WorldWideScience

Sample records for attack synthetic polymers

  1. Synthetic Metal-Containing Polymers

    Science.gov (United States)

    Manners, Ian

    2004-04-01

    The development of the field of synthetic metal-containing polymers - where metal atoms form an integral part of the main chain or side group structure of a polymer - aims to create new materials which combine the processability of organic polymers with the physical or chemical characteristics associated with the metallic element or complex. This book covers the major developments in the synthesis, properties, and applications of synthetic metal-containing macromolecules, and includes chapters on the preparation and characterization of metal-containing polymers, metallocene-based polymers, rigid-rod organometallic polymers, coordination polymers, polymers containing main group metals, and also covers dendritic and supramolecular systems. The book describes both polymeric materials with metals in the main chain or side group structure and covers the literature up to the end of 2002.

  2. Cell microencapsulation with synthetic polymers.

    Science.gov (United States)

    Olabisi, Ronke M

    2015-02-01

    The encapsulation of cells into polymeric microspheres or microcapsules has permitted the transplantation of cells into human and animal subjects without the need for immunosuppressants. Cell-based therapies use donor cells to provide sustained release of a therapeutic product, such as insulin, and have shown promise in treating a variety of diseases. Immunoisolation of these cells via microencapsulation is a hotly investigated field, and the preferred material of choice has been alginate, a natural polymer derived from seaweed due to its gelling conditions. Although many natural polymers tend to gel in conditions favorable to mammalian cell encapsulation, there remain challenges such as batch to batch variability and residual components from the original source that can lead to an immune response when implanted into a recipient. Synthetic materials have the potential to avoid these issues; however, historically they have required harsh polymerization conditions that are not favorable to mammalian cells. As research into microencapsulation grows, more investigators are exploring methods to microencapsulate cells into synthetic polymers. This review describes a variety of synthetic polymers used to microencapsulate cells. PMID:24771675

  3. Polymer dynamics from synthetic polymers to proteins

    Indian Academy of Sciences (India)

    D Richter; R Biehl; M Monkenbush; B Hoffmann; R Merkel

    2008-10-01

    Starting from the standard model of polymer motion - the Rouse model - we briefly present some key experimental results on the mesoscopic dynamics of polymer systems. We touch the role of topological confinement as expressed in the reptation model and discuss in some more detail processes limiting the confinement. In the second part we relate to some new developments concerning the measurement of large-scale internal dynamics of proteins by neutron spin echo.

  4. Biodegradable synthetic polymers for tissue engineering

    Directory of Open Access Journals (Sweden)

    Gunatillake P. A.

    2003-05-01

    Full Text Available This paper reviews biodegradable synthetic polymers focusing on their potential in tissue engineering applications. The major classes of polymers are briefly discussed with regard to synthesis, properties and biodegradability, and known degradation modes and products are indicated based on studies reported in the literature. A vast majority of biodegradable polymers studied belongs to the polyester family, which includes polyglycolides and polylactides. Some disadvantages of these polymers in tissue engineering applications are their poor biocompatibility, release of acidic degradation products, poor processability and loss of mechanical properties very early during degradation. Other degradable polymers such as polyorthoesters, polyanhydrides, polyphosphazenes, and polyurethanes are also discussed and their advantages and disadvantages summarised. With advancements in tissue engineering it has become necessary to develop polymers that meet more demanding requirements. Recent work has focused on developing injectable polymer compositions based on poly (propylene fumarate and poly (anhydrides to meet these requirements in orthopaedic tissue engineering. Polyurethanes have received recent attention for development of degradable polymers because of their great potential in tailoring polymer structure to achieve mechanical properties and biodegradability to suit a variety of applications.

  5. Synthetic biodegradable functional polymers for tissue engineering: a brief review

    OpenAIRE

    BaoLin, GUO; Ma, Peter X.

    2014-01-01

    Scaffolds play a crucial role in tissue engineering. Biodegradable polymers with great processing flexibility are the predominant scaffolding materials. Synthetic biodegradable polymers with well-defined structure and without immunological concerns associated with naturally derived polymers are widely used in tissue engineering. The synthetic biodegradable polymers that are widely used in tissue engineering, including polyesters, polyanhydrides, polyphosphazenes, polyurethane, and poly (glyce...

  6. Hydrophilic synthetic polymers for soft contact lenses

    International Nuclear Information System (INIS)

    A process for preparing a hydrophilic synthetic polymer usable as soft contact lenses is provided. The process comprises copolymerizing 20 parts (by wt.) of 2-hydroxyethyl methacrylate with 0.5 to 3 parts of vinyl acetate and 0.1 to 1 part of a cross-linking monomer (A). The polymerization is carried out either catalytically or by radiation. The resulting copolymer is mechanically fabricated and then swollen with water to give soft contact lenses. The lenses are stable both dynamically and optically, do not injure the cornea, and are capable of correcting regular astigmatism. In one example, 20 parts of 2-hydroxyethyl methacrylate were copolymerized in a mold with 1 part of vinyl acetate and 0.5 part of divinylbenzene (A) by irradiation with Co 60 radiation (1 x107 r) and then thermally treated. A transparent hydrophilic polymer usable as soft contact lenses was obtained. (Kaichi, S.)

  7. Porous networks derived from synthetic polymer-clay complexes

    Energy Technology Data Exchange (ETDEWEB)

    Carrado, K.A.; Thiyagarajan, P.; Elder, D.L.

    1995-05-12

    Synthetic hectorites were hydrothermally crystallized with direct incorporation of a cationic polymer poly(dimethyl diallyl ammonium chloride) (PDDA), and two neutral cellulosic polymers hydroxypropyl methylcellulose (HPMC) and hydroxyethyl cellulose (HEC). Synthetic PDDA-hectorite displays the lowest d-spacing at 15.8 {Angstrom} along with less polymer incorporation (7.8 wt % organic) than the neutral polymers (18--22 wt % organic). Thermal analysis and small angle neutron scattering were used to further examine the polymer-clay systems. Clay platelets of the largest size and best stacking order occur when cationic PDDA polymer is used. PDDA also enhances these properties over the crystallites prepared for a control mineral, where no polymer is used. HEC acts to aggregate the silica, leaving less to react to form clay. The clay platelets which result from HEC are small, not stacked to a large degree, and oriented randomly. Neutral HPMC acts more like cationic PDDA in that larger clay platelets are allowed to form. The extended microstructure of the clay network remains undisturbed after polymer is removed by calcination. When no polymer is used, the synthetic hectorite has a N{sub 2} BET surface area of 200 M{sup 2}/gm, even after calcination. This increases by 20--50% for the synthetic polymer-hectorites after the polymer is removed by calcination.

  8. Porous networks derived from synthetic polymer-clay complexes

    International Nuclear Information System (INIS)

    Synthetic hectorites were hydrothermally crystallized with direct incorporation of a cationic polymer poly(dimethyl diallyl ammonium chloride) (PDDA), and two neutral cellulosic polymers hydroxypropyl methylcellulose (HPMC) and hydroxyethyl cellulose (HEC). Synthetic PDDA-hectorite displays the lowest d-spacing at 15.8 Angstrom along with less polymer incorporation (7.8 wt % organic) than the neutral polymers (18--22 wt % organic). Thermal analysis and small angle neutron scattering were used to further examine the polymer-clay systems. Clay platelets of the largest size and best stacking order occur when cationic PDDA polymer is used. PDDA also enhances these properties over the crystallites prepared for a control mineral, where no polymer is used. HEC acts to aggregate the silica, leaving less to react to form clay. The clay platelets which result from HEC are small, not stacked to a large degree, and oriented randomly. Neutral HPMC acts more like cationic PDDA in that larger clay platelets are allowed to form. The extended microstructure of the clay network remains undisturbed after polymer is removed by calcination. When no polymer is used, the synthetic hectorite has a N2 BET surface area of 200 M2/gm, even after calcination. This increases by 20--50% for the synthetic polymer-hectorites after the polymer is removed by calcination

  9. Energy and charge control in mass spectrometry of synthetic polymers

    NARCIS (Netherlands)

    Nasioudis, A.

    2011-01-01

    Synthetic polymers are the products of humans’ attempts to imitate nature’s gigantic molecular chain architectures. The extended variety of building blocks and reaction mechanisms resulted in a plethora of different polymeric architectures. The biggest challenge for polymer chemists is to develop an

  10. Molecular weight characterisation of synthetic polymers

    CERN Document Server

    Holding, Steve R

    1995-01-01

    The report comprises a state-of-the-art overview of the subject of molecular weight characterisation, supported by an extensive, indexed bibliography. The bibliography contains over 400 references and abstracts, compiled from the Polymer Library.

