates and other information using a variety of validated sensor models. The Synthetic Environments Program is now being expanded to address rapid construction of virtual worlds with research initiatives in digital mapping, softcopy workstations, and cartographic image understanding. The Synthetic Environments Program is also participating in a joint initiative for a sensor model applications programer's interface (API) to ensure that a common controlled imagery exploitation framework is available to all researchers, developers and users. This presentation provides an introduction to ADS and the associated requirements for synthetic environments to support synthetic theaters of war. It provides a technical rationale for exploring applications of image understanding technology to automated cartography in support of ADS and related programs benefitting from automated analysis of mapping, earth resources and reconnaissance imagery. And it provides an overview and status of the joint initiative for a sensor model API.

  18. Synthetic foldamers.

    Science.gov (United States)

    Guichard, Gilles; Huc, Ivan

    2011-06-07

    Foldamers are artificial folded molecular architectures inspired by the structures and functions of biopolymers. This highlight focuses on important developments concerning foldamers produced by chemical synthesis and on the perspectives that these new self-organized molecular scaffolds offer. Progress in the field has led to synthetic objects that resemble small proteins in terms of size and complexity yet that may not contain any α-amino acids. Foldamers have introduced new tools and concepts to develop biologically active substances, synthetic receptors and novel materials.

  19. Molecularly imprinted polymers with synthetic dummy template for simultaneously selective removal and enrichment of ginkgolic acids from Ginkgo biloba L. leaves extracts.

    Science.gov (United States)

    Ji, Wenhua; Ma, Xiuli; Xie, Hongkai; Chen, Lingxiao; Wang, Xiao; Zhao, Hengqiang; Huang, Luqi

    2014-11-14

    Dummy molecularly imprinted polymers (DMIPs) for simultaneously selective removal and enrichment of ginkgolic acids (GAs) during the processing of Ginkgo biloba leaves have been prepared. Two dummy template molecule with similar structural skeleton to GAs, 6-methoxysalicylic acid (MOSA, DT-1) and 6-hexadecyloxysalicylic acid (HOSA, DT-2), have been designed and synthesized. The performance of the DMIPs and NIPs were evaluated including selective recognition capacity, adsorption isotherm, and adsorption kinetics. The selective recognition capacity of the three GAs with four analogues on the sorbents illustrated that the DMIPs sorbents have high specificity for GAs. An efficient method based on DMIP-HOSA coupled with solid-phase extraction (SPE) was developed for simultaneously selective removal and enrichment of ginkgolic acids (GAs) during the processing of Ginkgo biloba leaves. The method showed excellent recoveries (82.5-88.7%) and precision (RSD 0.5-2.6%, n=5) for licorice extracts, Gastrodia elata extracts and pepper extracts spiked at three concentration levels each (50, 100, 200 μg mL(-1)). The results indicated that GAs and standardized Ginkgo biloba leaves extracts could be obtained simultaneously through the DMIP-SPE.

  20. 5,6-Dihydroxyindole oxidation in phosphate buffer/polyvinyl alcohol: a new model system for studies of visible chromophore development in synthetic eumelanin polymers.

    Science.gov (United States)

    Pezzella, Alessandro; Ambrogi, Veronica; Arzillo, Marianna; Napolitano, Alessandra; Carfagna, Cosimo; d'Ischia, Marco

    2010-01-01

    The determinants of the broadband absorption spectrum of eumelanins are still largely unknown. Herein we report a novel approach to investigate eumelanin chromophore which is based on the biomimetic oxidation of the key monomer precursor, 5,6-dihydroxyindole (DHI, 1), with peroxidase/hydrogen peroxide in phosphate buffer, pH 7, containing 1-5% polyvinylalcohol (PVA, 27 000 Da). This approach relies on the discovery that as low as 1% PVA can prevent precipitation of the growing melanin polymer thus allowing investigation of the chromophoric phases accompanying oxidation of DHI without confounding scattering effects. Spectrophotometric monitoring showed the initial development of a band around 530 nm persisting for about 1 h before gradually changing into the typical broadband spectrum of eumelanin. Reductive treatment caused a significant absorbance decrease in the visible region without affecting an absorption band around 320 nm. Initial product analysis indicated an altered formation ratio of 2,4'-biindolyl (2) and 2,7'-biindolyl (3) relative to control experiments. Overall, these results demonstrate for the first time that the development in solution of visible chromophores since the early oligomer stages is independent of strong aggregation/precipitation phenomena.

  1. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  2. Synthetic Astrobiology

    Science.gov (United States)

    Rothschild, Lynn J.

    2016-01-01

    Synthetic biology - the design and construction of new biological parts and systems and the redesign of existing ones for useful purposes - has the potential to transform fields from pharmaceuticals to fuels. Our lab has focused on the potential of synthetic biology to revolutionize all three major parts of astrobiology: Where do we come from? Where are we going? and Are we alone? For the first and third, synthetic biology is allowing us to answer whether the evolutionary narrative that has played out on planet earth is likely to have been unique or universal. For example, in our lab we are re-evolving the biosynthetic pathways of amino acids in order to understand potential capabilities of an early organism with a limited repertoire of amino acids and developing techniques for the recovery of metals from spent electronics on other planetary bodies. And what about the limits for life? Can we create organisms that expand the envelope for life? In the future synthetic biology will play an increasing role in human activities both on earth, in fields as diverse as human health and the industrial production of novel bio-composites. Beyond earth, we will rely increasingly on biologically-provided life support, as we have throughout our evolutionary history. In order to do this, the field will build on two of the great contributions of astrobiology: studies of the origin of life and life in extreme environments.

  3. Synthetic Astrobiology

    Science.gov (United States)

    Rothschild, Lynn J.

    2015-01-01

    Synthetic biology - the design and construction of new biological parts and systems and the redesign of existing ones for useful purposes - has the potential to transform fields from pharmaceuticals to fuels. Our lab has focused on the potential of synthetic biology to revolutionize all three major parts of astrobiology: Where do we come from? Where are we going? and Are we alone? For the first and third, synthetic biology is allowing us to answer whether the evolutionary narrative that has played out on planet earth is likely to have been unique or universal. For example, in our lab we are re-evolving the biosynthetic pathways of amino acids in order to understand potential capabilities of an early organism with a limited repertoire of amino acids and developing techniques for the recovery of metals from spent electronics on other planetary bodies. In the future synthetic biology will play an increasing role in human activities both on earth, in fields as diverse as human health and the industrial production of novel bio-composites. Beyond earth, we will rely increasingly on biologically-provided life support, as we have throughout our evolutionary history. In order to do this, the field will build on two of the great contributions of astrobiology: studies of the origin of life and life in extreme environments.

  4. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  5. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  6. Synthetic chromosomes.

    Science.gov (United States)

    Schindler, Daniel; Waldminghaus, Torsten

    2015-11-01

    What a living organism looks like and how it works and what are its components-all this is encoded on DNA, the genetic blueprint. Consequently, the way to change an organism is to change its genetic information. Since the first pieces of recombinant DNA have been used to transform cells in the 1970s, this approach has been enormously extended. Bigger and bigger parts of the genetic information have been exchanged or added over the years. Now we are at a point where the construction of entire chromosomes becomes a reachable goal and first examples appear. This development leads to fundamental new questions, for example, about what is possible and desirable to build or what construction rules one needs to follow when building synthetic chromosomes. Here we review the recent progress in the field, discuss current challenges and speculate on the appearance of future synthetic chromosomes.

  7. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  8. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  9. Polymer-Based Therapeutics

    OpenAIRE

    Liu, Shuang; Maheshwari, Ronak; Kiick, Kristi L.

    2009-01-01

    Polymeric materials have been applied in therapeutic applications, such as drug delivery and tissue regeneration, for decades owing to their biocompatibility and suitable mechanical properties. In addition, select polymer–drug conjugates have been used as bioactive pharmaceuticals owing to their increased drug efficacy, solubility, and target specificity compared with small-molecule drugs. Increased synthetic control of polymer properties has permitted the production of polymer assemblies for...

  10. Transferases in Polymer Chemistry

    Science.gov (United States)

    van der Vlist, Jeroen; Loos, Katja

    Transferases are enzymes that catalyze reactions in which a group is transferred from one compound to another. This makes these enzymes ideal catalysts for polymerization reactions. In nature, transferases are responsible for the synthesis of many important natural macromolecules. In synthetic polymer chemistry, various transferases are used to synthesize polymers in vitro. This chapter reviews some of these approaches, such as the enzymatic polymerization of polyesters, polysaccharides, and polyisoprene.

  11. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  12. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  13. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  14. The emerging world of synthetic genetics.

    Science.gov (United States)

    Chaput, John C; Yu, Hanyang; Zhang, Su

    2012-11-21

    For over 20 years, laboratories around the world have been applying the principles of Darwinian evolution to isolate DNA and RNA molecules with specific ligand-binding or catalytic activities. This area of synthetic biology, commonly referred to as in vitro genetics, is made possible by the availability of natural polymerases that can replicate genetic information in the laboratory. Moving beyond natural nucleic acids requires organic chemistry to synthesize unnatural analogues and polymerase engineering to create enzymes that recognize artificial substrates. Progress in both of these areas has led to the emerging field of synthetic genetics, which explores the structural and functional properties of synthetic genetic polymers by in vitro evolution. This review examines recent advances in the Darwinian evolution of artificial genetic polymers and their potential downstream applications in exobiology, molecular medicine, and synthetic biology.

  15. Synthetic Cannabinoids.

    Science.gov (United States)

    Mills, Brooke; Yepes, Andres; Nugent, Kenneth

    2015-07-01

    Synthetic cannabinoids (SCBs), also known under the brand names of "Spice," "K2," "herbal incense," "Cloud 9," "Mojo" and many others, are becoming a large public health concern due not only to their increasing use but also to their unpredictable toxicity and abuse potential. There are many types of SCBs, each having a unique binding affinity for cannabinoid receptors. Although both Δ-tetrahydrocannabinol (THC) and SCBs stimulate the same receptors, cannabinoid receptor 1 (CB1) and cannabinoid receptor 2 (CB2), studies have shown that SCBs are associated with higher rates of toxicity and hospital admissions than is natural cannabis. This is likely due to SCBs being direct agonists of the cannabinoid receptors, whereas THC is a partial agonist. Furthermore, the different chemical structures of SCBs found in Spice or K2 may interact in unpredictable ways to elicit previously unknown, and the commercial products may have unknown contaminants. The largest group of users is men in their 20s who participate in polydrug use. The most common reported toxicities with SCB use based on studies using Texas Poison Control records are tachycardia, agitation and irritability, drowsiness, hallucinations, delusions, hypertension, nausea, confusion, dizziness, vertigo and chest pain. Acute kidney injury has also been strongly associated with SCB use. Treatment mostly involves symptom management and supportive care. More research is needed to identify which contaminants are typically found in synthetic marijuana and to understand the interactions between different SBCs to better predict adverse health outcomes.

  16. Natural - synthetic - artificial!

    DEFF Research Database (Denmark)

    Nielsen, Peter E

    2010-01-01

    The terms "natural," "synthetic" and "artificial" are discussed in relation to synthetic and artificial chromosomes and genomes, synthetic and artificial cells and artificial life.......The terms "natural," "synthetic" and "artificial" are discussed in relation to synthetic and artificial chromosomes and genomes, synthetic and artificial cells and artificial life....

  17. Challenges in polymer analysis by liquid chromatography

    NARCIS (Netherlands)

    E. Uliyanchenko; S. van der Wal; P.J. Schoenmakers

    2012-01-01

    Synthetic polymers are very important in our daily life. Many valuable properties of polymers are determined by their molecular weight and chemical composition. Liquid chromatographic (LC) techniques are very commonly used for molecular characterisation of polymers. LC analysis of macromolecules is

  18. Synthetic Brainbows

    KAUST Repository

    Wan, Y.

    2013-06-01

    Brainbow is a genetic engineering technique that randomly colorizes cells. Biological samples processed with this technique and imaged with confocal microscopy have distinctive colors for individual cells. Complex cellular structures can then be easily visualized. However, the complexity of the Brainbow technique limits its applications. In practice, most confocal microscopy scans use different florescence staining with typically at most three distinct cellular structures. These structures are often packed and obscure each other in rendered images making analysis difficult. In this paper, we leverage a process known as GPU framebuffer feedback loops to synthesize Brainbow-like images. In addition, we incorporate ID shuffing and Monte-Carlo sampling into our technique, so that it can be applied to single-channel confocal microscopy data. The synthesized Brainbow images are presented to domain experts with positive feedback. A user survey demonstrates that our synthetic Brainbow technique improves visualizations of volume data with complex structures for biologists.

  19. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  20. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  1. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  2. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  3. Transferases in Polymer Chemistry

    NARCIS (Netherlands)

    van der Vlist, Jeroen; Loos, Katja; Palmans, ARA; Heise, A

    2010-01-01

    Transferases are enzymes that catalyze reactions in which a group is transferred from one compound to another. This makes these enzymes ideal catalysts for polymerization reactions. In nature, transferases are responsible for the synthesis of many important natural macromolecules. In synthetic polym

  4. Synthetic LPS-Binding Polymer Nanoparticles

    Science.gov (United States)

    Jiang, Tian

    Lipopolysaccharide (LPS), one of the principal components of most gram-negative bacteria's outer membrane, is a type of contaminant that can be frequently found in recombinant DNA products. Because of its strong and even lethal biological effects, selective LPS removal from bioproducts solution is of particular importance in the pharmaceutical and health care industries. In this thesis, for the first time, a proof-of-concept study on preparing LPS-binding hydrogel-like NPs through facile one-step free-radical polymerization was presented. With the incorporation of various hydrophobic (TBAm), cationic (APM, GUA) monomers and cross-linkers (BIS, PEG), a small library of NPs was constructed. Their FITC-LPS binding behaviors were investigated and compared with those of commercially available LPS-binding products. Moreover, the LPS binding selectivity of the NPs was also explored by studying the NPs-BSA interactions. The results showed that all NPs obtained generally presented higher FITC-LPS binding capacity in lower ionic strength buffer than higher ionic strength. However, unlike commercial poly-lysine cellulose and polymyxin B agarose beads' nearly linear increase of FITC-LPS binding with particle concentration, NPs exhibited serious aggregation and the binding quickly saturated or even decreased at high particle concentration. Among various types of NPs, higher FITC-LPS binding capacity was observed for those containing more hydrophobic monomers (TBAm). However, surprisingly, more cationic NPs with higher content of APM exhibited decreased FITC-LPS binding in high ionic strength conditions. Additionally, when new cationic monomer and cross-linker, GUA and PEG, were applied to replace APM and BIS, the obtained NPs showed improved FITC-LPS binding capacity at low NP concentration. But compared with APM- and BIS-containing NPs, the FITC-LPS binding capacity of GUA- and PEG-containing NPs saturated earlier. To investigate the NPs' binding to proteins, we tested the NPs-bovine serum albumin (BSA) binding, which showed that, different from NPs FITC-LPS interactions, variation of TBAm's content in NPs had very little influence on BSA binding, instead, more cationic NPs with higher content of APM were found to possess higher BSA binding. Additionally, GUA-containing NPs exhibited particularly high BSA binding capacity, especially under low ionic strength conditions. In the current formulations, the aggregation and saturation effects make NPs unsuitable in practical applications. Nevertheless, we anticipate that by attaching NPs onto certain substrates, particles may be effectively separated from each other, and the NPs' LPS binding capacity could potentially be further improved.

  5. Coupling of Active Components to Synthetic Polymers

    DEFF Research Database (Denmark)

    Overgaard, Anne Kathrine Kattenhøj

    Arbejdet har fokuseret på fremstilling af kunstig ekstracellulær matrix (ECM) til fremme af den naturlige biologiske helingsproces ved vævsgendannelse efter store vævsskader. Særlig opmærksomhed har været på kemisk kobling af dermatan sulfat (DS), en naturlig glyco-saminoglycan (GAG), med en biok...

  6. Topological Polymer Chemistry for Designing New Macromolecular Architectures

    Institute of Scientific and Technical Information of China (English)

    Y. Tezuka

    2005-01-01

    @@ 1Introduction The precise control in polymer architectures has been an ongoing challenge in synthetic polymer chemistry, since new polymer topologies will realize unprecedented properties and functions in polymeric materials.In particular, topologically unique macromolecules comprising single cyclic and multicyclic polymer units have gained growing interests due to their distinctive behaviors from linear and branched counterparts[1-4]. See Fig. 1.

  7. Synthetic Astrobiology

    Science.gov (United States)

    Rothschild, Lynn J.

    2017-01-01

    "Are we alone?" is one of the primary questions of astrobiology, and whose answer defines our significance in the universe. Unfortunately, this quest is hindered by the fact that we have only one confirmed example of life, that of earth. While this is enormously helpful in helping to define the minimum envelope for life, it strains credulity to imagine that life, if it arose multiple times, has not taken other routes. To help fill this gap, our lab has begun using synthetic biology - the design and construction of new biological parts and systems and the redesign of existing ones for useful purposes - as an enabling technology. One theme, the "Hell Cell" project, focuses on creating artificial extremophiles in order to push the limits for Earth life, and to understand how difficult it is for life to evolve into extreme niches. In another project, we are re-evolving biotic functions using only the most thermodynamically stable amino acids in order to understand potential capabilities of an early organism with a limited repertoire of amino acids.

  8. Cell-free biology: exploiting the interface between synthetic biology and synthetic chemistry.

    Science.gov (United States)

    Harris, D Calvin; Jewett, Michael C

    2012-10-01

    Just as synthetic organic chemistry once revolutionized the ability of chemists to build molecules (including those that did not exist in nature) following a basic set of design rules, cell-free synthetic biology is beginning to provide an improved toolbox and faster process for not only harnessing but also expanding the chemistry of life. At the interface between chemistry and biology, research in cell-free synthetic systems is proceeding in two different directions: using synthetic biology for synthetic chemistry and using synthetic chemistry to reprogram or mimic biology. In the coming years, the impact of advances inspired by these approaches will make possible the synthesis of nonbiological polymers having new backbone compositions, new chemical properties, new structures, and new functions.

  9. Polymer films

    Science.gov (United States)

    Granick, Steve; Sukhishvili, Svetlana A.

    2008-12-30

    A film contains a first polymer having a plurality of hydrogen bond donating moieties, and a second polymer having a plurality of hydrogen bond accepting moieties. The second polymer is hydrogen bonded to the first polymer.

  10. Routing of individual polymers in designed patterns

    DEFF Research Database (Denmark)

    Knudsen, Jakob Bach; Liu, Lei; Kodal, Anne Louise Bank

    2015-01-01

    Synthetic polymers are ubiquitous in the modern world, but our ability to exert control over the molecular conformation of individual polymers is very limited. In particular, although the programmable self-assembly of oligonucleotides and proteins into artificial nanostructures has been...... demonstrated, we currently lack the tools to handle other types of synthetic polymers individually and thus the ability to utilize and study their single-molecule properties. Here we show that synthetic polymer wires containing short oligonucleotides that extend from each repeat can be made to assemble...... into arbitrary routings. The wires, which can be more than 200 nm in length, are soft and bendable, and the DNA strands allow individual polymers to self-assemble into predesigned routings on both two- and three-dimensional DNA origami templates. The polymers are conjugated and potentially conducting, and could...