  11. Molecular Design of Synthetic Biodegradable Polymers as Cell Scaffold Materials

    Institute of Scientific and Technical Information of China (English)

    WANG Shen-guo; WAN Yu-qing; CAI Qing; HE Bin; CHEN Wen-na

    2004-01-01

    Poly(lactic acid) and its copolymers are regarded as the most useful biomaterials. The good biocompatibility, biodegradability and mechanical properties of them make the synthetic biodegradable polymers have primary application to tissue engineering. The advantages and disadvantages of the synthetic biodegradable polymers as cell scaffold materials are evaluated. This article reviews the modification of polylactide-family aliphatic polymers to improve the cell affinity when the polymers are used as cell scaffolds. We have developed four main approaches: to modify polyester cell scaffolds in combination of plasma treating and collagen coating; to introduce hydrophilic segments into aliphatic polyester backbones; to introduce pendant functional groups into polyester chains; to modify polyester with dextran. The results of the cell cultures prove that the approaches mentioned above have improved the cell affinity of the polyesters and have modulated cell function such as adhesion, proliferation and migration.

  12. The World of Synthetic Polymers.An Industrial Perspective

    Institute of Scientific and Technical Information of China (English)

    Lau Willie

    2004-01-01

    Synthetic polymers have become the building block in almost every aspects of our daily life. Billions of pounds of polymers are produced each year and the demand is continuously growing both in terms of volume and advanced performance. The general property of a class of polymers is often bounded by the synthetic process that produces the polymer. For example,polyolefins, are non-polar polymers due to the poor tolerance of transition metal catalysts toward polar monomers. Conversely, latices are polar polymers, since the emulsion polymerization process limits the use of non-polar monomers which have low solubility in water. It is highly desirable to be able to design polymer systems with optimum polarity balance to meet the application demand while staying within the industrial manufacturing constraints.An overview of industrial polymerization methods will be followed by a presentation on the recent development of a new emulsion polymerization technology. The technology involves the use of Cyclodextrin, acting as "Phase Transport Catalyst", facilitating the diffusion of very hydrophobic and water insoluble monomers through the aqueous medium. A new class of latex polymers and their attributes will be discussed.

  13. Biopolymer attachment to synthetic polymer surfaces

    Czech Academy of Sciences Publication Activity Database

    Lapčík, L.; Barros Rimmons, A. M.; Drnovská, Hana; Lehocký, M.; Trindade, T.

    Cracow : Institute of Catalysis and Surface Chemistry, Polish Academy of Sciences, 2002. s. 118. [International Symposium on Electrokinetic Phenomena. 18.08.2002-22.08.2002, Cracow] R&D Projects: GA AV ČR KSK4050111 Keywords : polymer surfaces Subject RIV: CD - Macromolecular Chemistry

  14. Solid state NMR of biopolymers and synthetic polymers

    International Nuclear Information System (INIS)

    Solid state NMR has been invaluable in evaluating the structure, phase separation, and dynamics of polymers. Because polymers are generally used in the solid state, solid state NMR is especially powerful because it provides information about the materials in their native state. This review gives a general overview of solid state NMR, concentrating on solid state 13 C and 2 H NMR. It then focuses on two examples: the biopolymer spider silka and the engineering material polyurethane. It illustrates how solid state NMR can provide new information about synthetic and bio-polymers. (author)

  15. Hemicelluloses application for synthetic polymer surfaces functionalisation

    OpenAIRE

    Velkova, Nena

    2016-01-01

    The main aim of this thesis was development of thin functional layers from hemicelluloses xylans on the polyethylene terephthalate (PET) surfaces. Hemicelluloses, xylans, as renewable polymers, were chemically modified in order to introduce anionic and cationic functional groups. Two types of chemical modifications were performed: carboxymethylation in order to increase anionic nature of xylans and improve their hydrophilic character and cationization for introducing of amino groups and antim...

  16. Co-pyrolysis of wood biomass and synthetic polymers mixtures

    Energy Technology Data Exchange (ETDEWEB)

    Sharypov, V.I.; Beregovtsova, N.G.; Kuznetsov, B.N.; Baryshnikov, S.V. [Institute of Chemistry and Chemical Technology SB RAS, K. Marx Str., Krasnoyarsk 660049 (Russian Federation); Cebolla, V.L. [Instituto de Carboquimica, CSIC, Zaragoza (Spain); Weber, J.V.; Collura, S.; Finqueneisel, G.; Zimny, T. [Laboratoire de Chimie et Applications, Universite de Metz, IUT, rue V. Demange, 57500 Saint Avold (France)

    2006-06-01

    The pyrolysis in a hydrogen atmosphere of pine wood and synthetic polymers (polyethylene and polypropylene) mixtures was studied in a rotating autoclave. The effects of reaction temperature, wood/polymers mixture composition and catalysts, on the mixtures conversion into liquids and gases were established and discussed. The used catalysts were pyrrhotite and haematite materials activated by mechanochemical treatment. In the co-liquefaction processes the interaction between fragments of wood and polymers thermal decomposition took place. This results in non-additive increase of the wood/polymers conversion degree by 10-15wt.% and of the yield of distillate fractions by 14-19wt.%. Iron ore materials were found catalytically active in the process of hydropyrolysis of wood/polymers mixtures. By using these catalysts a significant increase of the distillable liquids amounts (by 14-21wt.%) and a sharp decrease of olefins and cycloparaffins content (by approximately two to three times) were observed. (author)

  17. Therapeutic synthetic polymers: a game of Russian roulette?

    Science.gov (United States)

    Hunter, A Christy; Moghimi, S Moein

    2002-10-01

    Synthetic polymer-based drug-delivery systems have been applied in drug delivery for the past 50 years. So why are there so few examples of these macromolecules being used successfully in the clinic? It is our view that many products are failing because of a neglect of the fundamental science surrounding the architectural control of the molecules present, their behaviour following in vivo administration and host response. Adverse events following parenteral administration of approved synthetic polymer-based systems have resulted in unpredictable and fatal responses in a significant number of individuals. Acceptance of the importance of immunotoxicological factors in response to the presence of these macromolecules must be addressed if emergent technologies, such as polymer-based gene-delivery systems, are going to succeed. PMID:12546917

  18. Diversity screening for novel enzymes degrading synthetic polymers

    DEFF Research Database (Denmark)

    Lezyk, Mateusz Jakub

    library from heavily polluted soil – one of the most challenging habitats and source of potent enzymes, potentially degrading a range of recalcitrant xenobiotics from oil and paint industries. It is well-establisehd that ‘you get what you screen for’, therefore the major challenge was the availability......The objective of this PhD study was to evaluate the feasibility of enzymatic degradation of synthetic polymers used as binder materials in marine coatings. Enzymatic modification of synthetic polymers like epoxy resin, polyurethanes and various acrylics is desirable in several industrial processes...... by genes identified in a metagenomic library constructed from soil contaminated with heavy metals and various paint residues. Mco1 is a three domain CopA-like protein and Mco2 and Mco3 are representatives of bacterial twodomain mutlicopper oxidases (MCOs). The enzymes catalyzed oxidation of 2,2'-azino...

  19. 21 CFR 874.3620 - Ear, nose, and throat synthetic polymer material.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Ear, nose, and throat synthetic polymer material. 874.3620 Section 874.3620 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN..., and throat synthetic polymer material. (a) Identification. Ear, nose, and throat synthetic...

  20. Application of natural and synthetic polymers in a production of paper

    Directory of Open Access Journals (Sweden)

    Jovanović Slobodan

    2007-01-01

    Full Text Available This work gives the review of most frequently used natural and synthetic polymers in production of paper, board and cardboard. Physical and chemical interaction of natural and synthetic polymers with cellulose fibers, and thus the way these polymers influence the improvement of both production process and the paper characteristics, have been presented.

  1. In vitro biocompatibility testing of some synthetic polymers used for the achievement of nervous conduits

    OpenAIRE

    Mihai, R; Florescu, IP; Coroiu, V; Oancea, A; Lungu, M.

    2011-01-01

    Biocompatible synthetic polymers are largely used in the bio–medical domain, tissue engineering and in controlled release of medicines. Polymers can be used in the achievement of cardiac and vascular devices, mammary implants, eye lenses, surgical threads, nervous conduits, adhesives, blood substitutes, etc. Our study was axed on the development of cytotoxicity tests for 3 synthetic polymers, namely polyvinyl alcohol, polyethylene glycol and polyvinyl chloride. These tests targeted to determi...

  2. Identification of Synthetic Polymers and Copolymers by Analytical Pyrolysis-Gas Chromatography/Mass Spectrometry

    Science.gov (United States)

    Kusch, Peter

    2014-01-01

    An experiment for the identification of synthetic polymers and copolymers by analytical pyrolysis-gas chromatography/mass spectrometry (Py-GC/MS) was developed and performed in the polymer analysis courses for third-year undergraduate students of chemistry with material sciences, and for first-year postgraduate students of polymer sciences. In…

  3. FORMULATION AND EVALUATION OF METOPROLOL SUCCINATE CONTROLLED RELEASE TABLETS USING NATURAL AND SYNTHETIC POLYMER

    OpenAIRE

    A. Sathyaraj

    2012-01-01

    The objective of the present study to develop controlled release tablets of Metoprolol succinate using Natural polymer, guar gum and synthetic polymer, carbopol as a rate controlling polymers.. It was also desired to study the effect of polymer concentration. Metoprolol succinate, β1- selective adrenergic receptor- blocking agent used in the management of hypertension, angina pectoris, cardiac arrthymias, myocardial infarction, heart failure, hyperthyroidism and in the prophylactic treatment ...

  4. A study of porosity of synthetic polymer nanoparticles using PALS

    Energy Technology Data Exchange (ETDEWEB)

    Pham, B; Smith, S V [Centre for Antimatter-Matter Studies, Australian Nuclear Science and Technology Organisation (ANSTO) NSW 2232 (Australia); Guagliardo, P; Williams, J; Samarin, S, E-mail: binh.pham@ansto.gov.au, E-mail: svs@ansto.gov.au [Centre for Antimatter-Matter Studies, School of Physics, University of Western Australia, WA 6009 (Australia)

    2011-01-01

    Positron annihilation lifetime spectroscopy (PALS) has been used to study the free volume in dry synthetic polymer nanoparticles of various sizes. A series of poly(styrene/divinyl benzene) particles with diameters in the range of 100 to 500 nm were synthesized and then carefully chemically treated using the sulfonation process, to increase their porosity. The particles were characterised by Scanning Electron Microscopy (SEM), light scattering and PALS. Light scattering gave larger size for the treated particles, reflecting the hydration effect and therefore the increase in porosity. PALS spectra of untreated and treated particles gave four and three life-time components, respectively. Analysis by PAScual version 1.3.0 program indicated there was a reduction in the intensity and the type of the micropores in the treated particles. The data suggest PALS is a sensitive tool for detecting changes in microporosity in particles. The conflicting results obtained for light scattering compared to PALS for chemically treated particles is difficult to resolve and suggests sample preparation of polymeric materials for PALS is the critical factor.

  5. Synthetic polymers and methods of making and using the same

    Science.gov (United States)

    Daily, Michael D.; Grate, Jay W.; Mo, Kai-For

    2016-06-14

    Monomer embodiments that can be used to make polymers, such as homopolymers, heteropolymers, and that can be used in particular embodiments to make sequence-defined polymers are described. Also described are methods of making polymers using such monomer embodiments. Methods of using the polymers also are described.

  6. Design and evaluation of a gastroretentive drug delivery system for metformin HCl using synthetic and semi-synthetic polymers.

    Science.gov (United States)

    Meka, Venkata Srikanth; Gorajana, Adinaravyana; Dharmanlingam, Senthil Rajan; Kolapalli, Venkata Ramana Murthy

    2013-12-01

    The aim of the present research was to prepare and evaluate a gastroretentive drug delivery system for metformin HCl, using synthetic and semi-synthetic polymers. The floating approach was applied for preparing gastroretentive tablets (GRT) and these tablets were manufactured by the direct compression method. The drug delivery system comprises of synthetic and semi-synthetic polymers such as polyethylene oxide and Carboxymethyl ethyl cellulose (CMEC) as release-retarding polymers. GRT were evaluated for physico-chemical properties like weight variation, hardness, assay friability, in vitro floating behaviour, swelling studies, in vitro dissolution studies and rate order kinetics. Based upon the drug release and floating properties, two formulations (MP04 & MC03) were selected as optimized formulations. The optimized formulations MP04 and MC03 followed zero order rate kinetics, with non-Fickian diffusion and first order rate kinetics with erosion mechanism, respectively. The optimized formulation was characterised with FTIR studies and it was observed that there was no interaction between the drug and polymers. PMID:24502177

  7. Synthetic polymers are more effective than natural flocculants for the clarification of tobacco leaf extracts

    OpenAIRE

    Buyel, J.F.; Fischer, R.

    2015-01-01

    The use of synthetic polymers as flocculants can increase filter capacity and thus reduce the costs of downstream processing during the production of plant-derived biopharmaceutical proteins, but this may also attract regulatory scrutiny due to the potential toxicity of such compounds. Therefore, we investigated the efficacy of three non-toxic natural flocculants (chitosan, kaolin and polyphosphate) alone and in combination with each other or with a synthetic polymer (Polymin P) during the cl...

  8. The rational design of a synthetic polymer nanoparticle that neutralizes a toxic peptide in vivo

    OpenAIRE

    Hoshino, Yu; Koide, Hiroyuki; Furuya, Keiichi; Haberaecker, Walter W.; Lee, Shih-Hui; Kodama, Takashi; Kanazawa, Hiroaki; Oku, Naoto; Shea, Kenneth J

    2011-01-01

    Synthetic polymer nanoparticles (NPs) that bind venomous molecules and neutralize their function in vivo are of significant interest as “plastic antidotes.” Recently, procedures to synthesize polymer NPs with affinity for target peptides have been reported. However, the performance of synthetic materials in vivo is a far greater challenge. Particle size, surface charge, and hydrophobicity affect not only the binding affinity and capacity to the target toxin but also the toxicity of NPs and th...

  9. Antifouling Activity of Synthetic Alkylpyridinium Polymers Using the Barnacle Model

    Directory of Open Access Journals (Sweden)

    Veronica Piazza

    2014-04-01

    Full Text Available Polymeric alkylpyridinium salts (poly-APS isolated from the Mediterranean marine sponge, Haliclona (Rhizoniera sarai, effectively inhibit barnacle larva settlement and natural marine biofilm formation through a non-toxic and reversible mechanism. Potential use of poly-APS-like compounds as antifouling agents led to the chemical synthesis of monomeric and oligomeric 3-alkylpyridinium analogues. However, these are less efficient in settlement assays and have greater toxicity than the natural polymers. Recently, a new chemical synthesis method enabled the production of poly-APS analogues with antibacterial, antifungal and anti-acetylcholinesterase activities. The present study examines the antifouling properties and toxicity of six of these synthetic poly-APS using the barnacle (Amphibalanus amphitrite as a model (cyprids and II stage nauplii larvae in settlement, acute and sub-acute toxicity assays. Two compounds, APS8 and APS12-3, show antifouling effects very similar to natural poly-APS, with an anti-settlement effective concentration that inhibits 50% of the cyprid population settlement (EC50 after 24 h of 0.32 mg/L and 0.89 mg/L, respectively. The toxicity of APS8 is negligible, while APS12-3 is three-fold more toxic (24-h LC50: nauplii, 11.60 mg/L; cyprids, 61.13 mg/L than natural poly-APS. This toxicity of APS12-3 towards nauplii is, however, 60-fold and 1200-fold lower than that of the common co-biocides, Zn- and Cu-pyrithione, respectively. Additionally, exposure to APS12-3 for 24 and 48 h inhibits the naupliar swimming ability with respective IC50 of 4.83 and 1.86 mg/L.

  10. Synthetic microfluidic paper: high surface area and high porosity polymer micropillar arrays

    OpenAIRE

    Jonas, Hansson; Yasuga, Hiroki; Haraldsson, Tommy; van der Wijngaart, Wouter

    2016-01-01

    We introduce Synthetic Microfluidic Paper, a novel porous material for microfluidic applications that consists of an OSTE polymer that is photostructured in a well-controlled geometry of slanted and interlocked micropillars. We demonstrate the distinct benefits of Synthetic Microfluidic Paper over other porous microfluidic materials, such as nitrocellulose, traditional paper and straight micropillar arrays: in contrast to straight micropillar arrays, the geometry of Synthetic Microfluidic Pap...

  11. FORMULATION AND EVALUATION OF METOPROLOL SUCCINATE CONTROLLED RELEASE TABLETS USING NATURAL AND SYNTHETIC POLYMER

    Directory of Open Access Journals (Sweden)

    A. Sathyaraj

    2012-01-01

    Full Text Available The objective of the present study to develop controlled release tablets of Metoprolol succinate using Natural polymer, guar gum and synthetic polymer, carbopol as a rate controlling polymers.. It was also desired to study the effect of polymer concentration. Metoprolol succinate, β1- selective adrenergic receptor- blocking agent used in the management of hypertension, angina pectoris, cardiac arrthymias, myocardial infarction, heart failure, hyperthyroidism and in the prophylactic treatment of migraine. The half-life of drug is relatively short approximately 4-6 hrs and in normal course of therapy drug administration is required every 4-6 hrs, thus warrants the use of controlled release formulation for prolong action and to improve patient compliance. In the present investigation Natural polymer, guar gum and synthetic polymer, carbopol have been selected as matrix forming materials for the drug. The formulations are made by employing the conventional wet granulation method, to achieve prolonged release of medicaments.