  11. Inorganic nanoparticles engineered to attack bacteria.

    Science.gov (United States)

    Miller, Kristen P; Wang, Lei; Benicewicz, Brian C; Decho, Alan W

    2015-11-01

    Antibiotics were once the golden bullet to constrain infectious bacteria. However, the rapid and continuing emergence of antibiotic resistance (AR) among infectious microbial pathogens has questioned the future utility of antibiotics. This dilemma has recently fueled the marriage of the disparate fields of nanochemistry and antibiotics. Nanoparticles and other types of nanomaterials have been extensively developed for drug delivery to eukaryotic cells. However, bacteria have very different cellular architectures than eukaryotic cells. This review addresses the chemistry of nanoparticle-based antibiotic carriers, and how their technical capabilities are now being re-engineered to attack, kill, but also non-lethally manipulate the physiologies of bacteria. This review also discusses the surface functionalization of inorganic nanoparticles with small ligand molecules, polymers, and charged moieties to achieve drug loading and controllable release.

  12. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  13. DNA meets synthetic polymers—highly versatile hybrid materials

    NARCIS (Netherlands)

    Alemdaroglu, Fikri E.; Herrmann, Andreas

    2007-01-01

    The combination of synthetic polymers and DNA has provided biologists, chemists and materials scientists with a fascinating new hybrid material. The challenges in preparing these molecular chimeras were overcome by different synthetic strategies that rely on coupling the nucleic acid moiety and the

  14. Star-Branched Polymers (Star Polymers)

    KAUST Repository

    Hirao, Akira

    2015-09-01

    The synthesis of well-defined regular and asymmetric mixed arm (hereinafter miktoarm) star-branched polymers by the living anionic polymerization is reviewed in this chapter. In particular, much attention is being devoted to the synthetic development of miktoarm star polymers since 2000. At the present time, the almost all types of multiarmed and multicomponent miktoarm star polymers have become feasible by using recently developed iterative strategy. For example, the following well-defined stars have been successfully synthesized: 3-arm ABC, 4-arm ABCD, 5-arm ABCDE, 6-arm ABCDEF, 7-arm ABCDEFG, 6-arm ABC, 9-arm ABC, 12-arm ABC, 13-arm ABCD, 9-arm AB, 17-arm AB, 33-arm AB, 7-arm ABC, 15-arm ABCD, and 31-arm ABCDE miktoarm star polymers, most of which are quite new and difficult to synthesize by the end of the 1990s. Several new specialty functional star polymers composed of vinyl polymer segments and rigid rodlike poly(acetylene) arms, helical polypeptide, or helical poly(hexyl isocyanate) arms are introduced.

  15. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  16. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  17. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  18. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  19. Polymers for Protein Conjugation

    Directory of Open Access Journals (Sweden)

    Gianfranco Pasut

    2014-01-01

    Full Text Available Polyethylene glycol (PEG at the moment is considered the leading polymer for protein conjugation in view of its unique properties, as well as to its low toxicity in humans, qualities which have been confirmed by its extensive use in clinical practice. Other polymers that are safe, biodegradable and custom-designed have, nevertheless, also been investigated as potential candidates for protein conjugation. This review will focus on natural polymers and synthetic linear polymers that have been used for protein delivery and the results associated with their use. Genetic fusion approaches for the preparation of protein-polypeptide conjugates will be also reviewed and compared with the best known chemical conjugation ones.

  20. Synthetically simple, highly resilient hydrogels.

    Science.gov (United States)

    Cui, Jun; Lackey, Melissa A; Madkour, Ahmad E; Saffer, Erika M; Griffin, David M; Bhatia, Surita R; Crosby, Alfred J; Tew, Gregory N

    2012-03-12

    Highly resilient synthetic hydrogels were synthesized by using the efficient thiol-norbornene chemistry to cross-link hydrophilic poly(ethylene glycol) (PEG) and hydrophobic polydimethylsiloxane (PDMS) polymer chains. The swelling and mechanical properties of the hydrogels were controlled by the relative amounts of PEG and PDMS. The fracture toughness (G(c)) was increased to 80 J/m(2) as the water content of the hydrogel decreased from 95% to 82%. In addition, the mechanical energy storage efficiency (resilience) was more than 97% at strains up to 300%. This is comparable with one of the most resilient materials known: natural resilin, an elastic protein found in many insects, such as in the tendons of fleas and the wings of dragonflies. The high resilience of these hydrogels can be attributed to the well-defined network structure provided by the versatile chemistry, low cross-link density, and lack of secondary structure in the polymer chains.

  1. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  2. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  3. Playing God? Synthetic biology as a theological and ethical challenge

    OpenAIRE

    2009-01-01

    In the ethical debate over synthetic biology the formula “playing god” is widely used in order to attack this new branch of biotechnology. The article analyses, contextualizes and criticises this usage with respect to the theological concepts of creation, sin and humans as created in the image of God. Against the background of these theological understandings an ethical corridor of how to responsibly cope with the societal challenges of synthetic biology is presented.

  4. Playing God? Synthetic biology as a theological and ethical challenge.

    Science.gov (United States)

    Dabrock, Peter

    2009-12-01

    In the ethical debate over synthetic biology the formula "playing god" is widely used in order to attack this new branch of biotechnology. The article analyses, contextualizes and criticises this usage with respect to the theological concepts of creation, sin and humans as created in the image of God. Against the background of these theological understandings an ethical corridor of how to responsibly cope with the societal challenges of synthetic biology is presented.

  5. Polymer Science Pilot Program

    Science.gov (United States)

    Maier, Mary L.

    1996-07-01

    Natural polymers such as cellulose, proteins, and DNA have been part of earth's store of chemicals long before chemists existed. However, polymers synthesized by chemists first appeared on this planet only sixty years ago. A veritable explosion of materials first known as plastics, later polymers, followed. Today polymers, natural and synthetic, are everywhere, and it is appropriate to include an introduction to polymers in the education of future scientists. The Polymer Science Pilot Program consists of a sequence of experiences with polymers, designed to focus upon the ways in which these materials resemble and/or compare with nonpolymers in physical properties, versatility, and function. The modular format makes it possible for educators to select specific sections of the program for integration into other college chemistry courses. The team learning aspect of he program can also be recommended to educators who select a specific module. When this program was presented at a Middle Atlantic Regional Meeting of the American Chemical Society, some attendees were concerned about the limited number of participants as compared with the seemingly large number of college instructors. It was explained that the concentrated format of the four day program necessitates this instructor-to-student ratio; one class consisting of eighteen participants was tried and it was found that some aspects of the program, especially the research paper preparation, were not as thoroughly moderated.

  6. "Synthetic Metals": A Novel Role for Organic Polymers (Nobel Lecture) Copyright((c)) The Nobel Foundation 2001. We thank the Nobel Foundation, Stockholm, for permission to print this lecture.

    Science.gov (United States)

    MacDiarmid, Alan G.

    2001-07-16

    Since the initial discovery in 1977, that polyacetylene (CH)(x), now commonly known as the prototype conducting polymer, could be p- or n-doped either chemically or electrochemically to the metallic state, the development of the field of conducting polymers has continued to accelerate at an unexpectedly rapid rate and a variety of other conducting polymers and their derivatives have been discovered. Other types of doping are also possible, such as "photo-doping" and "charge-injection doping" in which no counter dopant ion is involved. One exciting challenge is the development of low-cost disposable plastic/paper electronic devices. Conventional inorganic conductors, such as metals, and semiconductors, such as silicon, commonly require multiple etching and lithographic steps in fabricating them for use in electronic devices. The number of processing and etching steps involved limits the minimum price. On the other hand, conducting polymers combine many advantages of plastics, for example, flexibility and processing from solution, with the additional advantage of conductivity in the metallic or semiconducting regimes; however, the lack of simple methods to obtain inexpensive conductive polymer shapes/patterns limit many applications. Herein is described a novel, simple, and cheap method to prepare patterns of conducting polymers by a process which we term, "Line Patterning".

  7. Starch-based completely biodegradable polymer materials

    Directory of Open Access Journals (Sweden)

    2009-06-01

    Full Text Available Starch is a natural polymer which possesses many unique properties and some shortcoming simultaneously. Some synthetic polymers are biodegradable and can be tailor-made easily. Therefore, by combining the individual advantages of starch and synthetic polymers, starch-based completely biodegradable polymers (SCBP are potential for applications in biomedical and environmental fields. Therefore it received great attention and was extensively investigated. In this paper, the structure and characteristics of starch and some synthetic degradable polymers are briefly introduced. Then, the recent progress about the preparation of SCBP via physical blending and chemical modification is reviewed and discussed. At last, some examples have been presented to elucidate that SCBP are promising materials for various applications and their development is a good solution for reducing the consumption of petroleum resources and environmental problem.

  8. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  9. Polymer fractionation

    Energy Technology Data Exchange (ETDEWEB)

    Hadermann, A. F.

    1985-04-09

    Soluble polymers are fractionated according to molecular weight by cryogenically comminuting the polymer and introducing the polymer particles, while still in the active state induced by cryogenic grinding, into a liquid having a solvent power selected to produce a coacervate fraction containing high molecular weight polymer species and a dilute polymer solution containing lower molecular weight polymer species. The coacervate may be physically separated from the solution and finds use in the production of antimisting jet fuels and the like.

  10. Rheological characteristics of synthetic road binders

    Energy Technology Data Exchange (ETDEWEB)

    Gordon D. Airey; Musarrat H. Mohammed; Caroline Fichter [University of Nottingham, Nottingham (United Kingdom)

    2008-08-15

    This paper deals with the synthesis of polymer binders from monomers that could in future be derived from renewable resources. These binders consist of polyethyl acrylate (PEA) of different molecular weight, polymethyl acrylate (PMA) and polybutyl acrylate (PBA), which were synthesised from ethyl acrylate, methyl acrylate and butyl acrylate, respectively, by atom transfer radical polymerization (ATRP). The fundamental rheological properties of these binders were determined by means of a dynamic shear rheometer (DSR) using a combination of temperature and frequency sweeps. The results indicate that PEA has rheological properties similar to that of 100/150 penetration grade bitumen, PMA similar rheological properties to that of 10/20 penetration grade bitumen, while PBA, due to its highly viscous nature and low complex modulus, cannot be used on its own as an asphalt binder. The synthetic binders were also combined with conventional penetration grade bitumen to produce a range of bitumen-synthetic polymer binder blends. These blends were batched by mass in the ratio of 1:1 or 3:1 and subjected to the same DSR rheological testing as the synthetic binders. The blends consisting of a softer bitumen (70/100 pen or 100/150 pen) with a hard synthetic binder (PMA) tended to be more compatible and therefore stable and produced rheological properties that combined the properties of the two components. The synthetic binders and particularly the extended bitumen samples (blends) produced rheological properties that showed similar characteristics to elastomeric SBS PMBs. 30 refs., 12 figs., 2 tabs.

  11. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error...

  12. A novel and simple synthetic route for a piperazine derivative

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Maria A.S. da; Pinheiro, Solange de O.; Francisco, Thiago dos S.; Silva, Francisco O.N. da; Carvalho, Idalina M.M.; Sousa, Jackson R. de; Dias-Filho, Francisco A.; Diogenes, Izaura C.N. [Universidade Federal do Ceara (UFC), Fortaleza, CE (Brazil). Dept. de Quimica Organica e Inorganica; Batista, Alzir A. [Universidade Federal de Sao Carlos (UFSCAR), Sao Carlos, SP (Brazil). Dept. de Quimica; Ellena, Javier [Universidade de Sao Paulo (USP), Sao Carlos, SP (Brazil). Inst. de Fisica; Longhinottid, Elisane, E-mail: izaura@dqoi.ufc.b [Universidade Federal do Ceara (UFC), Fortaleza, CE (Brazil). Dept. de Quimica Analitica e Fisico-Quimica

    2010-07-01

    A new derivative of piperazine, 5-oxopiperazinium-3-sulfonate monohydrate, was produced from a simple synthetic route as a result of the nucleophilic addition to HSO{sub 3} - bisulphite ion and of the nucleophilic attack of water molecules on pyrazine molecules. The isolated material was characterized by means of NMR, mass spectrometry, infrared, and X-ray diffraction. (author)

  13. Synthesis of cyanopyridine based conjugated polymer

    Directory of Open Access Journals (Sweden)

    B. Hemavathi

    2016-06-01

    Full Text Available This data file contains the detailed synthetic procedure for the synthesis of two new cyanopyridine based conjugated polymer P1 and P2 along with the synthesis of its monomers. The synthesised polymers can be used for electroluminescence and photovoltaic (PV application. The physical data of the polymers are provided in this data file along with the morphological data of the polymer thin films. The data provided here are in association with the research article entitled ‘Cyanopyridine based conjugated polymer-synthesis and characterisation’ (Hemavathi et al., 2015 [3].

  14. [Conformation theory of polymers and biopolymers].

    Science.gov (United States)

    Volkenstein, M V

    1977-01-01

    A short review is given of the Soviet investigations in the field of physics of polymers and biopolymers based on the concept of conformational motility of macromolecules. It is shown that the ideas originally used for the treatment of the properties of the synthetic polymers and, in particular, of the rubber elasticity, have found broad applications in molecular biophysics.

  15. Low band gap polymers for organic photovoltaics

    DEFF Research Database (Denmark)

    Bundgaard, Eva; Krebs, Frederik C

    2007-01-01

    Low band gap polymer materials and their application in organic photovoltaics (OPV) are reviewed. We detail the synthetic approaches to low band gap polymer materials starting from the early methodologies employing quinoid homopolymer structures to the current state of the art that relies...

  16. Development of polymers for large scale roll-to-roll processing of polymer solar cells

    DEFF Research Database (Denmark)

    Carlé, Jon Eggert

    . Polymer of this type display broader absorption resulting in better overlap with the solar spectrum and potentially higher current density. Synthesis, characterization and device performance of three series of polymers illustrating how the absorption spectrum of polymers can be manipulated synthetically...... and how this affects the PSC parameters are presented. It is generally found that it is possible to synthetically control the absorption spectrum of conjugated polymer systems. One way to alter the spectrum is by incorporating alternating donor-acceptor motifs, resulting in an additional optical......Development of polymers for large scale roll-to-roll processing of polymer solar cells Conjugated polymers potential to both absorb light and transport current as well as the perspective of low cost and large scale production has made these kinds of material attractive in solar cell research...

  17. Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems

    Energy Technology Data Exchange (ETDEWEB)

    Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh; Chatterjee, Samrat

    2016-09-15

    We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. We develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.

  18. Hydrolysis of synthetic mixed-acid phosphatides by phospholipase A from human pancreas

    NARCIS (Netherlands)

    Deenen, L.L.M. van; Haas, Gerard H. de; Heemskerk, C.H.Th.

    1963-01-01

    An investigation was made into the action of a human pancreatic phospholipase A on various synthetic phosphatides. L-α-Phosphatidyl ethanolamines were readily hydrolysed in an aqueous system by this enzyme. Synthetic lecithins, however, were not attacked in an appreciable rate by the mammalian phosp

  19. Active Polymer Gel Actuators

    Directory of Open Access Journals (Sweden)

    Shuji Hashimoto

    2010-01-01

    Full Text Available Many kinds of stimuli-responsive polymer and gels have been developed and applied to biomimetic actuators or artificial muscles. Electroactive polymers that change shape when stimulated electrically seem to be particularly promising. In all cases, however, the mechanical motion is driven by external stimuli, for example, reversing the direction of electric field. On the other hand, many living organisms can generate an autonomous motion without external driving stimuli like self-beating of heart muscles. Here we show a novel biomimetic gel actuator that can walk spontaneously with a wormlike motion without switching of external stimuli. The self-oscillating motion is produced by dissipating chemical energy of oscillating reaction. Although the gel is completely composed of synthetic polymer, it shows autonomous motion as if it were alive.

  20. Synthetic Cathinones ("Bath Salts")

    Science.gov (United States)

    ... and Over-the-Counter Medications Stimulant ADHD Medications: Methylphenidate and Amphetamines Synthetic Cannabinoids Synthetic Cathinones ("Bath Salts") Effects of Drug Abuse Comorbidity: Addiction and Other Mental Disorders Drug Use ...

  1. What Are Synthetic Cannabinoids?

    Science.gov (United States)

    ... and Over-the-Counter Medications Stimulant ADHD Medications: Methylphenidate and Amphetamines Synthetic Cannabinoids Synthetic Cathinones ("Bath Salts") Effects of Drug Abuse Comorbidity: Addiction and Other Mental Disorders Drug Use ...

  2. Plant synthetic biology.

    Science.gov (United States)

    Liu, Wusheng; Stewart, C Neal

    2015-05-01

    Plant synthetic biology is an emerging field that combines engineering principles with plant biology toward the design and production of new devices. This emerging field should play an important role in future agriculture for traditional crop improvement, but also in enabling novel bioproduction in plants. In this review we discuss the design cycles of synthetic biology as well as key engineering principles, genetic parts, and computational tools that can be utilized in plant synthetic biology. Some pioneering examples are offered as a demonstration of how synthetic biology can be used to modify plants for specific purposes. These include synthetic sensors, synthetic metabolic pathways, and synthetic genomes. We also speculate about the future of synthetic biology of plants.

  3. Bioderadable Polymers in Food Packaging

    Directory of Open Access Journals (Sweden)

    P.A.Pawar

    2013-01-01

    Full Text Available In recent years, there has been a marked increase in the interest in use of biodegradable materials in packaging. The principal function of packaging is protection and preservation of food from external contamination. This function involves retardation of deterioration, extension of shelf life, and maintenance of quality and safety of packaged food. Biodegradable polymers are the one which fulfill all these functions without causing any threat to the environment. The belief is that biodegradable polymer materials will reduce the need for synthetic polymer production (thus reducing pollution at a low cost, thereby producing a positive effect both environmentally and economically.

  4. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  5. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  6. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  7. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  8. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  9. Conjugated polymers containing diketopyrrolopyrrole units in the main chain

    OpenAIRE

    Bernd Tieke; A. Raman Rabindranath; Kai Zhang; Yu Zhu

    2010-01-01

    Research activities in the field of diketopyrrolopyrrole (DPP)-based polymers are reviewed. Synthetic pathways to monomers and polymers, and the characteristic properties of the polymers are described. Potential applications in the field of organic electronic materials such as light emitting diodes, organic solar cells and organic field effect transistors are discussed.

  10. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  11. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  12. Bio-based polycarbonate as synthetic toolbox

    Science.gov (United States)

    Hauenstein, O.; Agarwal, S.; Greiner, A.

    2016-06-01

    Completely bio-based poly(limonene carbonate) is a thermoplastic polymer, which can be synthesized by copolymerization of limonene oxide (derived from limonene, which is found in orange peel) and CO2. Poly(limonene carbonate) has one double bond per repeating unit that can be exploited for further chemical modifications. These chemical modifications allow the tuning of the properties of the aliphatic polycarbonate in nearly any direction. Here we show synthetic routes to demonstrate that poly(limonene carbonate) is the perfect green platform polymer, from which many functional materials can be derived. The relevant examples presented in this study are the transformation from an engineering thermoplastic into a rubber, addition of permanent antibacterial activity, hydrophilization and even pH-dependent water solubility of the polycarbonate. Finally, we show a synthetic route to yield the completely saturated counterpart that exhibits improved heat processability due to lower reactivity.

  13. Bio-based polycarbonate as synthetic toolbox

    Science.gov (United States)

    Hauenstein, O.; Agarwal, S.; Greiner, A.

    2016-01-01

    Completely bio-based poly(limonene carbonate) is a thermoplastic polymer, which can be synthesized by copolymerization of limonene oxide (derived from limonene, which is found in orange peel) and CO2. Poly(limonene carbonate) has one double bond per repeating unit that can be exploited for further chemical modifications. These chemical modifications allow the tuning of the properties of the aliphatic polycarbonate in nearly any direction. Here we show synthetic routes to demonstrate that poly(limonene carbonate) is the perfect green platform polymer, from which many functional materials can be derived. The relevant examples presented in this study are the transformation from an engineering thermoplastic into a rubber, addition of permanent antibacterial activity, hydrophilization and even pH-dependent water solubility of the polycarbonate. Finally, we show a synthetic route to yield the completely saturated counterpart that exhibits improved heat processability due to lower reactivity. PMID:27302694

  14. [From synthetic biology to synthetic humankind].

    Science.gov (United States)

    Nouvel, Pascal

    2015-01-01

    In this paper, we propose an historical survey of the expression "synthetic biology" in order to identify its main philosophical components. The result of the analysis is then used to investigate the meaning of the notion of "synthetic man". It is shown that both notions share a common philosophical background that can be summed up by the short but meaningful assertion: "biology is technology". The analysis allows us to distinguish two notions that are often confused in transhumanist literature: the notion of synthetic man and the notion of renewed man. The consequences of this crucial distinction are discussed.

  15. Polymer electronics

    CERN Document Server

    Hsin-Fei, Meng

    2013-01-01

    Polymer semiconductor is the only semiconductor that can be processed in solution. Electronics made by these flexible materials have many advantages such as large-area solution process, low cost, and high performance. Researchers and companies are increasingly dedicating time and money in polymer electronics. This book focuses on the fundamental materials and device physics of polymer electronics. It describes polymer light-emitting diodes, polymer field-effect transistors, organic vertical transistors, polymer solar cells, and many applications based on polymer electronics. The book also disc

  16. Electrochemical synthesis of electroconducting polymers

    Directory of Open Access Journals (Sweden)

    Gvozdenović Milica M.

    2014-01-01

    Full Text Available Electroconducting polymers from the group of synthetic metals are extensively investigated due to numerous properties perspective in practical application. These materials may be synthesized by both chemical and electrochemical procedures. Chemical synthesis is suitable when bulk quantities of the polymer are needed and up to date it presents dominant commercial method of producing electroconducting polymers. Nevertheless, electrochemical synthesis has its advantages; it avoids usage of oxidants since conducting polymeric material is obtained at anode upon application of positive potential, leading to increased purity. On the other hand, since the polymer is deposited onto electrode, further electrochemical characterization is facilitated. Owing to actuality of the research in the field this texts aims to describe important aspects of electrochemical synthesis of electroconducting polymers, with special emphasis to polyaniline and polypyrrole. [Projekat Ministarstva nauke Republike Srbije, br. 172046

  17. Controlled release from recombinant polymers.

    Science.gov (United States)

    Price, Robert; Poursaid, Azadeh; Ghandehari, Hamidreza

    2014-09-28

    Recombinant polymers provide a high degree of molecular definition for correlating structure with function in controlled release. The wide array of amino acids available as building blocks for these materials lend many advantages including biorecognition, biodegradability, potential biocompatibility, and control over mechanical properties among other attributes. Genetic engineering and DNA manipulation techniques enable the optimization of structure for precise control over spatial and temporal release. Unlike the majority of chemical synthetic strategies used, recombinant DNA technology has allowed for the production of monodisperse polymers with specifically defined sequences. Several classes of recombinant polymers have been used for controlled drug delivery. These include, but are not limited to, elastin-like, silk-like, and silk-elastinlike proteins, as well as emerging cationic polymers for gene delivery. In this article, progress and prospects of recombinant polymers used in controlled release will be reviewed.

  18. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  19. Polymer-Peptide Nanoparticles: Synthesis and Characterization

    Science.gov (United States)

    Dong, He; Shu, Jessica Y.; Xu, Ting

    2010-03-01

    Conjugation of synthetic polymers to peptides offers an efficient way to produce novel supramolecular structures. Herein, we report an attempt to prepare synthetic micellar nanoparticles using amphiphilic peptide-polymer conjugates as molecular building blocks. Spherical nanoparticles were formed upon dissolution of peptides in PBS buffer through the segregation of hydrophobic and hydrophilic segments. Both molecular and nano- structures were thoroughly investigated by a variety of biophysical techniques, including circular dichroism (CD), dynamic light scattering (DLS), size exclusion chromatography (SEC), transmission electron microscopy (TEM) and small angle X-ray scattering (SAXS). The results demonstrate that structural properties of these biohybrid materials depend on both the geometry of the hydrophobic domain and the size of synthetic polymers. Given the diversity of functional peptide sequences, hydrophilic polymers and hydrophobic moieties, these materials would be expected to self-assemble into various types of nanostructures to cover a wide range of biological applications.

  20. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  1. Zika Attacks Nerves, Muscles, Other Tissues

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  2. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  3. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore......AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... side-channels attacks can be applied to ECC. This paper reflects an ongoing research in the field of countermeasures against the attacks mentioned above....

  4. Lipopolysaccharide Neutralization by Cationic-Amphiphilic Polymers through Pseudoaggregate Formation.

    Science.gov (United States)

    Uppu, Divakara S S M; Haldar, Jayanta

    2016-03-14

    Synthetic polymers incorporating the cationic charge and hydrophobicity to mimic the function of antimicrobial peptides (AMPs) have been developed. These cationic-amphiphilic polymers bind to bacterial membranes that generally contain negatively charged phospholipids and cause membrane disintegration resulting in cell death; however, cationic-amphiphilic antibacterial polymers with endotoxin neutralization properties, to the best of our knowledge, have not been reported. Bacterial endotoxins such as lipopolysaccharide (LPS) cause sepsis that is responsible for a great amount of mortality worldwide. These cationic-amphiphilic polymers can also bind to negatively charged and hydrophobic LPS and cause detoxification. Hence, we envisaged that cationic-amphiphilic polymers can have both antibacterial as well as LPS binding properties. Here we report synthetic amphiphilic polymers with both antibacterial as well as endotoxin neutralizing properties. Levels of proinflammatory cytokines in human monocytes caused by LPS stimulation were inhibited by >80% when coincubated with these polymers. These reductions were found to be dependent on concentration and, more importantly, on the side-chain chemical structure due to variations in the hydrophobicity profiles of these polymers. These cationic-amphiphilic polymers bind and cause LPS neutralization and detoxification. Investigations of polymer interaction with LPS using fluorescence spectroscopy and dynamic light scattering (DLS) showed that these polymers bind but neither dissociate nor promote LPS aggregation. We show that polymer binding to LPS leads to sort of a pseudoaggregate formation resulting in LPS neutralization/detoxification. These findings provide an unusual mechanism of LPS neutralization using novel synthetic cationic-amphiphilic polymers.

  5. Development of partially biodegradable foams from PP/HMSPP blends with natural and synthetic polymers; Desenvolvimento de espumas parcialmente biodegradaveis a partir de blendas de PP/HMSPP com polimeros naturais e sinteticos

    Energy Technology Data Exchange (ETDEWEB)

    Cardoso, Elizabeth Carvalho Leite

    2014-07-01

    Polymers are used in various application and in different industrial areas providing enormous quantities of wastes in environment. Among diverse components of residues in landfills are polymeric materials, including Polypropylene, which contribute with 20 to 30% of total volume of solid residues. As polymeric materials are immune to microbial degradation, they remain in soil and in landfills as a semi-permanent residue. Environmental concerning in litter reduction is being directed to renewable polymers development for manufacturing of polymeric foams. Foamed polymers are considered future materials, with a wide range of applications; high density structural foams are specially used in civil construction, in replacement of metal, woods and concrete with a final purpose of reducing materials costs. At present development, it was possible the incorporation of PP/HMSPP polymeric matrix blends with sugarcane bagasse, PHB and PLA, in structural foams production. Thermal degradation at 100, 120 and 160 deg C temperatures was not enough to induce biodegradability. Gamma irradiation degradation, at 50, 100, 200 and 500 kGy showed effective for biodegradability induction. Irradiated bagasse blends suffered surface erosion, in favor of water uptake and consequently, a higher biodegradation in bulk structure. (author)

  6. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  7. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  8. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin , S.; M. FAIZAL A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  9. Polymer Directed Protein Assemblies

    Directory of Open Access Journals (Sweden)

    Patrick van Rijn

    2013-05-01

    Full Text Available Protein aggregation and protein self-assembly is an important occurrence in natural systems, and is in some form or other dictated by biopolymers. Very obvious influences of biopolymers on protein assemblies are, e.g., virus particles. Viruses are a multi-protein assembly of which the morphology is dictated by poly-nucleotides namely RNA or DNA. This “biopolymer” directs the proteins and imposes limitations on the structure like the length or diameter of the particle. Not only do these bionanoparticles use polymer-directed self-assembly, also processes like amyloid formation are in a way a result of directed protein assembly by partial unfolded/misfolded biopolymers namely, polypeptides. The combination of proteins and synthetic polymers, inspired by the natural processes, are therefore regarded as a highly promising area of research. Directed protein assembly is versatile with respect to the possible interactions which brings together the protein and polymer, e.g., electrostatic, v.d. Waals forces or covalent conjugation, and possible combinations are numerous due to the large amounts of different polymers and proteins available. The protein-polymer interacting behavior and overall morphology is envisioned to aid in clarifying protein-protein interactions and are thought to entail some interesting new functions and properties which will ultimately lead to novel bio-hybrid materials.

  10. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like...

  11. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  12. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  13. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  14. Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures

    CERN Document Server

    Kiyavash, Negar; Borisov, Nikita

    2012-01-01

    In this paper, we analyze several recent schemes for watermarking network flows that are based on splitting the flow into timing intervals. We show that this approach creates time-dependent correlations that enable an attack that combines multiple watermarked flows. Such an attack can easily be mounted in nearly all applications of network flow watermarking, both in anonymous communication and stepping stone detection. The attack can be used to detect the presence of a watermark, recover the secret parameters, and remove the watermark from a flow. The attack can be effective even if different flows are marked with different values of a watermark. We analyze the efficacy of our attack using a probabilistic model and a Markov-Modulated Poisson Process (MMPP) model of interactive traffic. We also implement our attack and test it using both synthetic and real-world traces, showing that our attack is effective with as few as 10 watermarked flows. Finally, we propose possible countermeasures to defeat the multi-flo...

  15. Utilization of Nitrones in Radical Polymerizations and Polymer Conjugations

    OpenAIRE

    Ranieri Lynn, Kayte

    2015-01-01

    Much research has been performed in the last 10 years on the use of nitrones in synthetic polymer chemistry. Nitrone polymer chemistry represents an additional tool to the “polymer toolbox”, which contributes to the advancement of modern polymer science and technology. In this present thesis, four interconnecting themes centered on the use of nitrones in radical polymerizations and coupling have been investigated. (1) Synthesize nitrones with various functionalities. (2) Utilize controlled ra...

  16. Face-Centered-Cubic Nanostructured Polymer Foams

    Science.gov (United States)

    Cui, C.; Baughman, R. H.; Liu, L. M.; Zakhidov, A. A.; Khayrullin, I. I.

    1998-03-01

    Beautifully iridescent polymer foams having Fm-3m cubic symmetry and periodicities on the scale of the wavelength of light have been synthesized by the templating of porous synthetic opals. These fabrication processes involve the filling of porous SiO2 opals (with typical cubic lattice parameters of 250 nm) with either polymers or polymer precursors, polymerization of the precursors if necessary, and removal of the fcc array of SiO2 balls to provide an all-polymer structure. The structures of these foams are similar to periodic minimal surfaces, although the Gaussian curvature can have both positive and negative values. Depending upon whether the internal surfaces of the opal are polymer filled or polymer coated, the polymer replica has either one or two sets of independent channels. We fill these channels with semiconductors, metals, or superconductors to provide electronic and optical materials with novel properties dependent on the nanoscale periodicity.

  17. Polymer and polymer-hybrid nanoparticles from synthesis to biomedical applications

    CERN Document Server

    Rangelov, Stanislav

    2013-01-01

    Polymeric and hybrid nanoparticles have received increased scientific interest in terms of basic research as well as commercial applications, promising a variety of uses for nanostructures in fields including bionanotechnology and medicine. Condensing the relevant research into a comprehensive reference, Polymer and Polymer-Hybrid Nanoparticles: From Synthesis to Biomedical Applications covers an array of topics from synthetic procedures and macromolecular design to possible biomedical applications of nanoparticles and materials based on original and unique polymers. The book presents a well-r

  18. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  19. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  20. Bio-inspired diversity for increasing attacker workload

    Science.gov (United States)

    Kuhn, Stephen

    2014-05-01

    Much of the traffic in modern computer networks is conducted between clients and servers, rather than client-toclient. As a result, servers represent a high-value target for collection and analysis of network traffic. As they reside at a single network location (i.e. IP/MAC address) for long periods of time. Servers present a static target for surveillance, and a unique opportunity to observe the network traffic. Although servers present a heightened value for attackers, the security community as a whole has shifted more towards protecting clients in recent years leaving a gap in coverage. In addition, servers typically remain active on networks for years, potentially decades. This paper builds on previous work that demonstrated a proof of concept leveraging existing technology for increasing attacker workload. Here we present our clean slate approach to increasing attacker workload through a novel hypervisor and micro-kernel, utilizing next generation virtualization technology to create synthetic diversity of the server's presence including the hardware components.

  1. PHOTOREFRACTIVE POLYMERS

    NARCIS (Netherlands)

    Morichere, D; Malliaras, G.G; Krasnikov, V.V.; Bolink, H.J; Hadziioannou, G

    1995-01-01

    The use of polymers as photorefractive materials offers many advantages : flexibility in synthesis, doping, processing and low cost. The required functionalities responsible for photorefractivity, namely charge generation, transport, trapping and linear electrooptic effect are given in the polymer w

  2. Continuous Weight Attack on Complex Network

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We introduce a continuous weight attack strategy and numerically investigate the effect of continuous use a weight coefficient ω to define the attack intensity. The weight coefficient ω increases continuously from 1 to infinity, where 1 represents no attack and infinity represents complete destructive attack. Our results show that the continuous weight attack on two selected nodes with small ω (ω≈ 3) could achieve the same damage of complete elimination of a single selected node on both BA and ER networks. It is found that the continuous weight attack on a single selected edge with small ω (ω≈ 2) can reach the same effect of complete elimination of a single edge on BA network, but on ER network the damage of the continuous weight attack on a single edge is close to but always smaller than that of complete elimination of edge even if ω is very large.

  3. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  4. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  5. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  6. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identifi...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  7. The use of azide-alkyne click chemistry in recent syntheses and applications of polytriazole-based nanostructured polymers

    Science.gov (United States)

    Shi, Yi; Cao, Xiaosong; Gao, Haifeng

    2016-02-01

    The rapid development of efficient organic click coupling reactions has significantly facilitated the construction of synthetic polymers with sophisticated branched nanostructures. This Feature Article summarizes the recent progress in the application of efficient copper-catalyzed and copper-free azide-alkyne cycloaddition (CuAAC and CuFAAC) reactions in the syntheses of dendrimers, hyperbranched polymers, star polymers, graft polymers, molecular brushes, and cyclic graft polymers. Literature reports on the interesting properties and functions of these polytriazole-based nanostructured polymers are also discussed to illustrate their potential applications as self-healing polymers, adhesives, polymer catalysts, opto-electronic polymer materials and polymer carriers for drug and imaging molecules.

  8. Polymer Brushes

    NARCIS (Netherlands)

    Vos, de W.M.; Kleijn, J.M.; Keizer, de A.; Cosgrove, T.; Cohen Stuart, M.A.

    2010-01-01

    A polymer brush can be defined as a dense array of polymers end-attached to an interface that stretch out into the surrounding medium. Polymer brushes have been investigated for the past 30 years and have shown to be an extremely useful tool to control interfacial properties. This review is intended

  9. Routes to Hydrogen Bonding Chain-End Functionalized Polymers.

    Science.gov (United States)

    Bertrand, Arthur; Lortie, Frédéric; Bernard, Julien

    2012-12-21

    The contribution of supramolecular chemistry to polymer science opens new perspectives for the design of polymer materials exhibiting valuable properties and easier processability due to the dynamic nature of non-covalent interactions. Hydrogen bonding polymers can be used as supramolecular units for yielding larger assemblies that possess attractive features, arising from the combination of polymer properties and the responsiveness of hydrogen bonds. The post-polymerization modification of reactive end-groups is the most common procedure for generating such polymers. Examples of polymerizations mediated by hydrogen bonding-functionalized precursors have also recently been reported. This contribution reviews the current synthetic routes toward hydrogen bonding sticker chain-end functionalized polymers.

  10. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  11. Conjugated Polymers for Energy Production

    DEFF Research Database (Denmark)

    Livi, Francesco

    arylation (DAr) and direct arylation polymerization (DArP) have been applied to the preparation of PPDTBT, making this polymer readily available in only 4 synthetic steps and thus easily transferable to a large scale-production setup. DArP avoids organometallic species and therefore is an appealing......This dissertation is aimed at developing materials for flexible, large area, ITO-free polymer solar cells (PSCs) fully printed under ambient conditions. A large screening of conjugated polymers, both novel and well-known materials, has been carried out in order to find suitable candidates...... for scalable PSCs fully printed under ambient conditions [Adv. Energy Mater. 2015, 5, 1402186]. PPDTBT resulted to be the conjugated polymer with the best photovoltaic performance within the 104 synthesized macromolecules. Therefore, further studies have been done on such material. The impact of side chain...

  12. Designing synthetic biology.

    Science.gov (United States)

    Agapakis, Christina M

    2014-03-21

    Synthetic biology is frequently defined as the application of engineering design principles to biology. Such principles are intended to streamline the practice of biological engineering, to shorten the time required to design, build, and test synthetic gene networks. This streamlining of iterative design cycles can facilitate the future construction of biological systems for a range of applications in the production of fuels, foods, materials, and medicines. The promise of these potential applications as well as the emphasis on design has prompted critical reflection on synthetic biology from design theorists and practicing designers from many fields, who can bring valuable perspectives to the discipline. While interdisciplinary connections between biologists and engineers have built synthetic biology via the science and the technology of biology, interdisciplinary collaboration with artists, designers, and social theorists can provide insight on the connections between technology and society. Such collaborations can open up new avenues and new principles for research and design, as well as shed new light on the challenging context-dependence-both biological and social-that face living technologies at many scales. This review is inspired by the session titled "Design and Synthetic Biology: Connecting People and Technology" at Synthetic Biology 6.0 and covers a range of literature on design practice in synthetic biology and beyond. Critical engagement with how design is used to shape the discipline opens up new possibilities for how we might design the future of synthetic biology.