  12. Control of polymer-packing orientation in thin films through synthetic tailoring of backbone coplanarity

    KAUST Repository

    Chen, Mark S.

    2013-10-22

    Controlling solid-state order of π-conjugated polymers through macromolecular design is essential for achieving high electronic device performance; yet, it remains a challenge, especially with respect to polymer-packing orientation. Our work investigates the influence of backbone coplanarity on a polymer\\'s preference to pack face-on or edge-on relative to the substrate. Isoindigo-based polymers were synthesized with increasing planarity by systematically substituting thiophenes for phenyl rings in the acceptor comonomer. This increasing backbone coplanarity, supported by density functional theory (DFT) calculations of representative trimers, leads to the narrowing of polymer band gaps as characterized by ultraviolet-visible-near infrared (UV-vis-NIR) spectroscopy and cyclic voltammetry. Among the polymers studied, regiosymmetric II and TII polymers exhibited the highest hole mobilities in organic field-effect transistors (OFETs), while in organic photovoltaics (OPVs), TBII polymers that display intermediate levels of planarity provided the highest power conversion efficiencies. Upon thin-film analysis by atomic force microscropy (AFM) and grazing-incidence X-ray diffraction (GIXD), we discovered that polymer-packing orientation could be controlled by tuning polymer planarity and solubility. Highly soluble, planar polymers favor face-on orientation in thin films while the less soluble, nonplanar polymers favor an edge-on orientation. This study advances our fundamental understanding of how polymer structure influences nanostructural order and reveals a new synthetic strategy for the design of semiconducting materials with rationally engineered solid-state properties. © 2013 American Chemical Society.

  13. Hydrophilization of synthetic biodegradable polymer scaffolds for improved cell/tissue compatibility

    International Nuclear Information System (INIS)

    Porous scaffolds have been widely used in tissue engineering because they can guide cells and tissues to grow, synthesize extracellular matrix and other biological molecules, and facilitate the formation of functional tissues and organs. Although various natural and synthetic biodegradable polymers have been used to fabricate the scaffolds, synthetic polymers have been more widely used for scaffolds since they have good mechanical strength, reproducible/controllable mechanical-chemical properties, and controllable biodegradation rates. However, the ‘hydrophobic character’ of common synthetic polymers is considered a limitation for tissue engineering applications because it can lead to a low initial cell seeding density, heterogeneous cell distribution in the scaffold, and slow cell growth due to insufficient absorption/diffusion of cell culture medium into scaffold and lack of specific interaction sites with cells. The hydrophilization of porous synthetic polymer scaffolds has been considered as one of the simple but effective approaches to achieve desirable in vitro cell culture and in vivo tissue regeneration within the scaffolds. In this review paper, representative synthetic biodegradable polymers and techniques to fabricate porous scaffolds are briefly summarized and their hydrophilization techniques to improve cell/tissue compatibility are discussed. (paper)

  14. The Improvement of Dry Strength by Synthetic Polymers

    Science.gov (United States)

    Jenkins, Stan

    In the 1950s a new family of papermaking additives was developed - polyacrylamides [1]. Polyacrylamides are made by polymerising acrylamide solution using free-radical catalysts, to form a linear, non-ionic polymer [2].

  15. Review of Synthetic Methods to Form Hollow Polymer Nanocapsules

    Energy Technology Data Exchange (ETDEWEB)

    Barker, Madeline T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-13

    Syntactic foams have grown in interest due to the widened range of applications because of their mechanical strength and high damage tolerance. In the past, hollow glass or ceramic particles were used to create the pores. This paper reviews literature focused on the controlled synthesis of hollow polymer spheres with diameters ranging from 100 –200 nm. By using hollow polymer spheres, syntactic foams could reach ultra-low densities.

  16. Prostate tumor targeting with polymer conjugate bearing a synthetic nonapeptide

    Czech Academy of Sciences Publication Activity Database

    Pechar, Michal; Pola, Robert; Ulbrich, Karel; Fabra, A.

    Valencia: Centro de Investigación Príncipe Felipe, 2008. s. 95. [International Symposium on Polymer Therapeutics: From Laboratory to Clinical Practice /7./. 26.05.2008-28.05.2008, Valencia] R&D Projects: GA ČR GA203/08/0543 Institutional research plan: CEZ:AV0Z40500505 Keywords : prostate * tumor targeting * polymer conjugate Subject RIV: CD - Macromolecular Chemistry

  17. Novel polymer materials for protecting crew and structural elements of orbital station against microorganisms attack throughout long-term operation

    Science.gov (United States)

    Savelyev, Yu.; Rudenko, A.; Robota, L.; Koval, E.; Savelyeva, O.; Markovskaya, L.; Veselov, V.

    2009-01-01

    Novel polyurethanes, polyamidourethanes and polyurethane foams of stable to biocorrosion were synthesized. The polymers possess fungicidal/fungistatic and bactericidal/bacteriostatic activity. After the biological tests with using of mold fungi and yeasts, polymers totally keep their main exploitation characteristics: for most of polymers coefficients of strength and elasticity keeping are equal of 100%. Most of them possess the fungicidal properties of zero balls, according to the State Standard. Life-firmness investigation of the most aggressive extremophiles: mold fungi Penicillium and Aspergillus on the polymer surfaces showed that for some samples it made up from 3 to 10 days. Some polymers possess both anti-micotic and anti-bacterial action. Based on investigation results a special technological scheme of assured human protection against microorganisms attack in specific condition of his existence are to be elaborated.

  18. Microparticles based on natural and synthetic polymers for ophthalmic applications.

    Science.gov (United States)

    Tataru, G; Popa, M; Costin, D; Desbrieres, J

    2012-05-01

    Sodium salt of carboxymethylcellulose/poly(vinyl alcohol) particles suitable for application in ocular drug administration were prepared by crosslinking with epichlorohydrin in an alkaline medium, in reverse emulsion. The influence of parameters related with the particles elaboration process (ratio between polymer mixture and crosslinking agent, concentration of polymer solution, duration of crosslinking reaction, stirring intensity, etc.) based on their composition, size, and swelling ability was studied. Obtained microparticles fulfill the requirements for biomaterials-they are formed from biocompatible polymers; the acute toxicity value (LD(50)) is high enough to consider these materials as weakly toxic (hence able to introduce within the organism); they are able to include and release drugs in a controlled way. The in vivo adrenalin ocular delivery from the microparticles was tested on voluntary human patient. The particles showed good adhesion properties without irritation to the patient and proved the capability to treat the ocular congestion. PMID:22344747

  19. Synthetic Polymer Nanoparticles with Antibody-Like Affinity for a Hydrophilic Peptide

    OpenAIRE

    Zeng, Zhiyang; Hoshino, Yu; Rodriguez, Andy; Yoo, Hoseong; Shea, Kenneth J

    2010-01-01

    Synthetic polymer nanoparticles with antibody-like affinity for a hydrophilic peptide have been prepared by inverse microemulsion polymerization. Peptide affinity was achieved in part by incorporating the target (imprint) peptide in the polymerization reaction mixture. Incorporation of the imprint peptide assists in the creation of complementary binding sites in the resulting polymer nanoparticle (NP). To orient the imprint peptide at the interface of the water and oil domains during polymeri...

  20. Epitope Discovery for a Synthetic Polymer Nanoparticle: A New Strategy for Developing a Peptide Tag

    OpenAIRE

    Yoshimatsu, Keiichi; Yamazaki, Tomohiko; Hoshino, Yu; Rose, Paul E.; Epstein, Linda F.; Miranda, Les P.; Tagari, Philip; Beierle, John M.; Yonamine, Yusuke; Shea, Kenneth J

    2014-01-01

    We describe a novel epitope discovery strategy for creating an affinity agent/peptide tag pair. A synthetic polymer nanoparticle (NP) was used as the “bait” to catch an affinity peptide tag. Biotinylated peptide tag candidates of varied sequence and length were attached to an avidin platform and screened for affinity against the polymer NP. NP affinity for the avidin/peptide tag complexes was used to provide insight into factors that contribute NP/tag binding. The identified epitope sequence ...