  13. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  14. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to ...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs.......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...

  15. ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL

    Institute of Scientific and Technical Information of China (English)

    Wei Baodian; Liu Dongsu; Wang Xinmei

    2004-01-01

    The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.

  16. Polímeros sintéticos biodegradáveis: matérias-primas e métodos de produção de micropartículas para uso em drug delivery e liberação controlada Biodegradable synthetic polymers: raw-materials and production methods of microparticles for drug delivery and controlled release

    Directory of Open Access Journals (Sweden)

    Patrícia Severino

    2011-01-01

    Full Text Available Micropartículas produzidas a partir de polímeros sintéticos têm sido amplamente utilizadas na área farmacêutica para encapsulação de princípios ativos. Essas micropartículas apresentam as vantagens de proteção do princípio ativo, mucoadesão e gastrorresistência, melhor biodisponibilidade e maior adesão do paciente ao tratamento. Além disso, utiliza menores quantidade de princípio ativo para obtenção do efeito terapêutico proporcionando diminuição dos efeitos adversos locais, sistêmicos e menor toxidade. Os polímeros sintéticos empregados na produção das micropartículas são classificados biodegradáveis ou não biodegradáveis, sendo os biodegradáveis mais utilizados por não necessitam ser removidos cirurgicamente após o término de sua ação. A produção das micropartículas poliméricas sintéticas para encapsulação tanto de ativos hidrofílicos quanto hidrofóbicos pode ser emulsificação por extração e/ou evaporação do solvente; coacervação; métodos mecânicos e estão revisados neste artigo evidenciando as vantagens, desvantagens e viabilidade de cada metodologia. A escolha da metodologia e do polímero sintético a serem empregados na produção desse sistema dependem da aplicação terapêutica requerida, bem como a simplicidade, reprodutibilidade e factibilidade do aumento de escala da produção.Microparticles produced from synthetic polymers have been widely used in the pharmaceutical field for encapsulation of drugs. These microparticles show several advantages such as drug protection, mucoadhesion, gastro-resistance, improved bioavailability and increased patient's compliance. In addition, it is possible to use lower amount of drug to achieve therapeutic efficiency with reduced local/systemic adverse side effects and low toxicity. Synthetic polymers used for the production of microparticles are classified as biodegradable or non-biodegradable, being the former more popular since these do

  17. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  18. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  19. Impact of Alleged Russian Cyber Attacks

    Science.gov (United States)

    2009-05-01

    March 14, 2009). 96 Ivan Buranov, Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal...Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated by Open Source...Buranov, Ivan; Vodo, Vladimir; and Yegikyan, Seda Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated

  20. Polymer-Dependent Layer Structures in Montmorillonite Nanocomposites

    Directory of Open Access Journals (Sweden)

    Justyna Strankowska

    2011-12-01

    Full Text Available We have studied structural differences among tetrahedral and octahedral sodium Montmorillonite layer arrangements in naturally occurring and synthetic montmorillonite clay minerals, as well as their poly(ethylene oxide and poly(ε-coprolatone polymer nanocomposites.

  1. Liquid crystalline order in polymers

    CERN Document Server

    Blumstein, Alexandre

    1978-01-01

    Liquid Crystalline Order in Polymers examines the topic of liquid crystalline order in systems containing rigid synthetic macromolecular chains. Each chapter of the book provides a review of one important area of the field. Chapter 1 discusses scattering in polymer systems with liquid crystalline order. It also introduces the field of liquid crystals. Chapter 2 treats the origin of liquid crystalline order in macromolecules by describing the in-depth study of conformation of such macromolecules in their unassociated state. The chapters that follow describe successively the liquid crystalli

  2. Synthetic Base Fluids

    Science.gov (United States)

    Brown, M.; Fotheringham, J. D.; Hoyes, T. J.; Mortier, R. M.; Orszulik, S. T.; Randles, S. J.; Stroud, P. M.

    The chemical nature and technology of the main synthetic lubricant base fluids is described, covering polyalphaolefins, alkylated aromatics, gas-to-liquid (GTL) base fluids, polybutenes, aliphatic diesters, polyolesters, polyalkylene glycols or PAGs and phosphate esters.Other synthetic lubricant base oils such as the silicones, borate esters, perfluoroethers and polyphenylene ethers are considered to have restricted applications due to either high cost or performance limitations and are not considered here.Each of the main synthetic base fluids is described for their chemical and physical properties, manufacture and production, their chemistry, key properties, applications and their implications when used in the environment.

  3. Synthetic cathinone abuse

    Directory of Open Access Journals (Sweden)

    Capriola M

    2013-07-01

    Full Text Available Michael Capriola Thomasville Medical Center, Thomasville, NC, USA Abstract: The abuse of synthetic cathinones, widely known as bath salts, has been increasing since the mid-2000s. These substances are derivatives of the naturally occurring compound cathinone, which is the primary psychoactive component of khat. The toxicity of synthetic cathinones includes significant sympathomimetic effects, as well as psychosis, agitation, aggression, and sometimes violent and bizarre behavior. Mephedrone and methylenedioxypyrovalerone are currently the predominantly abused synthetic cathinones. Keywords: designer drugs/chemistry, street drugs/pharmacology, substance-related disorders/epidemiology, alkaloids/poisoning

  4. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  5. Attacks on Local Searching Tools

    CERN Document Server

    Nielson, Seth James; Wallach, Dan S

    2011-01-01

    The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

  6. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  7. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  8. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  9. An Integrated Laboratory Approach toward the Preparation of Conductive Poly(phenylene vinylene) Polymers

    Science.gov (United States)

    Knoerzer, Timm A.; Balaich, Gary J.; Miller, Hannah A.; Iacono, Scott T.

    2014-01-01

    Poly(phenylene vinylene) (PPV) represents an important class of conjugated, conducting polymers that have been readily exploited in the preparation of organic electronic materials. In this experiment, students prepare a PPV polymer via a facile multistep synthetic sequence with robust spectroscopic evaluation of synthetic intermediates and the…

  10. Bio-based and recycled polymers for cleaner production : an assessment of plastics and fibres

    NARCIS (Netherlands)

    Shen, L.

    2011-01-01

    Today, almost all man-made plastics and fibres are produced from synthetic polymers. Synthetic polymers, made from petroleum which took millions of years to form, have three sustainability challenges: (i) the limited fossil fuel resources, (ii) the environmental impacts caused by non-degradable plas

  11. Kinetic and structural analysis of enzyme sliding on a substrate: multiple attack in beta-amylase.

    Science.gov (United States)

    Ishikawa, Kazuhiko; Nakatani, Hiroshi; Katsuya, Yoshio; Fukazawa, Chikafusa

    2007-01-23

    Beta-amylase (EC 3.2.1.2) is starch-hydrolyzing exo-type enzyme that can catalyze the successive liberation of beta-maltose from the nonreducing ends of alpha-1,4-linked glucopyranosyl polymers. There is a well-known phenomenon called multiple or repetitive attack where the enzyme releases several maltose molecules in a single enzyme-substrate complex. In order to understand it further, we examined the beta-amylase-catalyzed reaction using maltooligosaccharides. The Monte Carlo method was applied for simulation of the beta-amylase-catalyzed reaction including the multiple attack mechanism. Through site-directed mutagenesis, we have successfully prepared a mutant enzyme which may be simulated as a multiple attack action reduced one with retaining significant hydrolytic activity. From the results of X-ray structure analysis of the mutant enzyme, it was clarified that one carboxyl residue plays a very important role in the multiple attack. The multiple attack action needs the force of enzyme sliding on the substrate. In addition, it is important for the multiple attack that the enzyme and substrate have the characteristics of a stable productive substrate-enzyme complex through a hydrogen bond between the nonreducing end of the substrate and the carboxyl residue of the enzyme.

  12. Electrospinning polymer blends for biomimetic scaffolds for ACL tissue engineering

    Science.gov (United States)

    Garcia, Vanessa Lizeth

    The anterior cruciate ligament (ACL) rupture is one of the most common knee injuries. Current ACL reconstructive strategies consist of using an autograft or an allograft to replace the ligament. However, limitations have led researchers to create tissue engineered grafts, known as scaffolds, through electrospinning. Scaffolds made of natural and synthetic polymer blends have the potential to promote cell adhesion while having strong mechanical properties. However, enzymes found in the knee are known to degrade tissues and affect the healing of intra-articular injuries. Results suggest that the natural polymers used in this study modify the thermal properties and tensile strength of the synthetic polymers when blended. Scanning electron microscopy display bead-free and enzyme biodegradability of the fibers. Raman spectroscopy confirms the presence of the natural and synthetic polymers in the scaffolds while, amino acid analysis present the types of amino acids and their concentrations found in the natural polymers.

  13. STAR POLYMERS

    OpenAIRE

    Ch. von Ferber; Yu.Holovatch

    2002-01-01

    It is our great pleasure to present a collection of papers devoted to theoretical, numerical, and experimental studies in the field of star polymers. Since its introduction in the early 80-ies, this field has attracted increasing interest and has become an important part of contemporary polymer physics. While research papers in this field appear regularly in different physical and chemical journals, the present collection is an attempt to join together the studies of star polymers showing the...

  14. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  15. Polymer Chemistry

    Science.gov (United States)

    Williams, Martha; Roberson, Luke; Caraccio, Anne

    2010-01-01

    This viewgraph presentation describes new technologies in polymer and material chemistry that benefits NASA programs and missions. The topics include: 1) What are Polymers?; 2) History of Polymer Chemistry; 3) Composites/Materials Development at KSC; 4) Why Wiring; 5) Next Generation Wiring Materials; 6) Wire System Materials and Integration; 7) Self-Healing Wire Repair; 8) Smart Wiring Summary; 9) Fire and Polymers; 10) Aerogel Technology; 11) Aerogel Composites; 12) Aerogels for Oil Remediation; 13) KSC's Solution; 14) Chemochromic Hydrogen Sensors; 15) STS-130 and 131 Operations; 16) HyperPigment; 17) Antimicrobial Materials; 18) Conductive Inks Formulations for Multiple Applications; and 19) Testing and Processing Equipment.

  16. Metal Containing Polymers as Fuel Cell Catalysts.

    Science.gov (United States)

    1987-06-30

    AvjilLib:I:W. C, s IAvoi! ~ or Dist Spo.:11 TRLE OF CONTENTS Introduction 1 Results 3 Electrocatalyst Synthesis and Characterization 3 Rationale 3...collector may be effected by a number of mechanisms. � 3 ELECTRODECATALYST SYNTHESIS AND CHARACTERIZATION Rational e The synthetic objectives of the...orometnyl polystyrene to yield a diketone contain- ing polymer. These 1 i:ter two polymers 3re particularly interesting in t, - tney pose in alternative to

  17. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  18. History of synthetic materials in alloplastic cranioplasty.

    Science.gov (United States)

    Harris, Dominic A; Fong, Abigail J; Buchanan, Edward P; Monson, Laura; Khechoyan, David; Lam, Sandi

    2014-04-01

    When faced with calvarial defects, surgeons have long searched for repair materials. General criteria include ease of use, low cost, availability, cosmetic shape, and osteointegrative potential. While autologous bone is widely used and favored in contemporary reconstructive procedures, synthetic alternatives have been used throughout history and are necessary in current practice for select cases when autograft reconstruction is not an option (such as cases with severe bony comminution, bone graft resorption, infection, and limited donor site options). For centuries, surgeons have experimented with metals, ceramics, plastics, and later, resorbable polymers. This paper provides a tour of the materials that have been used and experimented with throughout the history of alloplastic cranioplasty.

  19. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  20. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  1. Minimization and Reliability Analyses of Attack Graphs

    Science.gov (United States)

    2002-02-01

    they model only attacks. Since we have a generic state machine model , we can simultaneously model not just attacks, but also seemingly benign system...Finite State Machine Model The Network We model the network as a set of facts, each represented as a relational predicate. The state of the network

  2. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  3. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  4. Attack tree generation by policy invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified th

  5. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  6. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  7. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  8. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash......In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... function Skein, a finalist of the SHA-3 competition. Our attack penetrates more than two thirds of the Skein core—the cipher Threefish, and made the designers to change the submission in order to prevent it. The rebound part of our attack has been significantly enhanced to deliver results on the largest...

  9. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  10. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  11. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  12. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  13. Polymers & People

    Science.gov (United States)

    Lentz, Linda; Robinson, Thomas; Martin, Elizabeth; Miller, Mary; Ashburn, Norma

    2004-01-01

    Each Tuesday during the fall of 2002, teams of high school students from three South Carolina counties conducted a four-hour polymer institute for their peers. In less than two months, over 300 students visited the Charleston County Public Library in Charleston, South Carolina, to explore DNA, nylon, rubber, gluep, and other polymers. Teams of…

  14. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  15. Synthesis of a Molecularly Imprinted Polymer for Dioxin

    OpenAIRE

    Magda Brattoli; Vito Sgobba; Giuseppe Ciccarella; Rosaria Anna Picca; Cosimino Malitesta

    2006-01-01

    A molecularly imprinted polymer for recognising selectively 2,3,7,8-tetrachlorodibenzodioxin (TCDD) was made by a new non-covalent method employing a“dummy†template. The proposed way represents a simplification of a synthetic schemeproposed by Lübke et al.[1] for covalent imprinting. Comparison of extraction yields of thenovel polymer, a non imprinted polymer and an imprinting polymer, prepared by theoriginal procedure demonstrates the binding capacity of the proposed polymer, wh...

  16. Synthesis of a Molecularly Imprinted Polymer for Dioxin

    Directory of Open Access Journals (Sweden)

    Magda Brattoli

    2006-08-01

    Full Text Available A molecularly imprinted polymer for recognising selectively 2,3,7,8-tetrachlorodibenzodioxin (TCDD was made by a new non-covalent method employing a“dummy” template. The proposed way represents a simplification of a synthetic schemeproposed by Lübke et al.[1] for covalent imprinting. Comparison of extraction yields of thenovel polymer, a non imprinted polymer and an imprinting polymer, prepared by theoriginal procedure demonstrates the binding capacity of the proposed polymer, which is inprinciple applicable to solid phase extraction (SPE of dioxin.

  17. Synthesis of regioregular pentacene-containing conjugated polymers

    KAUST Repository

    Okamoto, Toshihiro

    2011-01-01

    We report the synthesis and characterization of a new class of regioregular pentacene-containing conjugated polymers via our synthetic routes reported previously. We found that our regioregular pentacene polymers showed improved ordering than their regiorandom counterpart as well as ambipolar OFET performance. © 2011 The Royal Society of Chemistry.

  18. The Synthetic Cannabinoids Phenomenon.

    Science.gov (United States)

    Karila, Laurent; Benyamina, Amine; Blecha, Lisa; Cottencin, Olivier; Billieux, Joël

    2016-01-01

    « Spice » is generally used to describe the diverse types of herbal blends that encompass synthetic cannabinoids on the market. The emergence of smokable herbal products containing synthetic cannabinoids, which mimic the effects of cannabis, appears to become increasingly popular, in the new psychoactive substances landscape. In 2014, the existence of 134 different types of synthetic cannabinoids were reported by the European Union Early Warning System. These drugs are mainly sold online as an alternative to controlled and regulated psychoactive substances. They appear to have a life cycle of about 1-2 years before being replaced by a next wave of products. Legislation controlling these designer drugs has been introduced in many countries with the objective to limit the spread of existing drugs and control potential new analogs. The majority of the synthetic cannabinoids are full agonists at the CB1 receptor and do not contain tobacco or cannabis. They are becoming increasingly popular in adolescents, students and clubbers as an abused substance. Relatively high incidence of adverse effects associated with synthetic cannabinoids use has been documented in the literature. Numerous fatalities linked with their use and abuse have been reported. In this paper, we will review the available data regarding the use and effects of synthetic cannabinoids in humans in order to highlight their impact on public health. To reach this objective, a literature search was performed on two representative databases (Pubmed, Google Scholar), the Erowid Center website (a US non-profit educational organization that provides information about psychoactive plants and chemicals), and various governmental websites. The terms used for the database search were: "synthetic cannabinoids", "spice", "new psychoactive substances", and/or "substance use disorder", and/or "adverse effects", and/or "fatalities". The search was limited to years 2005 to 2016 due to emerging scientific literature at

  19. Bio-based and recycled polymers for cleaner production : an assessment of plastics and fibres

    OpenAIRE

    Shen, L.

    2011-01-01

    Today, almost all man-made plastics and fibres are produced from synthetic polymers. Synthetic polymers, made from petroleum which took millions of years to form, have three sustainability challenges: (i) the limited fossil fuel resources, (ii) the environmental impacts caused by non-degradable plastics waste, and (iii) greenhouse gas emissions caused by combusting fossil fuels. To tackle these sustainability challenges, two strategies have been proposed. First, use bio-based polymers to repl...

  20. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  1. An Intrusion Detection System Against UDP Flood Attack and Ping of Death Attack (DDOS in MANET

    Directory of Open Access Journals (Sweden)

    Ankur Ashok Acharya

    2016-04-01

    Full Text Available DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death attack are considered to be important as these two attacks may cause severe damage to the network. To provide better security to the network, efficient intrusion detection (IDS system is required to monitor the network continuously, keeping track of malicious activities and policy violations and produce report to the network administrator. UDP flood attack and ping of death attack are given importance in this paper as they are not well addressed in the existing research works. Packet capture and packet decoder is used to identify the packets and retrieve the packet details. A threshold is set for each node that is connected to the network. If the packet flow into the node exceeds the threshold that is set then the administrator is notified about the same.

  2. Atomic Oxygen Erosion Yield Dependence Upon Texture Development in Polymers

    Science.gov (United States)

    Banks, Bruce A.; Loftus, Ryan J.; Miller, Sharon K.

    2016-01-01

    The atomic oxygen erosion yield (volume of a polymer that is lost due to oxidation per incident atom) of polymers is typically assumed to be reasonably constant with increasing fluence. However polymers containing ash or inorganic pigments, tend to have erosion yields that decrease with fluence due to an increasing presence of protective particles on the polymer surface. This paper investigates two additional possible causes for erosion yields of polymers that are dependent upon atomic oxygen. These are the development of surface texture which can cause the erosion yield to change with fluence due to changes in the aspect ratio of the surface texture that develops and polymer specific atomic oxygen interaction parameters. The surface texture development under directed hyperthermal attack produces higher aspect ratio surface texture than isotropic thermal energy atomic oxygen attack. The fluence dependence of erosion yields is documented for low Kapton H (DuPont, Wilmington, DE) effective fluences for a variety of polymers under directed hyperthermal and isotropic thermal energy attack.

  3. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  4. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  5. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  6. CO2-stimulated diversiform deformations of polymer assemblies.