  1. New coupling strategy for radionuclide labeling of synthetic polymers

    Czech Academy of Sciences Publication Activity Database

    Hrubý, Martin; Kučka, Jan; Nováková, Michaela; Macková, Hana; Vetrík, Miroslav

    2010-01-01

    Roč. 68, č. 2 (2010), s. 334-339. ISSN 0969-8043 R&D Projects: GA AV ČR KAN200200651; GA ČR GA202/09/2078; GA MŠk 1M0505 Institutional research plan: CEZ:AV0Z40500505 Keywords : polymer * radionuclide * labeling Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 0.999, year: 2010

  2. Characterization of chitosan composites with synthetic polymers and inorganic additives.

    Science.gov (United States)

    Lewandowska, Katarzyna

    2015-11-01

    In the present study, the results from thermogravimetric analysis (TGA), contact angle measurements, tensile tests, scanning electron microscopy (SEM) and atomic force microscopy (AFM) of polymer composites containing chitosan (Ch) and montmorillonite (MMT) with and without poly(vinyl alcohol) (PVA) are presented. Measurements of the contact angles for diiodomethane (D) and glycerol (G) on the surfaces of chitosan films, Ch/MMT and Ch/PVA/MMT, were made and surface free energies were calculated. It was found that the wettability of the chitosan/MMT or Ch/PVA/MMT composite films decreased relative to the wettability of chitosan. The microstructure of unmodified polymers and their composites, as observed by SEM and AFM, showed particles that are relatively well dispersed in the polymer matrix. The TGA thermograms and mass loss percentages at different decomposition temperatures showed that the thermal stability of the binary composite slightly decreases upon the addition of PVA. The film mechanical properties such as tensile strength, Young's modulus and tensile strain at break depend on the composition and varied non-uniformly. Both composites possessed a tensile strength and Young's modulus of 27.6-94.3MPa and 1.5-3.5GPa, respectively. The addition of PVA to the composite led to a reduction in tensile strength by approximately 40%. PMID:26253510

  3. Impinging jet study of the deposition of colloidal particles on synthetic polymer (Zeonor)

    DEFF Research Database (Denmark)

    Vlček, Jakub; Lapčík, Lubomír; Cech, Jiri;

    2014-01-01

    In this study, an impinging jet deposition experiments were performed on synthetic polymer (Zeonor) original and by micro-embossing modified substrates with exactly defined topology as confirmed by AFM and SEM. Deposition experiments were performed at ambient temperature and at selected flow regime...

  4. Towards the construction of synthetic protocells: Engineering responsive polymer membranes

    Science.gov (United States)

    Kamat, Neha Prashant

    Polymersomes are vesicles formed through self-assembly of diblock copolymers that display the lamellar structure of cellular membranes. The work described in this thesis has been driven by the long-range goal of creating a polymersome protocell; a polymer vesicle, that carries out some life activities, such as signaling, communication, sensation or growth. We developed three different areas important for cellular mimicry, and used the concept of inter-particle communication as a model behavior to guide the design parameters of our system. These parameters include designing responsive membranes, controlling membrane architecture and composition, and controlling vesicle spatial position. First, we created responsive polymer membranes that use an optical illumination to trigger and report membrane response. Confocal microscopy and micropipette aspiration were used to show that polymer membranes that contained a porphyrin-based chromophore could be induced to deform and rupture in response to light when a luminal solute, dextran, was encapsulated. This response could be tuned by changing the molecular weight of dextran and the membrane polymer. We then showed how supermolecular porphyrin-based fluorophores can be used as sensors for membrane stress. We showed that changes in porphyrin emission report changes in membrane tension by using fluorimetry, a multispectral camera and aspiration techniques to characterize changes in the optical emission of these near infrared (NIR) emissive probes embedded within the hydrophobic core of the polymersome membrane. Next, we constructed polymersomes with increased control over the membrane diameter, membrane composition, and luminal encapsulates using microfluidics. Using micropipette aspiration, we verified the unilamellarity of fluid membranes consisting of PEO30-b-PBD46 diblock copolymers. In addition, we used micropipette aspiration to both track and verify solvent removal from double emulsion-templated polymersomes. Finally

  5. Synthetic Strategies in the Preparation of Polymer/Inorganic Hybrid Nanoparticles

    Directory of Open Access Journals (Sweden)

    Matthew A. Hood

    2014-05-01

    Full Text Available This article reviews the recent advances and challenges in the preparation of polymer/inorganic hybrid nanoparticles. We mainly focus on synthetic strategies, basing our classification on whether the inorganic and the polymer components have been formed in situ or ex situ, of the hybrid material. Accordingly, four types of strategies are identified and described, referring to recent examples: (i ex situ formation of the components and subsequent attachment or integration, either by covalent or noncovalent bonding; (ii in situ polymerization in the presence of ex situ formed inorganic nanoparticles; (iii in situ precipitation of the inorganic components on or in polymer structures; and (iv strategies in which both polymer and inorganic component are simultaneously formed in situ.

  6. Sonochemical procedures; the main synthetic method for synthesis of coinage metal ion supramolecular polymer nano structures.

    Science.gov (United States)

    Shahangi Shirazi, Fatemeh; Akhbari, Kamran

    2016-07-01

    During the last two decades, supramolecular polymers have received great attention and the number of their synthesized compounds is still growing. Although people have long been interested in their crystalline network form it was only until 2005 that the first examples of nano- or microscale coordination polymers particles be demonstrated. This review tries to give an overview of all nano supramolecular compounds which were reported from coinage metal ions, their attributed synthetic procedures and to investigate the relation between the dimensions of coinage metal ions (Cu, Ag and Au) coordination and supramolecular polymers with their nano-structural morphologies and dimensions. Eleven compounds (from twenty compounds) with nano-structure morphology were prepared by sonochemical process and Ag(I) coordination and supramolecular polymer nano-structures can be easily prepared by sonochemical procedures. PMID:26964923

  7. Targeted conjugation of breast anticancer drug tamoxifen and its metabolites with synthetic polymers.

    Science.gov (United States)

    Sanyakamdhorn, S; Agudelo, D; Bekale, L; Tajmir-Riahi, H A

    2016-09-01

    Conjugation of antitumor drug tamoxifen and its metabolites, 4-hydroxytamxifen and ednoxifen with synthetic polymers poly(ethylene glycol) (PEG), methoxypoly (ethylene glycol) polyamidoamine (mPEG-PAMAM-G3) and polyamidoamine (PAMAM-G4) dendrimers was studied in aqueous solution at pH 7.4. Multiple spectroscopic methods, transmission electron microscopy (TEM) and molecular modeling were used to characterize the drug binding process to synthetic polymers. Structural analysis showed that drug-polymer binding occurs via both H-bonding and hydrophobic contacts. The order of binding is PAMAM-G4>mPEG-PAMAM-G3>PEG-6000 with 4-hydroxttamoxifen forming more stable conjugate than tamoxifen and endoxifen. Transmission electron microscopy showed significant changes in carrier morphology with major changes in the shape of the polymer aggregate as drug encapsulation occurred. Modeling also showed that drug is located in the surface and in the internal cavities of PAMAM with the free binding energy of -3.79 for tamoxifen, -3.70 for 4-hydroxytamoxifen and -3.69kcal/mol for endoxifen, indicating of spontaneous drug-polymer interaction at room temperature. PMID:27137803

  8. SELECTIVE REMOVAL OF Cd(II) USING DOUBLE IMPRINTED POLYMER FROM SYNTHETIC WATER

    OpenAIRE

    OZKUTUK, Ebru Birlik

    2015-01-01

    The aim of this study is to prepare ion-imprinted polymers which can be used for the selective removal of Cd(II) from synthetic water. Ion-imprinted polymer particles have prepared by molecular imprinting technique using 3-mercaptopropyl-trimethoxysilane as monomer, tetraethoxysilane as crosslinking agent in the presence of Cd(II) and dodecylamine. After that, the template ions have removed using 0.1M HNO3/ethanol. A batch procedure has used for the determination of the characteristics of the...

  9. Perturbations of cellular membranes with synthetic polymers and ultrafast lasers

    Science.gov (United States)

    Kelly, Christopher Vaughn-Daigneau

    This dissertation examines the response of the plasma membrane to perturbations by synthetic nanoparticles and ultra-fast laser pulses. Both model membranes and living cells were examined in to characterize membrane disruption and the biological response to perturbation. These studies provide a deeper understanding of cell biology and guide the design of effective nanoparticle- or laser-based therapies, as well as warning about unintended exposure. In regards to membrane disruption by pulsed-laser irradiation, irradiation induced giant plasma membrane vesicles (GPMVs) on the surface of the living cell. This process involved the incorporation of material from the extracellular media into both the cytoplasm and the GPMV as the cell responded to the intense pressure and temperature gradients induced by irradiation and the subsequent cavitation. Further, the cell exposed phosphotidylserine to the exterior surface of the plasma membrane and GPMV and initiated caspase activity. Single particle tracking of 20 nm fluorescent beads within the GPMVs demonstrated a complex, gelatinous structure within the GPMV. In regards to nanoparticle-based perturbations, techniques such as isothermal titration calorimetry and molecular dynamics were used to investigate the relationship between nanoparticle properties and membrane disruption. Molecular dynamics simulations examined the binding of third-generation poly(amidoamine) dendrimers to phosphatidylcholine bilayers as a function on nanoparticle termination and membrane phase. A potential of mean force was calculated and demonstrated that the charged dendrimers bound to the zwitterionic phospholipids with approximately 50% more free energy release than uncharged dendrimers. Further, the difference in dendrimer binding to gel and fluid lipids was largely due to the hydrophobic interactions between the lipid tails and the non-polar dendrimer moieties. Isothermal titration calorimetry examined the heat release upon interaction between

  10. Frontiers in biomaterials the design, synthetic strategies and biocompatibility of polymer scaffolds for biomedical application

    CERN Document Server

    Cao, Shunsheng

    2014-01-01

    Frontiers in Biomaterials: The Design, Synthetic Strategies and Biocompatibility of Polymer Scaffolds for Biomedical Application, Volume 1" highlights the importance of biomaterials and their interaction with biological system. The need for the development of biomaterials as scaffold for tissue regeneration is driven by the increasing demands for materials that mimic functions of extracellular matrices of body tissues.This ebook covers the latest challenges on the biocompatibility of scaffold overtime after implantation and discusses the requirement of innovative technologies and strategies f

  11. Thermal properties of thermoplastic starch/synthetic polymer blends with potential biomedical applicability

    OpenAIRE

    Mano, J. F.; Koniarova, D.; Reis, R. L.