    Science.gov (United States)

    Yan, Qiang; Zhao, Yue

    2013-11-01

    Use of a given physiological stimulus to delicately deform polymer assemblies is a challenging topic. Here we develop synthetic block copolymers to construct a series of CO2-sensitive self-assembled nanostructures that can simulate controllable deformations of the organelles in different ways. By controlling the CO2 stimulation levels, one can modulate the size, shape, and morphology of the polymer aggregates, which is conducive to understanding the stimuli-triggered dynamic reshaping process of polymer assemblies in aqueous solution.

  7. Synthetic guide star generation

    Science.gov (United States)

    Payne, Stephen A [Castro Valley, CA; Page, Ralph H [Castro Valley, CA; Ebbers, Christopher A [Livermore, CA; Beach, Raymond J [Livermore, CA

    2008-06-10

    A system for assisting in observing a celestial object and providing synthetic guide star generation. A lasing system provides radiation at a frequency at or near 938 nm and radiation at a frequency at or near 1583 nm. The lasing system includes a fiber laser operating between 880 nm and 960 nm and a fiber laser operating between 1524 nm and 1650 nm. A frequency-conversion system mixes the radiation and generates light at a frequency at or near 589 nm. A system directs the light at a frequency at or near 589 nm toward the celestial object and provides synthetic guide star generation.

  8. Emulsification-Induced Homohelicity in Racemic Helical Polymer for Preparing Optically Active Helical Polymer Nanoparticles.

    Science.gov (United States)

    Zhao, Biao; Deng, Jinrui; Deng, Jianping

    2016-04-01

    Optically active nano- and microparticles have constituted a significant category of advanced functional materials. However, constructing optically active particles derived from synthetic helical polymers still remains as a big challenge. In the present study, it is attempted to induce a racemic helical polymer (containing right- and left-handed helices in equal amount) to prefer one predominant helicity in aqueous media by using emulsifier in the presence of chiral additive (emulsification process). Excitingly, the emulsification process promotes the racemic helical polymer to unify the helicity and directly provides optically active nanoparticles constructed by chirally helical polymer. A possible mechanism is proposed to explain the emulsification-induced homohelicity effect. The present study establishes a novel strategy for preparing chirally helical polymer-derived optically active nanoparticles based on racemic helical polymers.

  9. Conjugate polymers and electronic conductive polymers; Polymeres conjugues et polymeres conducteurs electroniques

    Energy Technology Data Exchange (ETDEWEB)

    Attias, A.J. [Universite Pierre et Marie Curie, Lab. de Chimie Macromoleculaire, UMR 7610 - CNRS, 75 - Paris (France)

    2002-05-01

    In some certain conditions a plastic material can become conductive (synthetic metal). To become conductive, a polymer must be conjugate (alternance of simple and multiple bonds) and doped (electron removal or addition). This article presents the recent advances and trends of the research on conductive polymers. The role of {pi} electrons in the conjugate systems is recalled in a first part. The description of energy states of conjugate polymers in terms of bands structure allow to consider them as organic semiconductors. Thus, it is possible to generate charged species by doping, charge injection or photo-excitation. These charge carriers, the conduction mechanisms and the related applications are presented. The chemistry and synthesis of these polymers are presented in a second part: 1 - evolution of research; 2 - physics of conductive polymers (role of {pi} electrons in conjugate polymers, {pi}-electrons conjugate compounds, influence of conjugation length and notion of bands structure, charges-doping generation, conductive polymers, chemical doping and electrical conduction, charge injection at the conjugate semiconductor metal-polymer interface: electro-luminescent polymers, charge creation by photo-excitation: polymers for photovoltaic cells); 3 - chemistry of conductive polymers (role of synthesis, monomers choice, other trends). (J.S.)

  10. Multiple Partial Attacks on Complex Networks

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We numerically investigate the effect of four kinds of partial attacks of multiple targets on the Barabási-Albert (BA) scale-free network and the Erd(o)s-Rényi (ER) random network.Comparing with the effect of single target complete knockout we find that partial attacks of multiple targets may produce an effect higher than the complete knockout of a single target on both BA scale-free network and ER random network.We also find that the BA ecale-free network seems to be more susceptible to multi-target partial attacks than the ER random network.

  11. Measuring a System’s Attack Surface

    Science.gov (United States)

    2004-01-01

    fold: • In terms of a state machine model of the system, we present formal definitions of attack, attack surface, and attack class. Our definitions are...versions. The rest of this paper is organized as follows. In Section 2, we introduce our state machine model and point out the key differences from...approach in Section 6 and compare it to related work in Section 7. We conclude in Section 8. 2 State Machine Model We use a state machine to model the

  12. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  13. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  14. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks ... symptoms are called silent heart attacks. Most Common Symptoms The most common warning symptoms of a heart ...

  15. Post-functionalization of polymers via orthogonal ligation chemistry.

    Science.gov (United States)

    Goldmann, Anja S; Glassner, Mathias; Inglis, Andrew J; Barner-Kowollik, Christopher

    2013-05-27

    The establishment of advanced living/controlled polymerization protocols allows for engineering synthetic polymers in a precise fashion. Combining advanced living/controlled polymerization techniques with highly efficient coupling chemistries facilitates quantitative, modular, and orthogonal functionalization of synthetic polymer strands at their chain termini as well as side-chain functionalization. The review highlights the current status of selected post-functionalization techniques of polymers via orthogonal ligation chemistries, major characteristics of the specific transformation chemistry, as well as the characterization of the products.

  16. Entangled Polymer Melts in Extensional Flow

    DEFF Research Database (Denmark)

    Hengeller, Ludovica

    Many commercial materials derived from synthetic polymers exhibit a complex response under different processing operations such as fiber formation, injection moulding,film blowing, film casting or coatings. They can be processed both in the solid or in the melted state. Often they may contain two...... or more different polymers in addition to additives, fillers or solvents in order to modify the properties of the final product. Usually, it is also desired to improve the processability. For example the supplement of a high molecular weight component improves the stability in elongational flows....... On the other hand, addition of low-volatility solvents to polymers is also a common industrial practice that others a means for lowering the Tg of the polymers. Moreover industrial polymers present a wide distribution of chain lengths and/or branched architectures that strongly influence their response...

  17. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  18. A Two-Phase Multiobjective Evolutionary Algorithm for Enhancing the Robustness of Scale-Free Networks Against Multiple Malicious Attacks.

    Science.gov (United States)

    Zhou, Mingxing; Liu, Jing

    2017-02-01

    Designing robust networks has attracted increasing attentions in recent years. Most existing work focuses on improving the robustness of networks against a specific type of attacks. However, networks which are robust against one type of attacks may not be robust against another type of attacks. In the real-world situations, different types of attacks may happen simultaneously. Therefore, we use the Pearson's correlation coefficient to analyze the correlation between different types of attacks, model the robustness measures against different types of attacks which are negatively correlated as objectives, and model the problem of optimizing the robustness of networks against multiple malicious attacks as a multiobjective optimization problem. Furthermore, to effectively solve this problem, we propose a two-phase multiobjective evolutionary algorithm, labeled as MOEA-RSFMMA. In MOEA-RSFMMA, a single-objective sampling phase is first used to generate a good initial population for the later two-objective optimization phase. Such a two-phase optimizing pattern well balances the computational cost of the two objectives and improves the search efficiency. In the experiments, both synthetic scale-free networks and real-world networks are used to validate the performance of MOEA-RSFMMA. Moreover, both local and global characteristics of networks in different parts of the obtained Pareto fronts are studied. The results show that the networks in different parts of Pareto fronts reflect different properties, and provide various choices for decision makers.

  19. Chemical virology: Packing polymers in protein cages

    Science.gov (United States)

    Cornelissen, Jeroen J. L. M.

    2012-10-01

    The combination of addressable synthetic macromolecules with proteins of precise structure and function often leads to materials with unique properties, as is now shown by the efficient multi-site initiation of polymer growth inside the cavity of a virus capsid.

  20. Plastic Antibodies: Molecular Recognition with Imprinted Polymers

    Science.gov (United States)

    Rushton, Gregory T.; Furmanski, Brian; Shimizu, Ken D.

    2005-01-01

    Synthetic polymers are prepared and tested in a study for their molecular recognition properties of an adenine derivative, ethyl adenine-9-acetate (EA9A), within two laboratory periods. The procedure introduces undergraduate chemistry students to noncovalent molecular imprinting as well as the analytical techniques for assessing their recognition…

  1. Synthetic Aperture Radar Interferometry

    Science.gov (United States)

    Rosen, P. A.; Hensley, S.; Joughin, I. R.; Li, F.; Madsen, S. N.; Rodriguez, E.; Goldstein, R. M.

    1998-01-01

    Synthetic aperture radar interferometry is an imaging technique for measuring the topography of a surface, its changes over time, and other changes in the detailed characteristics of the surface. This paper reviews the techniques of interferometry, systems and limitations, and applications in a rapidly growing area of science and engineering.

  2. Synthetic studies towards bottromycin

    Directory of Open Access Journals (Sweden)

    Stefanie Ackermann

    2012-10-01

    Full Text Available Thio-Ugi reactions are described as an excellent synthetic tool for the synthesis of sterically highly hindered endothiopeptides. S-Methylation and subsequent amidine formation can be carried out in an inter- as well as in an intramolecular fashion. The intramolecular approach allows the synthesis of the bottromycin ring system in a straightforward manner.

  3. Synthetic growth reference charts

    NARCIS (Netherlands)

    Hermanussen, Michael; Stec, Karol; Aßmann, Christian; Meigen, Christof; Van Buuren, Stef

    2016-01-01

    Objectives: To reanalyze the between-population variance in height, weight, and body mass index (BMI), and to provide a globally applicable technique for generating synthetic growth reference charts. Methods: Using a baseline set of 196 female and 197 male growth studies published since 1831, common

  4. Organometallic Polymers.

    Science.gov (United States)

    Carraher, Charles E., Jr.

    1981-01-01

    Reactions utilized to incorporate a metal-containing moiety into a polymer chain (addition, condensation, and coordination) are considered, emphasizing that these reactions also apply to smaller molecules. (JN)

  5. Taxonomy of SSL/TLS Attacks

    Directory of Open Access Journals (Sweden)

    Keerthi Vasan K.

    2016-02-01

    Full Text Available Secure Socket Layer (SSL and Transport Layer Security (TLS protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.

  6. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  7. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  8. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  9. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  10. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  11. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  12. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... medicines also keep existing clots from getting larger. Beta blockers . Beta blockers decrease your heart’s workload. These medicines also are ... discomfort and to help prevent another heart attack. Beta blockers also are used to treat arrhythmias (irregular heartbeats). ...

  13. Preventing Coordinated Attacks Via Distributed Alert Exchange

    CERN Document Server

    Garcia-Alfaro, Joaquin; Muehl, Gero; Borrell, Joan

    2008-01-01

    Attacks on information systems followed by intrusions may cause large revenue losses. The prevention of both is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to recognize and react to the different actions of such an attack. The design and deployment of a decentralized system targeted at detecting as well as reacting to information system attacks might benefit from the loose coupling realized by publish/subscribe middleware. In this paper, we present the advantages and convenience in using this communication paradigm for a general decentralized attack prevention framework. Furthermore, we present the design and implementation of our approach based on existing publish/subscribe middleware and evaluate our approach for GNU/Linux systems.

  14. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  15. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  16. Study Shows How Zika Attacks Infant Brain

    Science.gov (United States)

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  17. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  18. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  19. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  20. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  1. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment...... sequences to treat four moderate-to-severe migraine attacks. Control patients received placebo for three attacks and telcagepant 140 mg for one attack. Efficacy for the first attack (Attack 1) and consistency of efficacy over multiple attacks were assessed. For an individual patient, consistent efficacy...

  2. Synthetic Plant Defense Elicitors

    Directory of Open Access Journals (Sweden)

    Yasemin eBektas

    2015-01-01

    Full Text Available To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of the some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection.

  3. Heart Attack Prediction System Based Neural Arbitration

    OpenAIRE

    Helwan, Abdulkader

    2015-01-01

    Heart attack is an asymptomatic and epidemic medical condition that may suddenly occur and causes “death”. Therefore, it is a life-threatening condition and it should be detected before it occurs. Heart attack is so far predicted using the conventional ways of doctor’s examination and by performing some medical tests such as stress test, ECG, and heart CTScan etc. The coronary vessels constriction, the cholesterol levels in the arteries, and other attributes can be good indicators for making ...

  4. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  5. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  6. Synthetic virology: engineering viruses for gene delivery.

    Science.gov (United States)

    Guenther, Caitlin M; Kuypers, Brianna E; Lam, Michael T; Robinson, Tawana M; Zhao, Julia; Suh, Junghae

    2014-01-01

    The success of gene therapy relies heavily on the performance of vectors that can effectively deliver transgenes to desired cell populations. As viruses have evolved to deliver genetic material into cells, a prolific area of research has emerged over the last several decades to leverage the innate properties of viruses as well as to engineer new features into them. Specifically, the field of synthetic virology aims to capitalize on knowledge accrued from fundamental virology research in order to design functionally enhanced gene delivery vectors. The enhanced viral vectors, or 'bionic' viruses, feature engineered components, or 'parts', that are natural (intrinsic to viruses or from other organisms) and synthetic (such as man-made polymers or inorganic nanoparticles). Various design strategies--rational, combinatorial, and pseudo-rational--have been pursued to create the hybrid viruses. The gene delivery vectors of the future will likely criss-cross the boundaries between natural and synthetic domains to harness the unique strengths afforded by the various functional parts that can be grafted onto virus capsids. Such research endeavors will further expand and enable enhanced control over the functional capacity of these nanoscale devices for biomedicine.

  7. SFC and National Synthetic Fuels Policy

    Energy Technology Data Exchange (ETDEWEB)

    Rothberg, P.F.

    1984-09-01

    Besieged by accusations such as mismanagement and malfeasance, the US Synthetic Fuels Corporation's (SFC) future is anything but secure. SFC set out to help stimulate a domestic synthetic fuels industry, a response to the energy problems of the 1970s. During its four year existence, the Corporation witnessed the resignation of many of its Board members and endured several corporate crises, while receiving vigorous attacks for its failure to operate efficiently and effectivley. Recent critics argue that the current energy situation precludes the need for SFC's $13.25 billion program; reduced oil prices and a world crude surplus have shifted concern from energy shortages to the enormous Federal budget deficit. Proponents argue that SFC's program would actually result in minimal budget outlays and that the long-term US national security and energy supply situation dictate the need for continued support. The controversy continues while SFC's Board sits dormant, without its four member quorum, unable to continue the roles of banker, insurance company and venture capital investor for which it was created. 2 tables.

  8. These Synthetic Times

    Institute of Scientific and Technical Information of China (English)

    KIT GILLET

    2008-01-01

    @@ Already slated to be one of the most important cultural events in the buildup to this summer's Olympic games, Synthetic Times-Media Art China 2008 will feature the works of more than 30 artists from around the world. Upwards of 40 media art installations will be exhibited in the National Art Museum of China alone, along with performances, workshops, presentations, and discussion panels focusing on the art works and the growth of media art as a discipline.

  9. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  10. Synthetic gases production

    Energy Technology Data Exchange (ETDEWEB)

    Mazaud, J.P.

    1996-06-01

    The natural gas or naphtha are the main constituents used for the production of synthetic gases. Several production ways of synthetic gases are industrially used as for example the natural gas or naphtha catalytic reforming, the selective oxidation of natural gas or heavy fuels and the coal oxy-vapo-gasification. The aim of this work is to study the different steps of production and treatment of the synthetic gases by the way of catalytic reforming. The first step is the desulfurization of the hydrocarbons feedstocks. The process used in industry is described. Then is realized the catalytic hydrocarbons reforming process. After having recalled some historical data on the catalytic reforming, the author gives the reaction kinetics and thermodynamics. The possible reforming catalysts, industrial equipments and furnaces designs are then exposed. The carbon dioxide is a compound easily obtained during the reforming reactions. It is a wasteful and harmful component which has to be extracted of the gaseous stream. The last step is then the gases de-carbonation. Two examples of natural gas or naphtha reforming reactions are at last given: the carbon monoxide conversion by steam and the carbon oxides reactions with hydrogen (methanization). (O.M.). 8 figs., 6 tabs.

  11. Synthetic biology in plastids.

    Science.gov (United States)

    Scharff, Lars B; Bock, Ralph

    2014-06-01

    Plastids (chloroplasts) harbor a small gene-dense genome that is amenable to genetic manipulation by transformation. During 1 billion years of evolution from the cyanobacterial endosymbiont to present-day chloroplasts, the plastid genome has undergone a dramatic size reduction, mainly as a result of gene losses and the large-scale transfer of genes to the nuclear genome. Thus the plastid genome can be regarded as a naturally evolved miniature genome, the gradual size reduction and compaction of which has provided a blueprint for the design of minimum genomes. Furthermore, because of the largely prokaryotic genome structure and gene expression machinery, the high transgene expression levels attainable in transgenic chloroplasts and the very low production costs in plant systems, the chloroplast lends itself to synthetic biology applications that are directed towards the efficient synthesis of green chemicals, biopharmaceuticals and other metabolites of commercial interest. This review describes recent progress with the engineering of plastid genomes with large constructs of foreign or synthetic DNA, and highlights the potential of the chloroplast as a model system in bottom-up and top-down synthetic biology approaches.

  12. A review of semi-synthetic biopolymer complexes: modified polysaccharide nano-carriers for enhancement of oral drug bioavailability.

    Science.gov (United States)

    Sithole, Mduduzi N; Choonara, Yahya E; du Toit, Lisa C; Kumar, Pradeep; Pillay, Viness

    2017-03-01

    Semi-synthetic biopolymer complexes (SSBCs) have potential as nano-carriers for oral drug delivery due to their exceptional properties obtained by merging the properties of synthetic (e.g. good thermal and mechanical properties) with natural polymers (e.g. biocompatibility); thus, forming a new class of biopolymer materials incorporating the best of both worlds. Despite development in drug delivery systems, oral administration of therapeutic agent is still preferred. Several nano-polymeric systems has been prepared and characterized based on both synthetic polymers and natural polymers, each with its limitations and advantages. Among natural polymers, alginate, chitosan, and hyaluronic acid (HA) have been studied broadly for the fabrication of nanoparticles systems. This review discusses a newly investigated class of polymer called SSBCs as oral drug nano-carriers. It also discusses certain significant structural and functional attributes or effects which are essential to be taken into consideration when an oral drug delivery system is developed. The review is aimed at describing complexation of few natural polymers (e.g. polysaccharides) with selected synthetic polymers or synthetic chemicals to indicate some of the factors that influence preparation, solubility, formation, and stability of these SSBCs.

  13. Polymer inflation

    CERN Document Server

    Hassan, Syed Moeez; Seahra, Sanjeev S

    2014-01-01

    We consider the semi-classical dynamics of a free massive scalar field in a homogeneous and isotropic cosmological spacetime. The scalar field is quantized using the polymer quantization method assuming that it is described by a gaussian coherent state. For quadratic potentials, the semi-classical equations of motion yield a universe that has an early "polymer inflation" phase which is generic and almost exactly de Sitter, followed by a epoch of slow-roll inflation. We compute polymer corrections to the slow roll formalism, and discuss the probability of inflation in this model using a physical Hamiltonian arising from time gauge fixing. These results show the extent to which a quantum gravity motivated quantization method affects early universe dynamics.

  14. Antimocrobial Polymer

    Energy Technology Data Exchange (ETDEWEB)

    McDonald, William F. (Utica, OH); Huang, Zhi-Heng (Walnut Creek, CA); Wright, Stacy C. (Columbus, GA)

    2005-09-06

    A polymeric composition having antimicrobial properties and a process for rendering the surface of a substrate antimicrobial are disclosed. The composition comprises a crosslinked chemical combination of (i) a polymer having amino group-containing side chains along a backbone forming the polymer, (ii) an antimicrobial agent selected from quaternary ammonium compounds, gentian violet compounds, substituted or unsubstituted phenols, biguanide compounds, iodine compounds, and mixtures thereof, and (iii) a crosslinking agent containing functional groups capable of reacting with the amino groups. In one embodiment, the polymer is a polyamide formed from a maleic anhydride or maleic acid ester monomer and alkylamines thereby producing a polyamide having amino substituted alkyl chains on one side of the polyamide backbone; the crosslinking agent is a phosphine having the general formula (A)3P wherein A is hydroxyalkyl; and the antimicrobial agent is chlorhexidine, dimethylchlorophenol, cetyl pyridinium chloride, gentian violet, triclosan, thymol, iodine, and mixtures thereof.

  15. Modelling social-technical attacks with timed automata

    NARCIS (Netherlands)

    David, Nicolas; David, Alexandre; Hansen, René Rydhof; Larsen, Kim G.; Legay, Axel; Olesen, Mads Chr.; Probst, Christian W.

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In th

  16. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  17. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  18. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  19. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  20. Synthetic lubricants and high-performance functional fluids

    CERN Document Server

    Rudnick, Leslie R

    1999-01-01

    Offers state-of-the-art information on all the major synthetic fluids, describing established products as well as highly promising experimental fluids with commercial potential. This second edition contains chapters on polyinternalolefins, polymer esters, refrigeration lubes, polyphenyl ethers, highly refined mineral oils, automotive gear oils and industrial gear oils. The book also assesses automotive, industrial, aerospace, environmental, and commercial trends in Europe, Asia, South America, and the US.

  1. Polymer electronics

    CERN Document Server

    Geoghegan, Mark

    2013-01-01

    Polymer electronics is the science behind many important new developments in technology, such as the flexible electronic display (e-ink) and many new developments in transistor technology. Solar cells, light-emitting diodes, and transistors are all areas where plastic electronics is likely to, or is already having, a serious impact on our daily lives. With polymer transistors and light-emitting diodes now being commercialised, there is a clear need for a pedagogic text thatdiscusses the subject in a clear and concise fashion suitable for senior undergraduate and graduate students. The content

  2. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  3. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes...... on a new and general formalism for attack-defence trees....

  4. Nanostructured conductive polymers for advanced energy storage.

    Science.gov (United States)

    Shi, Ye; Peng, Lele; Ding, Yu; Zhao, Yu; Yu, Guihua

    2015-10-07

    Conductive polymers combine the attractive properties associated with conventional polymers and unique electronic properties of metals or semiconductors. Recently, nanostructured conductive polymers have aroused considerable research interest owing to their unique properties over their bulk counterparts, such as large surface areas and shortened pathways for charge/mass transport, which make them promising candidates for broad applications in energy conversion and storage, sensors, actuators, and biomedical devices. Numerous synthetic strategies have been developed to obtain various conductive polymer nanostructures, and high-performance devices based on these nanostructured conductive polymers have been realized. This Tutorial review describes the synthesis and characteristics of different conductive polymer nanostructures; presents the representative applications of nanostructured conductive polymers as active electrode materials for electrochemical capacitors and lithium-ion batteries and new perspectives of functional materials for next-generation high-energy batteries, meanwhile discusses the general design rules, advantages, and limitations of nanostructured conductive polymers in the energy storage field; and provides new insights into future directions.

  5. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  6. Opportunities in plant synthetic biology.

    Science.gov (United States)

    Cook, Charis; Martin, Lisa; Bastow, Ruth

    2014-05-01

    Synthetic biology is an emerging field uniting scientists from all disciplines with the aim of designing or re-designing biological processes. Initially, synthetic biology breakthroughs came from microbiology, chemistry, physics, computer science, materials science, mathematics, and engineering disciplines. A transition to multicellular systems is the next logical step for synthetic biologists and plants will provide an ideal platform for this new phase of research. This meeting report highlights some of the exciting plant synthetic biology projects, and tools and resources, presented and discussed at the 2013 GARNet workshop on plant synthetic biology.

  7. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  8. Rational design and synthesis of semi-conducting polymers.

    Energy Technology Data Exchange (ETDEWEB)

    Wong, Bryan Matthew; Reeder, Craig; Cordaro, Joseph Gabriel

    2010-12-01

    A rational approach was used to design polymeric materials for thin-film electronics applications, whereby theoretical modeling was used to determine synthetic targets. Time-dependent density functional theory calculations were used as a tool to predict the electrical properties of conjugated polymer systems. From these results, polymers with desirable energy levels and band-gaps were designed and synthesized. Measurements of optoelectronic properties were performed on the synthesized polymers and the results were compared to those of the theoretical model. From this work, the efficacy of the model was evaluated and new target polymers were identified.

  9. Distributed Denial of Service Attacks: A Review

    Directory of Open Access Journals (Sweden)

    Sonali Swetapadma Sahu

    2014-01-01

    Full Text Available A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

  10. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  11. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  12. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  13. Resistance of the double random phase encryption against various attacks.

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-06

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  14. Antimicrobial polymers.

    Science.gov (United States)

    Jain, Anjali; Duvvuri, L Sailaja; Farah, Shady; Beyth, Nurit; Domb, Abraham J; Khan, Wahid

    2014-12-01

    Better health is basic requirement of human being, but the rapid growth of harmful pathogens and their serious health effects pose a significant challenge to modern science. Infections by pathogenic microorganisms are of great concern in many fields such as medical devices, drugs, hospital surfaces/furniture, dental restoration, surgery equipment, health care products, and hygienic applications (e.g., water purification systems, textiles, food packaging and storage, major or domestic appliances etc.) Antimicrobial polymers are the materials having the capability to kill/inhibit the growth of microbes on their surface or surrounding environment. Recently, they gained considerable interest for both academic research and industry and were found to be better than their small molecular counterparts in terms of enhanced efficacy, reduced toxicity, minimized environmental problems, resistance, and prolonged lifetime. Hence, efforts have focused on the development of antimicrobial polymers with all desired characters for optimum activity. In this Review, an overview of different antimicrobial polymers, their mechanism of action, factors affecting antimicrobial activity, and application in various fields are given. Recent advances and the current clinical status of these polymers are also discussed.

  15. Polymer physics

    CERN Document Server

    Gedde, Ulf W

    1999-01-01

    This book is the result of my teaching efforts during the last ten years at the Royal Institute of Technology. The purpose is to present the subject of polymer physics for undergraduate and graduate students, to focus the fundamental aspects of the subject and to show the link between experiments and theory. The intention is not to present a compilation of the currently available literature on the subject. Very few reference citations have thus been made. Each chapter has essentially the same structure: starling with an introduction, continuing with the actual subject, summarizing the chapter in 30D-500 words, and finally presenting problems and a list of relevant references for the reader. The solutions to the problems presented in Chapters 1-12 are given in Chapter 13. The theme of the book is essentially polymer science, with the exclusion of that part dealing directly with chemical reactions. The fundamentals in polymer science, including some basic polymer chemistry, are presented as an introduction in t...

  16. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  17. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  18. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  19. CASH vs. SYNTHETIC CDOs

    Directory of Open Access Journals (Sweden)

    Silviu Eduard Dinca

    2015-12-01

    Full Text Available During the past few years, in the recent post-crisis aftermath, global asset managers are constantly searching new ways to optimize their investment portfolios while financial and banking institutions around the world are exploring new alternatives to better secure their financing and refinancing demands altogether with the enhancement of their risk management capabilities. We will exhibit herewith a comparison between the true-sale and synthetic CDO securitizations as financial markets-based funding, investment and risks mitigation techniques, highlighting certain key structuring and implementation specifics on each of them.

  20. Synthetic polyester-hydrolyzing enzymes from thermophilic actinomycetes.

    Science.gov (United States)

    Wei, Ren; Oeser, Thorsten; Zimmermann, Wolfgang

    2014-01-01

    Thermophilic actinomycetes produce enzymes capable of hydrolyzing synthetic polyesters such as polyethylene terephthalate (PET). In addition to carboxylesterases, which have hydrolytic activity predominantly against PET oligomers, esterases related to cutinases also hydrolyze synthetic polymers. The production of these enzymes by actinomycetes as well as their recombinant expression in heterologous hosts is described and their catalytic activity against polyester substrates is compared. Assays to analyze the enzymatic hydrolysis of synthetic polyesters are evaluated, and a kinetic model describing the enzymatic heterogeneous hydrolysis process is discussed. Structure-function and structure-stability relationships of actinomycete polyester hydrolases are compared based on molecular dynamics simulations and recently solved protein structures. In addition, recent progress in enhancing their activity and thermal stability by random or site-directed mutagenesis is presented.

  1. Synthetic collective intelligence.

    Science.gov (United States)

    Solé, Ricard; Amor, Daniel R; Duran-Nebreda, Salva; Conde-Pueyo, Núria; Carbonell-Ballestero, Max; Montañez, Raúl

    2016-10-01

    Intelligent systems have emerged in our biosphere in different contexts and achieving different levels of complexity. The requirement of communication in a social context has been in all cases a determinant. The human brain, probably co-evolving with language, is an exceedingly successful example. Similarly, social insects complex collective decisions emerge from information exchanges between many agents. The difference is that such processing is obtained out of a limited individual cognitive power. Computational models and embodied versions using non-living systems, particularly involving robot swarms, have been used to explore the potentiality of collective intelligence. Here we suggest a novel approach to the problem grounded in the genetic engineering of unicellular systems, which can be modified in order to interact, store memories or adapt to external stimuli in collective ways. What we label as Synthetic Swarm Intelligence defines a parallel approach to the evolution of computation and swarm intelligence and allows to explore potential embodied scenarios for decision making at the microscale. Here, we consider several relevant examples of collective intelligence and their synthetic organism counterparts.

  2. Freedom and Responsibility in Synthetic Genomics: The Synthetic Yeast Project

    OpenAIRE

    Sliva, Anna; Yang, Huanming; Boeke, Jef D.; Debra J. H. Mathews

    2015-01-01

    First introduced in 2011, the Synthetic Yeast Genome (Sc2.0) Project is a large international synthetic genomics project that will culminate in the first eukaryotic cell (Saccharomyces cerevisiae) with a fully synthetic genome. With collaborators from across the globe and from a range of institutions spanning from do-it-yourself biology (DIYbio) to commercial enterprises, it is important that all scientists working on this project are cognizant of the ethical and policy issues associated with...

  3. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  4. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  5. Plant defences against herbivore and insect attack

    Science.gov (United States)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  6. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  7. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  8. The diagnosis of transient ischemic attacks

    NARCIS (Netherlands)

    P.J. Koudstaal (Peter Jan)

    1989-01-01

    textabstractThe diagnosis of transient ischemic attack (TIA) is fraught with difficulty, since the diagnosis rests entirely upon the history of the patient's symptoms and the neurologist's skill in questioning the patient. The aim of this thesis is to investigate various measures to improve the reli

  9. Persistent cognitive impairment after transient ischemic attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.; Duijnhoven, D.A. van; Leeuw, F.E. de; Kessels, R.P.; Dijk, E.J. van

    2014-01-01

    BACKGROUND AND PURPOSE: By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whe

  10. Persistent Cognitive Impairment After Transient Ischemic Attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.M.M.; Duijnhoven, D.A. van; de Leeuw, F.E.; Kessels, R.P.C.; Dijk, E.J. van

    2014-01-01

    Background and Purpose—By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whet

  11. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  12. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  13. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  14. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  15. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  16. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  17. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  18. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  19. Fiber-reinforced polymer concrete: Property improvement by gamma irradiation

    Energy Technology Data Exchange (ETDEWEB)

    Martinez B, G. [Laboratorio de Investigacion y Desarrollo de Materiales Avanzados, Facultad de Quimica, Universidad Autonoma del Estado de Mexico, Km. 12 Carretera Toluca-Atlacomulco, San Cayetano 50200, Estado de Mexico (Mexico); Brostow, W. [Laboratory of Advanced Polymers and Optimized Materials, Department of Materials Science and Engineering, University of North Texas, Denton TX 76203-5310 (United States)], e-mail: gonzomartinez02@yahoo.com.mx

    2009-07-01

    Polymer concrete (PC) is a particulate composite in which a thermoset resin forms a polymeric matrix and binds inorganic aggregates (dispersed particles of strengthening phases). This in contrast to Portland cement concrete (PCC) in which the binding is a result of interaction of cement with water. Adding polymeric materials to the concrete one can obtain high compressive and flexural strength, high impact and abrasion resistance, lower weight and lower costs. Moreover, PC is a very good repair material for structure elements damaged by trapping water inside the structure and by acid attacks which take place in the PCC. In the present chapter we discuss uses of polymer concrete and the importance of using gamma radiation as a novel technology for manufacturing fiber-reinforced polymer concrete. Our technology is different from the costly and time consuming current procedures such as chemical attack or thermal treatment. (Author)

  20. Synthetic biology and genetic causation.

    Science.gov (United States)

    Oftedal, Gry; Parkkinen, Veli-Pekka

    2013-06-01

    Synthetic biology research is often described in terms of programming cells through the introduction of synthetic genes. Genetic material is seemingly attributed with a high level of causal responsibility. We discuss genetic causation in synthetic biology and distinguish three gene concepts differing in their assumptions of genetic control. We argue that synthetic biology generally employs a difference-making approach to establishing genetic causes, and that this approach does not commit to a specific notion of genetic program or genetic control. Still, we suggest that a strong program concept of genetic material can be used as a successful heuristic in certain areas of synthetic biology. Its application requires control of causal context, and may stand in need of a modular decomposition of the target system. We relate different modularity concepts to the discussion of genetic causation and point to possible advantages of and important limitations to seeking modularity in synthetic biology systems.

  1. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  2. Hybrid Nanomaterials by Surface Grafting of Synthetic Polypeptides Using N-Carboxyanhydride (NCA) Polymerization.

    Science.gov (United States)

    Borase, Tushar; Heise, Andreas

    2016-07-01

    The interaction of materials with their environment is largely dictated by interfacial phenomena. Polymers are very versatile materials to modulate material interfaces to provide functionality, stability and compatibility. A class of polymers that can close the gap between fully synthetic and natural macromolecules are polypeptides derived from N-carboxyanhydride (NCA) polymerization. Recent advances in using this technique to create biomimetic interfaces and hybrid materials are highlighted, with special emphasis on nanomaterials.

  3. Molecularly imprinted polymers: synthesis and characterisation.

    Science.gov (United States)

    Cormack, Peter A G; Elorza, Amaia Zurutuza

    2004-05-01

    This short review aims to present, in clear English, a summary of the principal synthetic considerations pertaining to good practice in the polymerisation aspects of molecular imprinting, and is primarily aimed at researchers familiar with molecular imprinting methods but with little or no prior experience in polymer synthesis. It is our hope that this will facilitate researchers to plan their own syntheses of molecular imprints in a more logical and structured fashion, and to begin to appreciate the limitations of the present synthetic approaches in this molecularly complex area, as well as the scope for rationally designing improved imprinted materials in the future.

  4. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  5. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  6. Compartmentalization and Transport in Synthetic Vesicles

    Directory of Open Access Journals (Sweden)

    Christine eSchmitt

    2016-02-01

    Full Text Available Nano-scale vesicles have become a popular tool in life sciences. Besides liposomes that are generated from phospholipids of natural origin, polymersomes fabricated of synthetic block copolymers enjoy increasing popularity, as they represent more versatile membrane building blocks that can be selected based on their specific physicochemical properties, like permeability, stability or chemical reactivity.In this review, we focus on the application of simple and nested artificial vesicles in synthetic biology. First, we provide an introduction into the utilization of multi-compartmented vesosomes as compartmentalized nano-scale bioreactors. In the bottom-up development of protocells from vesicular nano-reactors, the specific exchange of pathway intermediates across compartment boundaries represents a bottleneck for future studies. To date, most compartmented bioreactors rely on unspecific exchange of substrates and products. This is either based on changes in permeability of the coblock polymer shell by physicochemical triggers or by the incorporation of unspecific porin proteins into the vesicle membrane. Since the incorporation of membrane transport proteins into simple and nested artificial vesicles offers the potential for specific exchange of substances between subcompartments, it opens new vistas in the design of protocells. Therefore we devote the main part of the review to summarize the technical advances in the use of phospholipids and block copolymers for the reconstitution of membrane proteins.

  7. Synthetic Aperture Ultrasound Imaging

    DEFF Research Database (Denmark)

    Jensen, Jørgen Arendt; Nikolov, Svetoslav; Gammelmark, Kim Løkke

    2006-01-01

    The paper describes the use of synthetic aperture (SA) imaging in medical ultrasound. SA imaging is a radical break with today's commercial systems, where the image is acquired sequentially one image line at a time. This puts a strict limit on the frame rate and the possibility of acquiring...... of SA imaging. Due to the complete data set, it is possible to have both dynamic transmit and receive focusing to improve contrast and resolution. It is also possible to improve penetration depth by employing codes during ultrasound transmission. Data sets for vector flow imaging can be acquired using...... short imaging sequences, whereby both the correct velocity magnitude and angle can be estimated. A number of examples of both phantom and in-vivo SA images will be presented measured by the experimental ultrasound scanner RASMUS to demonstrate the many benefits of SA imaging....

  8. Variation and Synthetic Speech

    CERN Document Server

    Miller, C; Massey, N; Miller, Corey; Karaali, Orhan; Massey, Noel

    1997-01-01

    We describe the approach to linguistic variation taken by the Motorola speech synthesizer. A pan-dialectal pronunciation dictionary is described, which serves as the training data for a neural network based letter-to-sound converter. Subsequent to dictionary retrieval or letter-to-sound generation, pronunciations are submitted a neural network based postlexical module. The postlexical module has been trained on aligned dictionary pronunciations and hand-labeled narrow phonetic transcriptions. This architecture permits the learning of individual postlexical variation, and can be retrained for each speaker whose voice is being modeled for synthesis. Learning variation in this way can result in greater naturalness for the synthetic speech that is produced by the system.

  9. Synthetic Aperture Compound Imaging

    DEFF Research Database (Denmark)

    Hansen, Jens Munk

    Medical ultrasound imaging is used for many purposes, e.g. for localizing and classifying cysts, lesions, and other processes. Almost any mass is first observed using B-mode imaging and later classified using e.g. color flow, strain, or attenuation imaging. It is therefore important that the B....... The method is investigated using simulations and through measurements using both phased array and convex array transducers. The images all show an improved contrast compared to images without compounding, and by construction, imaging using an improved frame rate is possible. Using a phased array transducer...... and the limiting factor is the amount of memory IO resources available. An equally high demand for memory throughput is found in the computer gaming industry, where a large part of the processing takes place on the graphics processing unit (GPU). Using the GPU, a framework for synthetic aperture imaging...