    2003-01-01

    Previous studies shown that thermoplastic blends of corn starch with some biodegradable synthetic polymers (poly(-caprolactone), cellulose acetate, poly(lactic acid) and ethylene-vinyl alcohol copolymer) have good potential to be used in a series of biomedical applications. In this work the thermal behavior of these structurally complex materials is investigated by differential scanning calorimetry (DSC) and by thermogravimetric analysis (TGA). In addition, Fourier-transform infrared (FTIR) s...

  12. Functionally Labeled Polymers And Nanoparticles : : Synthetic Strategies And In Vivo Analysis

    OpenAIRE

    Randolph, Lyndsay M.

    2014-01-01

    In the development of labeled polymers and polymeric nanoparticles for biomedical applications, one desires synthetic approaches that allow the most direct route to incorporate functional moieties. We contend the most desirable route is via the direct incorporation of functional groups during the polymerization process itself as monomers and/or chain transfer agents. In this work, we utilize ring-opening metathesis polymerization (ROMP) due to the high functional group tolerance of initiators...

  13. Radiation synthesis and characterization of network structure of natural/synthetic double-network superabsorbent polymers

    International Nuclear Information System (INIS)

    Complete text of publication follows. Superabsorbent polymers (SAPs) are moderately cross linked, 3-D, hydrophilic network polymers that can absorb and conserve considerable amounts of aqueous fluids even under certain heat or pressure. Because of the unique properties superior to conventional absorbents, SAPs have found potential application in many fields such as hygienic products, disposable diapers, horticulture, gel actuators, drug-delivery systems, as well as water-blocking tapes coal dewatering, water managing materials for the renewal of arid and desert environment, etc. In recent years, naturally available resources, such as polysaccharides have drawn considerable attention for the preparation of SAPs. Since the mechanical properties of polysaccharide based natural polymers are low, researchers have mostly focused on natural/synthetic polymer/monomer mixtures to obtain novel SAPs. The aim of this study is to synthesize and characterization of network structure of novel double-network (DN) hydrogels as a SAP. Hydrogels with high mechanical strength have been prepared by radiation induced polymerization and crosslink of acrylic acid sodium salt in the presence of natural polymer locust bean gum. Liquid retention capacities and absorbency under load (AUL) analysis of synthesized SAPs was performed at different temperatures in water and synthetic urine solution, in order to determine their SAP character. For the characterization of network structure of the semi-IPN hydrogels, the average molecular weight between cross links (Mc) were evaluated by using uniaxial compression and oscillatory dynamical mechanical analyses and the advantage and disadvantage of these two technique for the characterization of network structures were compared.

  14. Catechol-Functionalized Synthetic Polymer as a Dental Adhesive to Contaminated Dentin Surface for a Composite Restoration

    OpenAIRE

    Lee, Sang-Bae; González-Cabezas, Carlos; Kim, Kwang-mahn; Kim, Kyoung-Nam; Kuroda, Kenichi

    2015-01-01

    This study reports a synthetic polymer functionalized with catechol groups as dental adhesives. We hypothesize that a catechol-functionalized polymer functions as a dental adhesive for wet dentin surfaces, potentially eliminating the complications associated with saliva contamination. We prepared a random copolymer containing catechol and methoxyethyl groups in the side chains. The mechanical and adhesive properties of the polymer to dentin surface in the presence of water and salivary compon...

  15. Protein-polymer nano-machines. Towards synthetic control of biological processes

    Directory of Open Access Journals (Sweden)

    Alexander Cameron

    2004-09-01

    Full Text Available Abstract The exploitation of nature's machinery at length scales below the dimensions of a cell is an exciting challenge for biologists, chemists and physicists, while advances in our understanding of these biological motifs are now providing an opportunity to develop real single molecule devices for technological applications. Single molecule studies are already well advanced and biological molecular motors are being used to guide the design of nano-scale machines. However, controlling the specific functions of these devices in biological systems under changing conditions is difficult. In this review we describe the principles underlying the development of a molecular motor with numerous potential applications in nanotechnology and the use of specific synthetic polymers as prototypic molecular switches for control of the motor function. The molecular motor is a derivative of a TypeI Restriction-Modification (R-M enzyme and the synthetic polymer is drawn from the class of materials that exhibit a temperature-dependent phase transition. The potential exploitation of single molecules as functional devices has been heralded as the dawn of new era in biotechnology and medicine. It is not surprising, therefore, that the efforts of numerous multidisciplinary teams 12. have been focused in attempts to develop these systems. as machines capable of functioning at the low sub-micron and nanometre length-scales 3. However, one of the obstacles for the practical application of single molecule devices is the lack of functional control methods in biological media, under changing conditions. In this review we describe the conceptual basis for a molecular motor (a derivative of a TypeI Restriction-Modification enzyme with numerous potential applications in nanotechnology and the use of specific synthetic polymers as prototypic molecular switches for controlling the motor function 4.

  16. Mineralization of Synthetic Polymer Scaffolds: A Bottom-upApproach for the Development of Artificial Bone

    Energy Technology Data Exchange (ETDEWEB)

    Song, Jie; Viengkham, Malathong; Bertozzi, Carolyn R.

    2004-09-27

    The controlled integration of organic and inorganic components confers natural bone with superior mechanical properties. Bone biogenesis is thought to occur by templated mineralization of hard apatite crystals by an elastic protein scaffold, a process we sought to emulate with synthetic biomimetic hydrogel polymers. Crosslinked polymethacrylamide and polymethacrylate hydrogels were functionalized with mineral-binding ligands and used to template the formation of hydroxyapatite. Strong adhesion between the organic and inorganic materials was achieved for hydrogels functionalized with either carboxylate or hydroxy ligands. The mineral-nucleating potential of hydroxyl groups identified here broadens the design parameters for synthetic bone-like composites and suggests a potential role for hydroxylated collagen proteins in bone mineralization.

  17. A Comparison of Degradable Synthetic Polymer Fibers for Anterior Cruciate Ligament Reconstruction

    OpenAIRE

    Tovar, Nick; Bourke, Sharon; Jaffe, Michael; Murthy, N. Sanjeeva; Kohn, Joachim; Gatt, Charles; Dunn, Michael G.

    2010-01-01

    We compared mechanical properties, degradation rates, and cellular compatibilities of two synthetic polymer fibers potentially useful as ACL reconstruction scaffolds: poly(desaminotyrosyl-tyrosine dodecyl dodecanedioate)(12,10), p(DTD DD) and poly(L-lactic acid), PLLA. The yield stress of ethylene oxide (ETO) sterilized wet fibers was 150 ± 22 MPa and 87 ± 12 MPa for p(DTD DD) and PLLA, respectively, with moduli of 1.7 ± 0.1 MPa and 4.4 ± 0.43 MPa. Strength and molecular weight retention were...

  18. Synthesis And Characterisation Of Nano-Films Of Hydrolysable Synthetic Biodegradable Polymers

    Directory of Open Access Journals (Sweden)

    S.SRILALITHA, K.N.JAYAVEERA, S.S.MADHVENDHRA

    2013-05-01

    Full Text Available Biodegradation is the natural process by which organic chemicals in the environment are converted to simpler compounds, mineralized and redistributed through elemental cycles. Biodegradation can occur within the biosphere and micro organisms play a central role in the biodegradation process. A polymer material is called biodegradable if all its organic components undergo a total biodegradation. Hydrolysable polymers such as poly esters are often more prone to degradation but at the same time are often less suitable than hydrophobic polymers for many technical applications. Aliphatic homo polyesters such as poly (tetra methylene adipate (PTMA and block copolymers such as poly (ethylene succinate-b-poly (ethylene glycol (PES/PEG and poly (ethylene succinate-b-(tetra methylene glycol (PEG/PTMG have been synthesized and the materials obtained showed thermoplastic elastomer behavior. The synthetic hydrolysable poly anhydrides are useful to biomedical applications due to the fiber forming properties. The aliphatic polycarbonate is useful as a biodegradable polymer for medical applications which displays hydrolytic degradation.