  10. Nylon-3 polymers with selective antifungal activity.

    Science.gov (United States)

    Liu, Runhui; Chen, Xinyu; Hayouka, Zvi; Chakraborty, Saswata; Falk, Shaun P; Weisblum, Bernard; Masters, Kristyn S; Gellman, Samuel H

    2013-04-10

    Host-defense peptides inhibit bacterial growth but show little toxicity toward mammalian cells. A variety of synthetic polymers have been reported to mimic this antibacterial selectivity; however, achieving comparable selectivity for fungi is more difficult because these pathogens are eukaryotes. Here we report nylon-3 polymers based on a novel subunit that display potent antifungal activity (MIC = 3.1 μg/mL for Candida albicans ) and favorable selectivity (IC10 > 400 μg/mL for 3T3 fibroblast toxicity; HC10 > 400 μg/mL for hemolysis).

  11. Tissue Harmonic Synthetic Aperture Imaging

    DEFF Research Database (Denmark)

    Rasmussen, Joachim

    The main purpose of this PhD project is to develop an ultrasonic method for tissue harmonic synthetic aperture imaging. The motivation is to advance the field of synthetic aperture imaging in ultrasound, which has shown great potentials in the clinic. Suggestions for synthetic aperture tissue...... system complexity compared to conventional synthetic aperture techniques. In this project, SASB is sought combined with a pulse inversion technique for 2nd harmonic tissue harmonic imaging. The advantages in tissue harmonic imaging (THI) are expected to further improve the image quality of SASB...

  12. Life after the synthetic cell

    DEFF Research Database (Denmark)

    Rasmussen, Steen

    2010-01-01

    Nature asked eight synthetic-biology experts about the implications for science and society of the “synthetic cell” made by the J. Craig Venter Institute (JCVI). The institute's team assembled, modified and implanted a synthesized genome into a DNA-free bacterial shell to make a self-replicating ......Nature asked eight synthetic-biology experts about the implications for science and society of the “synthetic cell” made by the J. Craig Venter Institute (JCVI). The institute's team assembled, modified and implanted a synthesized genome into a DNA-free bacterial shell to make a self...

  13. Recent advances in glycerol polymers: chemistry and biomedical applications.

    Science.gov (United States)

    Zhang, Heng; Grinstaff, Mark W

    2014-11-01

    Glycerol polymers are attracting increased attention due to the diversity of polymer compositions and architectures available. This article provides a brief chronological review on the current status of these polymers along with representative examples of their use for biomedical applications. First, the underlying chemistry of glycerol that provides access to a range of monomers for subsequent polymerizations is described. Then, the various synthetic methodologies to prepare glycerol-based polymers including polyethers, polycarbonates, polyesters, and so forth are reviewed. Next, several biomedical applications where glycerol polymers are being investigated including carriers for drug delivery, sealants or coatings for tissue repair, and agents possessing antibacterial activity are described. Fourth, the growing market opportunity for the use of polymers in medicine is described. Finally, the findings are concluded and summarized, as well as the potential opportunities for continued research efforts are discussed.

  14. Polymer-induced phase separation in suspensions of bacteria

    Science.gov (United States)

    Schwarz-Linek, J.; Dorken, G.; Winkler, A.; Wilson, L. G.; Pham, N. T.; French, C. E.; Schilling, T.; Poon, W. C. K.

    2010-03-01

    We study phase separation in suspensions of two unrelated species of rod-like bacteria, Escherichia coli and Sinorhizobium meliloti, induced by the addition of two different anionic polyelectrolytes, sodium polystyrene sulfonate or succinoglycan, the former being synthetic and the latter of natural origin. Comparison with the known behaviour of synthetic colloid-polymer mixtures and with simulations show that "depletion" (or, equivalently, "macromolecular crowding") is the dominant mechanism: exclusion of the non-adsorbing polymer from the region between two neighbouring bacteria creates an unbalanced osmotic force pushing them together. The implications of our results for understanding phenomena such as biofilm formation are discussed.

  15. Polymer/Solvent and Polymer/Polymer Interaction Studies

    Science.gov (United States)

    1980-09-01

    DCM and ATS are completely miscible. The sorption data described 1 2Jones, E. G., Pedrick , D. L., and Benadum, P. A., Polymer Characteri- zation Using...Encyclopedia of Polymer Science and Technology, Vol. 11, Wiley-Interscience, N.Y. (1969), p. 447. 12. Jones, E.G., Pedrick , D.L., and Benadum, P.A., Polymer

  16. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed.......Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...

  17. Flooding attack and defence in Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Hou Yafei; Zhong Yiping; Zhang Shiyong; Dai Zhoulin

    2006-01-01

    Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

  18. Comparative Analysis of Routing Attacks in Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Bipul Syam Purkayastha

    2012-03-01

    Full Text Available In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.

  19. An Attack Modeling Based on Colored Petri Net

    Institute of Scientific and Technical Information of China (English)

    ZHOU Shijie; QIN Zhiguang; ZHANG Feng; LIU Jinde

    2004-01-01

    A color petri net (CPN) based attack modeling approach is addressed.Compared with graph-based modeling,CPN based attack model is fiexible enough to model Intemet intrusions,because of their static and dynamic features.The processes and rules of building CPN based attack model from attack tree are also presented.In order to evaluate the risk of intrusion,some cost elements are added to CPN based attack modeling.This extended model is useful in intrusion detection and risk evaluation.Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions,such as intrusion response and intrusion defense.A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn't.

  20. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  1. New attacks on Wi-Fi Protected Setup

    Directory of Open Access Journals (Sweden)

    Hamed Mohtadi

    2015-09-01

    Full Text Available Wi-Fi Protected Setup (WPS is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weaknesses in the implementation of WPS and provides an improved evil twin attack. This attack shows that even by completely disabling the WPS on the routers, all vulnerabilities are not covered.

  2. Understanding how components of organisations contribute to attacks

    NARCIS (Netherlands)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is difficul

  3. Aspirin to Prevent a First Heart Attack or Stroke

    Science.gov (United States)

    ... Aspirin to Prevent a First Heart Attack or Stroke Also known as aspirin primary prevention. Aspirin is ... taking aspirin to prevent another heart attack or stroke? The information discussed in Who may benefit? only ...

  4. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......, one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  5. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  6. Making MANET secured against malicious attack

    Science.gov (United States)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  7. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  8. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  9. Quantifying Shannon's Work Function for Cryptanalytic Attacks

    CERN Document Server

    van Son, R J J H

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on computability logic to quantify Shannon's work function and evaluate resource use in cryptanalysis. A simple cost function is defined which allows to quantify a wide range of theoretical and real computational resources. With this approach the use of custom hardware, e.g., FPGA boards, in cryptanalysis can be analyzed. Applied to real cryptanalytic problems, it raises, for instance, the expectation that the computer time needed to break some simple 90 bit strong cryptographic primitives might theoretically be less than two years.

  10. Synthesis of Conjugated Polymers for Light Emitting and Photovoltalc Applications

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    1 Results The initial report of polymeric light-emitting diodes (PLEDs) based on poly(p-phenylenevinylene) gave birth to an intense research effort in conjugated polymers, primarily focused on the development of optoelectronic and electrochemical devices. Significant developments in modern synthetic chemistry, especially the chemistry of carbon-carbon bond formation have allowed the synthesis of various well-defined conjugated polymers and oligomers with optimized physical properties.Meanwhile, these re...

  11. Imaging with Synthetic Aperture Radar

    CERN Document Server

    Massonnet, Didier

    2008-01-01

    Describing a field that has been transformed by the recent availability of data from a new generation of space and airborne systems, the authors offer a synthetic geometrical approach to the description of synthetic aperture radar, one that addresses physicists, radar specialists, as well as experts in image processing.  

  12. Engineering Ecosystems and Synthetic Ecologies#

    OpenAIRE

    Mee, Michael T.; Wang, Harris H.

    2012-01-01

    Microbial ecosystems play an important role in nature. Engineering these systems for industrial, medical, or biotechnological purposes are important pursuits for synthetic biologists and biological engineers moving forward. Here, we provide a review of recent progress in engineering natural and synthetic microbial ecosystems. We highlight important forward engineering design principles, theoretical and quantitative models, new experimental and manipulation tools, and possible applications of ...

  13. Holographically Correcting Synthetic Aperture Aberrations.

    Science.gov (United States)

    1987-12-01

    Malacara (20:105-148). The synthetic aperture was aligned in accordance with the synthetic-aperture alignment technique of Gill (8:61-64). The...1987. 20. Malacara , Daniel, ed. Optical Shop Testing. New York: John Wiley & Sons, 1978. 21. Marciniak, Capt Michael. Tutorial Presentation of mV

  14. Synthetic biology and metabolic engineering.

    Science.gov (United States)

    Stephanopoulos, Gregory

    2012-11-16

    Metabolic engineering emerged 20 years ago as the discipline occupied with the directed modification of metabolic pathways for the microbial synthesis of various products. As such, it deals with the engineering (design, construction, and optimization) of native as well as non-natural routes of product synthesis, aided in this task by the availability of synthetic DNA, the core enabling technology of synthetic biology. The two fields, however, only partially overlap in their interest in pathway engineering. While fabrication of biobricks, synthetic cells, genetic circuits, and nonlinear cell dynamics, along with pathway engineering, have occupied researchers in the field of synthetic biology, the sum total of these areas does not constitute a coherent definition of synthetic biology with a distinct intellectual foundation and well-defined areas of application. This paper reviews the origins of the two fields and advances two distinct paradigms for each of them: that of unit operations for metabolic engineering and electronic circuits for synthetic biology. In this context, metabolic engineering is about engineering cell factories for the biological manufacturing of chemical and pharmaceutical products, whereas the main focus of synthetic biology is fundamental biological research facilitated by the use of synthetic DNA and genetic circuits.

  15. The Ethics of Synthetic Biology

    DEFF Research Database (Denmark)

    Christiansen, Andreas

    The dissertation analyses and discusses a number of ethical issues that have been raised in connection with the development of synthetic biology. Synthetic biology is a set of new techniques for DNA-level design and construction of living beings with useful properties. The dissertation especially...

  16. Synthetic peptides for antibody production

    NARCIS (Netherlands)

    Zegers, N.D.

    1995-01-01

    Synthetic peptides are useful tools for the generation of antibodies. The use of antibodies as specific reagents in inununochemical assays is widely applied. In this chapter, the application of synthetic peptides for the generation of antibodies is described. The different steps that lead to the uni

  17. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  18. Afghanistan: Green-on-Blue Attacks

    Science.gov (United States)

    2013-05-02

    Afghanistan, December 2012, p 35 15 Yousafzai, Sami and Moreau , Ron, http://www.thedailybeast.com/newsweek/2012/08/26/ afghanistan-green-on-blue-killings...spike-insider-attacks- stress-ramadan-fasting, 24 August 2012 37 Yousafzai, Sami and Moreau , Ron, http://www.thedailybeast.com/newsweek/2012/08/26...afghanistan-green-on-blue-killings- explained.html, Afghanistan: ‘Green on Blue’ Killings Explained, 27 August 2012 38 Yousafzai, Sami and Moreau , Ron

  19. Coal Slag Attack-A Review

    Institute of Scientific and Technical Information of China (English)

    GUO Zongqi

    2004-01-01

    Although slagging coal gasifiers have served the commercial systems of electricity and chemical fertilizer productions for more than ten years, refractory service life still is a critical factor for gasifier availability. Some investigations were attracted, focusing on coal slag attack on high chromia refractories. A general introduction is made in order to have further understanding about slag corrosion in coal gasification environment. Microstructural deterioration and wear process of high chromia refractory in slagging gasifiers are discussed.

  20. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...information (in many cases real-time) among many users at a very low cost . The number of networks the DoD uses to execute its mission has increased...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the

  1. Flow Control of the Stingray UAV at Low Angles of Attack

    Science.gov (United States)

    Farnsworth, John; Vaccaro, John; Amitay, Michael

    2007-11-01

    The effectiveness of active flow control, via synthetic jets and steady blowing jets, on the aerodynamic performance of the Stingray UAV was investigated experimentally in a wind tunnel. Global flow measurements were conducted using a six component sting balance, static pressure, and Particle Image Velocimetry (PIV) measurements. Using active control for trimming the Stingray UAV in pitch and roll at low angles of attack has similar effects to those with conventional control effectors. The synthetic jets were able to alter the local streamlines through the formation of a quasi-steady interaction region on the suction surface of the vehicle's wing. Phase locked data were acquired to provide insight into the growth, propagation, and decay of the synthetic jet impulse and its interaction with the cross-flow. The changes induced on the moments and forces can be proportionally controlled by either changing the momentum coefficient or by driving the synthetic jets with a pulse modulation waveform. This can lead the way for future development of closed-loop control models.

  2. Defending Against LDoS Attacks Using Fair AQM

    Directory of Open Access Journals (Sweden)

    Bianqin Wang

    2011-12-01

    Full Text Available According to the instant high rate and high intensity of LDoS attacks, this paper explores using fair queue management mechanism to mitigate their effect. We perform simulation experiments to evaluate the performance of fair AQM FRED and CHOKe under LDoS attacks. The simulation results show that they are able to reduce the impact of the attacks in various degrees. FRED outperforms CHOKe in throttling the attacks, but it is slightly inferior to CHOKe in time performance.

  3. Optimal Attack Strategy in Random Scale-Free Networks Based on Incomplete Information

    Institute of Scientific and Technical Information of China (English)

    LI Jun; WU Jun; LI Yong; DENG Hong-Zhong; TAN Yue-Jin

    2011-01-01

    @@ We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes.We investigate the optimal attack strategy in random scale-free networks both analytically and numerically.We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies.It is found that when the attack intensity is small, the attacker should attack more nodes in the "white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the "black area" in which we can not obtain attack information.Moreover, we show that there is an inflection point in the curve of optimal attack proportion.For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.%We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes. We investigate the optimal attack strategy in random scale-free networks both analytically and numerically. We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies. It is found that when the attack intensity is small, the attacker should attack more nodes in the "white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the "black area" in which we can not obtain attack information. Moreover, we show that there is an inflection point in the curve of optimal attack proportion. For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.

  4. Recent advances in synthetic biosafety

    Science.gov (United States)

    Simon, Anna J.; Ellington, Andrew D.

    2016-01-01

    Synthetically engineered organisms hold promise for a broad range of medical, environmental, and industrial applications. Organisms can potentially be designed, for example, for the inexpensive and environmentally benign synthesis of pharmaceuticals and industrial chemicals, for the cleanup of environmental pollutants, and potentially even for biomedical applications such as the targeting of specific diseases or tissues. However, the use of synthetically engineered organisms comes with several reasonable safety concerns, one of which is that the organisms or their genes could escape their intended habitats and cause environmental disruption. Here we review key recent developments in this emerging field of synthetic biocontainment and discuss further developments that might be necessary for the widespread use of synthetic organisms. Specifically, we discuss the history and modern development of three strategies for the containment of synthetic microbes: addiction to an exogenously supplied ligand; self-killing outside of a designated environment; and self-destroying encoded DNA circuitry outside of a designated environment. PMID:27635235

  5. Nanotribology of charged polymer brushes

    Science.gov (United States)

    Klein, Jacob

    Polymers at surfaces, whose modern understanding may be traced back to early work by Sam Edwards1, have become a paradigm for modification of surface properties, both as steric stabilizers and as remarkable boundary lubricants2. Charged polymer brushes are of particular interest, with both technological implications and especially biological relevance where most macromolecules are charged. In the context of biolubrication, relevant in areas from dry eye syndrome to osteoarthritis, charged polymer surface phases and their complexes with other macromolecules may play a central role. The hydration lubrication paradigm, where tenaciously-held yet fluid hydration shells surrounding ions or zwitterions serve as highly-efficient friction-reducing elements, has been invoked to understand the excellent lubrication provided both by ionized3 and by zwitterionic4 brushes. In this talk we describe recent advances in our understanding of the nanotribology of such charged brush systems. We consider interactions between charged end-grafted polymers, and how one may disentangle the steric from the electrostatic surface forces5. We examine the limits of lubrication by ionized brushes, both synthetic and of biological origins, and how highly-hydrated zwitterionic chains may provide extremely effective boundary lubrication6. Finally we describe how the lubrication of articular cartilage in the major joints, a tribosystem presenting some of the greatest challenges and opportunities, may be understood in terms of a supramolecular synergy between charged surface-attached polymers and zwitterionic groups7. Work supported by European Research Council (HydrationLube), Israel Science Foundation (ISF), Petroleum Research Fund of the American Chemical Society, ISF-NSF China Joint Program.

  6. Research and Implementation of Three HTTPS Attacks

    Directory of Open Access Journals (Sweden)

    Kefei Cheng

    2011-05-01

    Full Text Available With the rapid development of network applications, the issues of Network transmission security become very important. Therefore, SSL protocol is more and more widely used in a variety of network services. But the SSL protocol itself is not perfect, in practice, there are also problems. For the deficiencies of endpoint authentication in the SSL handshake process, the paper analyzes two kinds of defects existing in the SSL hand-shake process. Firstly, handshake process, in the first stage of the SSL connection, using plaintexts, existing the possibility of  being monitored and tampered. Secondly, SSL deployment of the actual application. Because of considering the factors about the performance of the network connection, that usually uses the way of switch connection based on HTTP protocol. In response to these deficiencies, this thesis adopts the two ways of forged certificates and converting the data stream from HTTPS to HTTP to attack them. In addition, a new attack mode against the data stream of HTTPS is designed and implemented. Experiments show that the above three methods cause significant security risks to HTTPS communications. Therefore, taking a static ARP table, enhanced certificate mechanism and mutual authentication of three different measures are proposed to enhance network security in the paper. It is shown that three ways can relative effectively defense against attacks on HTTPS in the experiments.

  7. Computational Insights on Sulfonamide Imprinted Polymers

    OpenAIRE

    Chartchalerm Isarankura-Na-Ayudhya; Chanin Nantasenamat; Prasit Buraparuangsang; Theeraphon Piacham; Leif Bülow; Lei Ye; Virapong Prachayasittikul

    2008-01-01

    Molecular imprinting is one of the most efficient methods for preparing synthetic receptors that possess user defined recognition properties. Despite general success of non-covalent imprinting for a large variety of templates, some groups of compounds remain difficult to tackle due to their structural complexity. In this study we investigate preparation of molecularly imprinted polymers that can bind sulfonamide compounds, which represent important drug candidates. Compared to the biological ...

  8. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  9. Attacks Prevention and Detection Techniques In MANET: A Survey

    Directory of Open Access Journals (Sweden)

    Pranjali D. Nikam,

    2014-11-01

    Full Text Available Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node which is dynamically moves from one location to another location. Both attacks Active as well as Passive attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as compare to wired networks. In last few years many security and attacks issue are face many researchers in MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks and Packet modification attacks found in MANET. At the time of data communication all the above mentioned attacks access data easily without permission. To solve the problem of attacks in MANET and secure data communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid algorithm for secure intrusion detection in MANET.