  19. A calorimetric study of the kinetics and thermodynamics of the attack of synthetic fluorapatite by mixtures of sulfuric and phosphoric acids is undertaken at 25 deg. C

    International Nuclear Information System (INIS)

    A calorimetric study of the kinetics and thermodynamics of the attack of synthetic fluorapatite by mixtures of sulfuric and phosphoric acids is undertaken at 25 deg.. C. The global enthalpy of the attack equals -407.0 kJ/mol. Interpretation of the calorimeteric results by Avrami model shows the existence of two steps. The first is attributed to the dissolution of the solid, and the second to precipitation of gypsum. The deconvoluted curves were analysed iteratively to obtain the kinetic parameters and the enthalpy of precipitation. The later quantity does not differ from the experimental value by more than 2.3% and the reaction order equals 2 and 0.5 for calcium and sulphate ions respectively

  20. Calculating the vulnerability of synthetic polymers to autoignition during nuclear flash. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Hickman, R.; Reitter, T.

    1985-01-01

    The purpose of our investigation was to determine if the rapid progression of fire to flashover conditions in a furnished room, observed in a 1953 nuclear weapons test at the Nevada Test Site (the Encore Event), might be typical behavior rather than an aberration. If flashover under such conditions is indeed likely, this phenomenon is worth pursuing in view of the increased threat to buildings and human life from possible large-scale fires. We placed special emphasis on fires that occurred in modern rooms, i.e., ones furnished with upholstery and drapery materials made from synthetic polymers. Examination of photochemical processes showed them to be an unlikely explanation, either in Encore or in the future. Our calculation of rapid radiant-heating behavior of a few materials demonstrated that fabrics and fabric-covered foams would exceed their autoignition temperature when exposed to a 25-cal/cm/sup 2/ fluence from a 1-Mt air burst weapon. Because synthetic polymers have higher heating values and release heat faster during combustion than do the cellulosics used in the Encore experiment, early flashover should not be unexpected in contemporary households. However, the far-field thermal fluence required would be higher because of the absorption of thermal energy by windows and window coverings. Because of the complexity of the problem, carefully planned, full-scale experiments will be needed to finally answer the question. 39 refs., 9 figs., 8 tabs.

  1. Calculating the vulnerability of synthetic polymers to autoignition during nuclear flash. Final report

    International Nuclear Information System (INIS)

    The purpose of our investigation was to determine if the rapid progression of fire to flashover conditions in a furnished room, observed in a 1953 nuclear weapons test at the Nevada Test Site (the Encore Event), might be typical behavior rather than an aberration. If flashover under such conditions is indeed likely, this phenomenon is worth pursuing in view of the increased threat to buildings and human life from possible large-scale fires. We placed special emphasis on fires that occurred in modern rooms, i.e., ones furnished with upholstery and drapery materials made from synthetic polymers. Examination of photochemical processes showed them to be an unlikely explanation, either in Encore or in the future. Our calculation of rapid radiant-heating behavior of a few materials demonstrated that fabrics and fabric-covered foams would exceed their autoignition temperature when exposed to a 25-cal/cm2 fluence from a 1-Mt air burst weapon. Because synthetic polymers have higher heating values and release heat faster during combustion than do the cellulosics used in the Encore experiment, early flashover should not be unexpected in contemporary households. However, the far-field thermal fluence required would be higher because of the absorption of thermal energy by windows and window coverings. Because of the complexity of the problem, carefully planned, full-scale experiments will be needed to finally answer the question. 39 refs., 9 figs., 8 tabs

  2. Synthetic polymers are more effective than natural flocculants for the clarification of tobacco leaf extracts.

    Science.gov (United States)

    Buyel, Johannes F; Fischer, Rainer

    2015-02-10

    The use of synthetic polymers as flocculants can increase filter capacity and thus reduce the costs of downstream processing during the production of plant-derived biopharmaceutical proteins, but this may also attract regulatory scrutiny due to the potential toxicity of such compounds. Therefore, we investigated the efficacy of three non-toxic natural flocculants (chitosan, kaolin and polyphosphate) alone and in combination with each other or with a synthetic polymer (Polymin P) during the clarification of tobacco leaf extracts. We used a design-of-experiments approach to determine the impact of each combination on filter capacity. We found that Polymin P was most effective when used on its own but the natural flocculants were more effective when used in combination. The combination of chitosan and polyphosphate was the most effective natural flocculant, and this was identified as a potential replacement for Polymin P under neutral and acidic extraction conditions independent of the conductivity, even though the efficiency of flocculation was lower than for Polymin P. None of the tested flocculants reduced the concentration of total soluble protein in the feed stream or the recovery of the model fluorescent protein DsRed. PMID:25545028

  3. Compressive cyclic ratcheting and fatigue of synthetic, soft biomedical polymers in solution.

    Science.gov (United States)

    Miller, Andrew T; Safranski, David L; Smith, Kathryn E; Guldberg, Robert E; Gall, Ken

    2016-02-01

    The use of soft, synthetic materials for the replacement of soft, load-bearing tissues has been largely unsuccessful due to a lack of materials with sufficient fatigue and wear properties, as well as a lack of fundamental understanding on the relationship between material structure and behavior under cyclic loads. In this study, we investigated the response of several soft, biomedical polymers to cyclic compressive stresses under aqueous conditions and utilized dynamic mechanical analysis and differential scanning calorimetry to evaluate the role of thermo-mechanical transitions on such behavior. Studied materials include: polycarbonate urethane, polydimethylsiloxane, four acrylate copolymers with systematically varied thermo-mechanical transitions, as well as bovine meniscal tissue for comparison. Materials showed compressive moduli between 2.3 and 1900MPa, with polycarbonate urethane (27.3MPa) matching closest to meniscal tissue (37.0MPa), and also demonstrated a variety of thermo-mechanical transition behaviors. Cyclic testing resulted in distinct fatigue-life curves, with failure defined as either classic fatigue fracture or a defined increased in maximum strain due to ratcheting. Our study found that polymers with sufficient dissipation mechanisms at the testing temperature, as evidenced by tan delta values, were generally tougher than those with less dissipation and exhibited ratcheting rather than fatigue fracture much like meniscal tissue. Strain recovery tests indicated that, for some toughened polymers, the residual strain following our cyclic loading protocol could be fully recovered. The similarity in ratcheting behavior, and lack of fatigue fracture, between the meniscal tissue and toughened polymers indicates that such polymers may have potential as artificial soft tissue. PMID:26479427

  4. Radiation Synthesis and Characterization of Natural and Natural-Synthetic Hybrid Super Absorbent Polymers for Agricultural Applications. Chapter 19

    International Nuclear Information System (INIS)

    The experimental studies carried out in Hacettepe University, Laboratories of Radiation and Polymers Science (LRPS) in the past ten years, which focused mainly on the synthesis of synthetic and natural-synthetic super absorbent polymers in various irradiation conditions, are summarized in the first part of the presentation. Studies conducted on the following areas: (1) the controlled release of fertilizers and herbicides and the effect of the natural polymer type, (2) the neutralization degree of poly(acrylic acid), (3) the temperature and pressure on the swelling kinetics, and (4) the maximum water absorption capacity of the potential soil conditional hydrogels, were explained. The results were then compared with those obtained from commercial super absorbent polymers prepared through conventional techniques. In the third part of the presentation, basic and advanced techniques in the characterization of the network structure of super water absorbents were presented. (author)

  5. Biodegradability of PP/HMSPP and natural and synthetic polymers blends in function of gamma irradiation degradation

    Science.gov (United States)

    Cardoso, Elisabeth C. L.; Scagliusi, Sandra R.; Lima, Luis F. C. P.; Bueno, Nelson R.; Brant, Antonio J. C.; Parra, Duclerc F.; Lugão, Ademar B.

    2014-01-01

    Polymers are used for numerous applications in different industrial segments, generating enormous quantities of discarding in the environment. Polymeric materials composites account for an estimated from 20 to 30% total volume of solid waste. Polypropylene (PP) undergoes crosslinking and extensive main chain scissions when submitted to ionizing irradiation; as one of the most widely used linear hydrocarbon polymers, PP, made from cheap petrochemical feed stocks, shows easy processing leading it to a comprehensive list of finished products. Consequently, there is accumulation in the environment, at 25 million tons per year rate, since polymeric products are not easily consumed by microorganisms. PP polymers are very bio-resistant due to involvement of only carbon atoms in main chain with no hydrolysable functional group. Several possibilities have been considered to minimize the environmental impact caused by non-degradable plastics, subjecting them to: physical, chemical and biological degradation or combination of all these due to the presence of moisture, air, temperature, light, high energy radiation or microorganisms. There are three main classes of biodegradable polymers: synthetic polymers, natural polymers and blends of polymers in which one or more components are readily consumed by microorganisms. This work aims to biodegradability investigation of a PP/HMSPP (high melt strength polypropylene) blended with sugarcane bagasse, PHB (poly-hydroxy-butyrate) and PLA (poly-lactic acid), both synthetic polymers, at a 10% level, subjected to gamma radiation at 50, 100, 150 and 200 kGy doses. Characterization will comprise IR, DSC, TGA, OIT and Laboratory Soil Burial Test (LSBT).

  6. Natural and synthetic mineral silicates as functional nanoparticles in polymer composites

    Science.gov (United States)

    Shao, Hua

    A new strategy is described for the substantial enhancement of the barrier properties for both a thermoset epoxy polymer and a thermoplastic polyolefin by sandwiching a novel self-supported clay fabric film between thin polymer sheets. The success of this strategy is attributed to the high orientation of clay nanolayers in the paper-like clay fabric films and to the filling of the micro- or sub-micro sized voids between imperfectly tiled clay platelet edges by the polymer chains. Thermoplastic polyolefin-clay fabric film composites were fabricated by hot-pressing the clay films between two sheets of high density polyethylene (HDPE) films. The sandwiched composites exhibit more than a 30-fold decrease in O2 transmission rate with respect to the pure HDPE film. Impregnating the self-supported clay papers with epoxy pre-polymers successfully leads to thermoset composite films with more than 2-3 orders of magnitude reduction in O2 permeability in comparison to the pristine epoxy matrix. Owing to the promising use of synthetic Mg-saponite (denoted SAP) as epoxy polymer reinforcing agents, we investigated the cost-effective synthesis of SAP by replacing urea with sodium hydroxide as base source. Co-crystallization of new zeolite phases, such as garronite (denoted GIS) and cancrinite (denoted CAN), occurred along with SAP upon increasing the alkalinity of the reaction mixture. This finding represents the first example of the preparation of a CAN/SAP phase mixture. Moreover, pure-phase cancrinite with rod-like morphology up to several mum in length was synthesized under Mg-free conditions. Also, the Si/AI ratio within the synthesis gel has an influence on the chemical composition and textural properties of pure CAN crystals. Microporous cancrinite is a promising candidate for reinforcing epoxy polymers, considering that CAN represents a substantial fraction of the mixed CAN-SAP phase formed during the synthesis of saponite. Therefore, the reaction conditions (e

  7. Hemostatic potential of natural/synthetic polymer based hydrogels crosslinked by gamma radiation

    Science.gov (United States)

    Barba, Bin Jeremiah D.; Tranquilan-Aranilla, Charito; Abad, Lucille V.

    2016-01-01

    Various raw materials and hydrogels prepared from their combination were assessed for hemostatic capability using swine whole blood clotting analysis. Initial screening showed efficient coagulative properties from κ-carrageenan and its carboxymethylated form, and α-chitosan, even compared to commercial products like QuikClot Zeolite Powder. Blending natural and synthetic polymers formed into hydrogels using gamma radiation produced materials with improved properties. KC and CMKC hydrogels were found to have the lowest blood clotting index in granulated form and had the higher capacity for platelet adhesion in foamed form compared to GelFoam. Possible mechanisms involved in the evident thrombogenicity of the materials include adsorption of platelets and related proteins that aid in platelet activation (primary hemostasis), absorption of water to concentrate protein factors that control the coagulation cascade, contact activation by its negatively charged surface and the formation of gel-blood clots.

  8. Improving the Compatibility of Natural and Synthetic Polymer Blends by Radiation Treatments for Using in Practical Application

    International Nuclear Information System (INIS)

    Different polymer blends based on the natural polymers carboxymethyl cellulose (CMC) and sodium alginate as well as the synthetic polymers poly(ethylene glycol) (PEG), poly(ethylene oxide) (PEO) and poly acrylamide (PAM) were prepared by solution casting in the form of films. The common solvent used was water. The different blends prepared in this study were subjected to gamma radiation. The compatibility and structure-property behaviour of these blends was studied by differential scanning calorimetry (DSC), Fourier-Transform Infrared (FTIR) analysis, thermogravimetric analysis (TGA), scanning electron microscopy (SEM), and tensile mechanical testing before and after irradiation. In addition, the swelling properties of different polymer blends were studied at different conditions of temperature and ph. The controlled release characters of the different blends of different drugs were investigated. In addition, the different polymer blends were used for the removal of heavy metals and dyes waste.

  9. Desorption ElectroSpray Ionization - Orbitrap Mass Spectrometry of synthetic polymers and copolymers.

    Science.gov (United States)

    Friia, Manel; Legros, Véronique; Tortajada, Jeanine; Buchmann, William

    2012-08-01

    Desorption ElectroSpray Ionization (DESI) - Orbitrap Mass Spectrometry (MS) was evaluated as a new tool for the characterization of various industrial synthetic polymers (poly(ethylene glycol), poly(propylene glycol), poly(methylmethacrylate), poly(dimethylsiloxane)) and copolymers, with masses ranging from 500 g.mol(-1) up to more than 20 000 g.mol(-1) . Satisfying results in terms of signal stability and sensitivity were obtained from hydrophobic surfaces (HTC Prosolia) with a mixture water/methanol (10/90) as spray solvent in the presence of sodium salt. Taking into account the formation of multiplied charged species by DESI-MS, a strategy based on the use of a deconvolution software followed by the automatic assignment of the ions was described allowing the rapid determination of M(n) , M(w) and PDI values. DESI-Orbitrap MS results were compared to those obtained from matrix-assisted laser desorption/ionization- time-of-flight MS and gel permeation chromatography. An application of DESI-Orbitrap MS for the detection and identification of polymers directly from cosmetics was described. PMID:22899511

  10. Synthetic

    Directory of Open Access Journals (Sweden)

    Anna Maria Manferdini

    2010-06-01

    Full Text Available Traditionally materials have been associated with a series of physical properties that can be used as inputs to production and manufacturing. Recently we witnessed an interest in materials considered not only as ‘true matter’, but also as new breeds where geometry, texture, tooling and finish are able to provoke new sensations when they are applied to a substance. These artificial materials can be described as synthetic because they are the outcome of various qualities that are not necessarily true to the original matter, but they are the combination of two or more parts, whether by design or by natural processes. The aim of this paper is to investigate the potential of architectural surfaces to produce effects through the invention of new breeds of artificial matter, using micro-scale details derived from Nature as an inspiration.

  11. Biodegradability of PP/HMSPP and natural and synthetic polymers blends in function of gamma irradiation degradation

    International Nuclear Information System (INIS)

    Polymers are used for numerous applications in different industrial segments, generating enormous quantities of discarding in the environment. Polymeric materials composites account for an estimated from 20 to 30% total volume of solid waste. Polypropylene (PP) undergoes crosslinking and extensive main chain scissions when submitted to ionizing irradiation; as one of the most widely used linear hydrocarbon polymers, PP, made from cheap petrochemical feed stocks, shows easy processing leading it to a comprehensive list of finished products. Consequently, there is accumulation in the environment, at 25 million tons per year rate, since polymeric products are not easily consumed by microorganisms. PP polymers are very bio-resistant due to involvement of only carbon atoms in main chain with no hydrolysable functional group. Several possibilities have been considered to minimize the environmental impact caused by non-degradable plastics, subjecting them to: physical, chemical and biological degradation or combination of all these due to the presence of moisture, air, temperature, light, high energy radiation or microorganisms. There are three main classes of biodegradable polymers: synthetic polymers, natural polymers and blends of polymers in which one or more components are readily consumed by microorganisms. This work aims to biodegradability investigation of a PP/HMSPP (high melt strength polypropylene) blended with sugarcane bagasse, PHB (poly-hydroxy-butyrate) and PLA (poly-lactic acid), both synthetic polymers, at a 10% level, subjected to gamma radiation at 50, 100, 150 and 200 kGy doses. Characterization will comprise IR, DSC, TGA, OIT and Laboratory Soil Burial Test (LSBT). - Highlights: • Polymeric materials composites account for an estimated from 20 to 30% total volume of solid waste. • Landfills will not be enough for an estimated accumulation of 25 million tons per year of plastics. • Incorporation of natural/synthetic polymers in PP/HMSPP to reduce

  12. Directed evolution of artificial enzymes (XNAzymes) from diverse repertoires of synthetic genetic polymers.

    Science.gov (United States)

    Taylor, Alexander I; Holliger, Philipp

    2015-10-01

    This protocol describes the directed evolution of artificial endonuclease and ligase enzymes composed of synthetic genetic polymers (XNAzymes), using 'cross-chemistry selective enrichment by exponential amplification' (X-SELEX). The protocol is analogous to (deoxy)ribozyme selections, but it enables the development of