  10. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Yee Wei; Hartel, Pieter; Hartog, den Jerry; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. W

  11. Ecotoxicology of synthetic pyrethroids.

    Science.gov (United States)

    Maund, S J; Campbell, P J; Giddings, J M; Hamer, M J; Henry, K; Pilling, E D; Warinton, J S; Wheeler, J R

    2012-01-01

    In this chapter we review the ecotoxicology of the synthetic pyrethroids (SPs). SPs are potent, broad-spectrum insecticides. Their effects on a wide range of nontarget species have been broadly studied, and there is an extensive database available to evaluate their effects. SPs are highly toxic to fish and aquatic invertebrates in the laboratory, but effects in the field are mitigated by rapid dissipation and degradation. Due to their highly lipophilic nature, SPs partition extensively into sediments. Recent studies have shown that toxicity in sediment can be predicted on the basis of equilibrium partitioning, and whilst other factors can influence this, organic carbon content is a key determining variable. At present for SPs, there is no clear evidence for adverse population-relevant effects with an underlying endocrine mode of action. SPs have been studied intensively in aquatic field studies, and their effects under field conditions are mitigated from those measured in the laboratory by their rapid dissipation and degradation. Studies with a range of test systems have shown consistent aquatic field endpoints across a variety of geographies and trophic states. SPs are also highly toxic to bees and other nontarget arthropods in the laboratory. These effects are mitigated in the field through repellency and dissipation of residues, and recovery from any adverse effects tends to be rapid.

  12. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  13. Drug delivery's quest for polymers: Where are the frontiers?

    Science.gov (United States)

    Merkle, Hans P

    2015-11-01

    Since the legendary 1964 article of Folkman and Long entitled "The use of silicone rubber as a carrier for prolonged drug therapy" the role of polymers in controlled drug delivery has come a long way. Today it is evident that polymers play a crucial if not the prime role in this field. The latest boost owes to the interest in drug delivery for the purpose of tissue engineering in regenerative medicine. The focus of this commentary is on a selection of general and personal observations that are characteristic for the current state of polymer therapeutics and carriers. It briefly highlights selected examples for the long march of synthetic polymer-drug conjugates from bench to bedside, comments on the ambivalence of selected polymers as inert excipients versus biological response modifiers, and on the yet unsolved dilemma of cationic polymers for the delivery of nucleic acid therapeutics. Further subjects are the complex design of multifunctional polymeric carriers including recent concepts towards functional supramolecular polymers, as well as observations on stimuli-sensitive polymers and the currently ongoing trend towards natural and naturally-derived biopolymers. The final topic is the discovery and early development of a novel type of biodegradable polyesters for parenteral use. Altogether, it is not the basic and applied research in polymer therapeutics and carriers, but the translational process that is the key hurdle to proceed towards an authoritative approval of new polymer therapeutics and carriers.

  14. Synthesis and Characterization of Long Perylenediimide Polymer Fibers: From Bulk to the Single-Molecule Level

    NARCIS (Netherlands)

    Witte, de Pieter A.J.; Hernando, Jordi; Neuteboom, Edda E.; Dijk, van Erik M.H.P.; Meskers, Stefan C.J.; Janssen, Rene A.J.; Hulst, van Niek F.; Nolte, Roeland J.M.; Garcia-Parajo, Maria F.; Rowan, Alan E.

    2006-01-01

    The synthesis and characterization of perylenediimide polyisocyanides is reported. In addition to short oligomers, our synthetic approach results in the formation of extremely long, well-defined, and rigid perylenediimide polymers. Ordering and close-packing of the chromophores in these long polymer

  15. THE SYNTHESIS OF URUSHIOL TITANIUM CHELATE POLYMERS AND THEIR STRUCTURAL CHARACTERISTICS

    Institute of Scientific and Technical Information of China (English)

    HU Binghuan; CHEN Wending; LIN Jinhuo

    1993-01-01

    The synthetic method and structural characteristics of urushiol-titanium chelates (UT) and urushiol-titanium chelate polymer for anticorrosive coatings have been studied.Two kinds of coating films made from UT polymer show excellent physico-mechanical properties and possess good chemical resistance to strong acids and alkalis, many kinds of salt solutions and organic solvents,stable at high temperature.

  16. Spicing thing up: Synthetic cannabinoids

    Science.gov (United States)

    Spaderna, Max; Addy, Peter H; D’Souza, Deepak Cyril

    2013-01-01

    Rationale Recently, products containing synthetic cannabinoids, collectively referred to as Spice, are increasingly being used recreationally. Objectives The availability, acute subjective effects—including self-reports posted on Erowid—laboratory detection, addictive potential, and regulatory challenges of the Spice phenomenon are reviewed. Results Spice is sold under the guise of potpourri or incense. Unlike THC, the synthetic cannabinoids present in Spice are high-potency, high-efficacy, cannabinoid-receptor full agonists. Since standard urine toxicology does not test for the synthetic cannabinoids in Spice, it is often used by those who want to avoid detection of drug use. These compounds have not yet been subjected to rigorous testing in humans. Acute psychoactive effects include changes in mood, anxiety, perception, thinking, memory, and attention. Adverse effects include anxiety, agitation, panic, dysphoria, psychosis, and bizarre behavior. Psychosis outcomes associated with Spice provide additional data linking cannabinoids and psychosis. Adverse events necessitating intervention by Poison Control Centers, law enforcement, emergency responders, and hospitals are increasing. Despite statutes prohibiting the manufacture, distribution, and sale of Spice products, manufacturers are replacing banned compounds with newer synthetic cannabinoids that are not banned. Conclusions There is an urgent need for better research on the effects of synthetic cannabinoids to help clinicians manage adverse events and to better understand cannabinoid pharmacology in humans. The reported psychosis outcomes associated with synthetic cannabinoids contribute to the ongoing debate on the association between cannabinoids and psychosis. Finally, drug-detection tests for synthetic cannabinoids need to become clinically available. PMID:23836028

  17. Synthetic biology and personalized medicine.

    Science.gov (United States)

    Jain, K K

    2013-01-01

    Synthetic biology, application of synthetic chemistry to biology, is a broad term that covers the engineering of biological systems with structures and functions not found in nature to process information, manipulate chemicals, produce energy, maintain cell environment and enhance human health. Synthetic biology devices contribute not only to improve our understanding of disease mechanisms, but also provide novel diagnostic tools. Methods based on synthetic biology enable the design of novel strategies for the treatment of cancer, immune diseases metabolic disorders and infectious diseases as well as the production of cheap drugs. The potential of synthetic genome, using an expanded genetic code that is designed for specific drug synthesis as well as delivery and activation of the drug in vivo by a pathological signal, was already pointed out during a lecture delivered at Kuwait University in 2005. Of two approaches to synthetic biology, top-down and bottom-up, the latter is more relevant to the development of personalized medicines as it provides more flexibility in constructing a partially synthetic cell from basic building blocks for a desired task.

  18. Gas Sensors Based on Electrodeposited Polymers

    Directory of Open Access Journals (Sweden)

    Boris Lakard

    2015-07-01

    Full Text Available Electrochemically deposited polymers, also called “synthetic metals”, have emerged as potential candidates for chemical sensing due to their interesting and tunable chemical, electrical, and structural properties. In particular, most of these polymers (including polypyrrole, polyaniline, polythiophene and their derivatives can be used as the sensitive layer of conductimetric gas sensors because of their conducting properties. An important advantage of polymer-based gas sensors is their efficiency at room temperature. This characteristic is interesting since most of the commercially-available sensors, usually based on metal oxides, work at high temperatures (300–400 °C. Consequently, polymer-based gas sensors are playing a growing role in the improvement of public health and environment control because they can lead to gas sensors operating with rapid detection, high sensitivity, small size, and specificity in atmospheric conditions. In this review, the recent advances in electrodeposited polymer-based gas sensors are summarized and discussed. It is shown that the sensing characteristics of electrodeposited polymers can be improved by chemical functionalization, nanostructuration, or mixing with other functional materials to form composites or hybrid materials.

  19. Synthetic biology: advancing biological frontiers by building synthetic systems

    OpenAIRE

    Chen, Yvonne Yu-Hsuan; Galloway, Kate E; Smolke, Christina D.

    2012-01-01

    Advances in synthetic biology are contributing to diverse research areas, from basic biology to biomanufacturing and disease therapy. We discuss the theoretical foundation, applications, and potential of this emerging field.

  20. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  1. Link-layer jamming attacks on S-MAC

    OpenAIRE

    Law, Yee Wei; Hartel, Pieter; Hartog, den, D.N.; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. In this paper, we investigate some jamming attacks on S-MAC, the level of effectiveness and efficiency the attacks can potentially achieve, and a countermeasure that can be implemented against one o...

  2. Black Hole and Greyhole Attack in Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Rupinder Kaur

    2014-10-01

    Full Text Available Security is an important need in wireless mesh networks to give safe and shared information between wireless non-static nodes. In wireless network nodes has ability to act correctly and route the packets. Wireless mesh networks unusual method of producing,keeping and sharing information ability of mobile objects to show spontaneous and cheap adjusting arrangement itself.There are different types of communication devices in technology by which performance is measured.There is a major issue which take part in network and provide security from various kinds of malicious attacks.There are various attacks such as black hole attack,wormhole attack,Greyhole attack, and evesdropping attack.Black hole and Greyhole attacks are network layer attacks that spoils the performance by falling the packets.The black hole and Grey hole are the problem of security that consider in wireless networks.Black hole and Greyhole attack is one type of way of interrupting attack and can cause large amount of damage to network.Black hole attack is act like ad-hoc network; which create network and attack on packets.In black hole attack where a false node not make correct paths in public to receiver node during the direction finding process. Theattacker achieves this attack when all the similar kinds of nodes communicate and make network to each other. It is very important to protectthe network layer from these attack which is also a great issues in wireless mesh network. Greyhole attack is very difficult to detect in wireless mesh network.In this paper,its an overview about black hole attack and grey hole in wireless mesh network and define problem statement about them. Secondly, its take study about related work in which many authors perform on these attacks and then its discuss about proposed method.Thirdly,the results are simulated carried out in OPNET simulator where black hole attack and grey hole attack shows the performance and Its analysis the throughput in network.

  3. AFM Imaging of RGD Presenting Synthetic Extracellular Matrix using Gold Nanoparticles

    Science.gov (United States)

    Cell-interactive polymers have been widely used as synthetic extracellular matrices (sECM) to regulate cell function and promote tissue regeneration. Although it is known that adhesion ligand density and distribution influence the proliferation and differentiation of various cell types, currently a...

  4. Synthetic Fabrication of Nanoscale MoS2-Based Transition Metal Sulfides

    Directory of Open Access Journals (Sweden)

    Jikang Yuan

    2010-01-01

    Full Text Available Transition metal sulfides are scientifically and technologically important materials. This review summarizes recent progress on the synthetic fabrication of transition metal sulfides nanocrystals with controlled shape, size, and surface functionality. Special attention is paid to the case of MoS2 nanoparticles, where organic (surfactant, polymer, inorganic (support, promoter, doping compounds and intercalation chemistry are applied.

  5. Carbohydrate Nanotechnology: Hierarchical Assemblies and Information Processing from Oligosaccharide-Synthetic Lectin Host-Guest

    Science.gov (United States)

    2014-09-17

    controlled grafted-from brush polymerization strategy, and the resulting glycopolymers are orders-of-magnitude more sensitive towards lectins compared to...was made towards all research goals. We have developed a new, mannose-specific synthetic lectin scaffold that achieves specificity through...and thereby initiate photochemical brush polymerizations . This reaction methodology was used to create carbohydrate-containing brush polymers with

  6. Polymers for electronics and spintronics.

    Science.gov (United States)

    Bujak, Piotr; Kulszewicz-Bajer, Irena; Zagorska, Malgorzata; Maurel, Vincent; Wielgus, Ireneusz; Pron, Adam

    2013-12-07

    This critical review is devoted to semiconducting and high spin polymers which are of great scientific interest in view of further development of the organic electronics and the emerging organic spintronic fields. Diversified synthetic strategies are discussed in detail leading to high molecular mass compounds showing appropriate redox (ionization potential (IP), electron affinity (EA)), electronic (charge carrier mobility, conductivity), optoelectronic (electroluminescence, photoconductivity) and magnetic (magnetization, ferromagnetic spin interactions) properties and used as active components of devices such as n- and p-channel field effect transistors, ambipolar light emitting transistors, light emitting diodes, photovoltaic cells, photodiodes, magnetic photoswitches, etc. Solution processing procedures developed with the goal of depositing highly ordered and oriented films of these polymers are also described. This is completed by the description of principal methods that are used for characterizing these macromolecular compounds both in solution and in the solid state. These involve various spectroscopic methods (UV-vis-NIR, UPS, pulse EPR), electrochemistry and spectroelectrochemistry, magnetic measurements (SQUID), and structural and morphological investigations (X-ray diffraction, STM, AFM). Finally, four classes of polymers are discussed in detail with special emphasis on the results obtained in the past three years: (i) high IP, (ii) high |EA|, (iii) low band gap and (iv) high spin ones.

  7. The Ethics of Synthetic Biology

    DEFF Research Database (Denmark)

    Christiansen, Andreas

    The dissertation analyses and discusses a number of ethical issues that have been raised in connection with the development of synthetic biology. Synthetic biology is a set of new techniques for DNA-level design and construction of living beings with useful properties. The dissertation especially......) popular responsesto them succeed, and whether the objections are ultimately persuasive.2. Given that synthetic biology is a new technology, there is a certain degree of uncertainty about its ultimate effects, and many perceive the technology as risky. I discuss two common approaches in risk regulation...

  8. Synthetic biology for therapeutic applications.

    Science.gov (United States)

    Abil, Zhanar; Xiong, Xiong; Zhao, Huimin

    2015-02-02

    Synthetic biology is a relatively new field with the key aim of designing and constructing biological systems with novel functionalities. Today, synthetic biology devices are making their first steps in contributing new solutions to a number of biomedical challenges, such as emerging bacterial antibiotic resistance and cancer therapy. This review discusses some synthetic biology approaches and applications that were recently used in disease mechanism investigation and disease modeling, drug discovery and production, as well as vaccine development and treatment of infectious diseases, cancer, and metabolic disorders.

  9. Tunable surface properties from bioinspired polymers

    Science.gov (United States)

    van Zoelen, Wendy; Rosales, Adrianne; Murnen, Hannah; Zuckermann, Ronald; Segalman, Rachel

    2011-03-01

    Anti-fouling properties can be derived from patterned or ``ambiguous'' surfaces displaying multiple surface properties. Biological polymers with precisely controlled chain shapes and self-assembled structures are attractive materials for these applications, in which tunability is of great importance. We have investigated the surface properties of polypeptoids, a class of non-natural biomimetic polymers based on an N-substituted glycine backbone, that combine many of the advantageous properties of bulk polymers with those of synthetically produced proteins. Polypeptoids are of particular interest as they can be made in a sequence controlled fashion with functionalities already known to impart fouling-resistance (ethers, zwitterions, hydrophobicity, and nanoscale patterning). We demonstrate their surface stability and processibility from the standpoint of coating performance and also discuss controlled self-assembly of these materials. Used strategies include mediation of crystallization by incorporating chain defects and specific interactions.

  10. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    Science.gov (United States)

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  11. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2014-01-01

    Full Text Available Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  12. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  13. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

    Directory of Open Access Journals (Sweden)

    Mohammad Abdus Salam

    2016-03-01

    Full Text Available Wireless sensor network (WSN is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and compared the network performance as number of attackers increases. Network performance is evaluated by modifying the ad-hoc on demand distance vector (AODV routing protocol by using NS2 simulator. It has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know how the network performance changes. The simulation results show that as the number of attackers increases the performance in terms of throughput and delay changes.

  14. Mitigating App-DDoS Attacks on Web Servers

    Directory of Open Access Journals (Sweden)

    Manisha M. Patil

    2011-07-01

    Full Text Available In this paper, a lightweight mechanism is proposed to mitigate session flooding and request flooding app-DDoS attacks on web servers. App-DDoS attack is Application layer Distributed Denial of Service attack. This attack prevents legitimate users from accessing services. Numbers of mechanisms are available and can be installed on routers and firewalls to mitigate network layer DDoS attacks like SYNflood attack, ping of death attack. But Network layer solution is not applicable because App-DDoS attacks are indistinguishable based on packets and protocols. A lightweight mechanism is proposed which uses trust to differentiate legitimate users and attackers. Trust to client is evaluated based on his visiting history and requests are scheduled in decreasing order of trust. In this mechanism trust information is stored at client side in the form of cookies. This mitigation mechanism can be implemented as a java package which can run separately and forward valid requests to server. This mechanism also mitigates request flooding attacks by using Client Puzzle Protocol. When server is under request flooding attack source throttling is done by imposing cost on client. Cost is collected in terms of CPU cycles.

  15. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure......Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...

  16. Replication Attack Mitigations for Static and Mobile WSN

    CERN Document Server

    Manjula, V; 10.5121/ijnsa.2011.3210

    2011-01-01

    Security is important for many sensor network applications. Wireless Sensor Networks (WSN) are often deployed in hostile environments as static or mobile, where an adversary can physically capture some of the nodes. once a node is captured, adversary collects all the credentials like keys and identity etc. the attacker can re-program it and replicate the node in order to eavesdrop the transmitted messages or compromise the functionality of the network. Identity theft leads to two types attack: clone and sybil. In particularly a harmful attack against sensor networks where one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. This paper analyzes the threat posed by the replication attack and several novel techniques to detect and defend against the replication attack, and analyzes their effect...

  17. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  18. Gas chromatographic separation of nitrogen, oxygen, argon, and carbon monoxide using custom-made porous polymers from high purity divinylbenzene

    Science.gov (United States)

    Pollock, G. E.; Ohara, D.; Hollis, O. L.

    1984-01-01

    Existing porous polymers were surveyed for their ability to separate the subject gases. Certain products that showed more promise than others were synthesized and the existing synthetic procedures studied and modified to produce new polymers with enhanced ability to separate the subject gases. Evaluation of the porous polymers was carried out practically by gas chromatography at ambient temperature. The modified synthetic procedures were somewhat simpler than the originals. The new porous polymers made with high purity divinylbenzene enabled use of shorter columns to obtain the separations desired.

  19. How to design low bandgap polymers for highly efficient organic solar cells

    Directory of Open Access Journals (Sweden)

    Tao Xu

    2014-01-01

    Full Text Available Organic photovoltaic cells are promising in terms of their light weight, mechanically flexibility, ease of processing and low cost. Establishing a predictive understanding between the chemical structures and physical properties of polymers is still challenging, and continuous effort is needed to progress toward full commercialization. In this review, recent progress in polymer/fullerene systems is highlighted and four synthetic principles are summarized to engineer the bandgap and tune the energy levels and the solubility of the targeted polymers.

  20. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed.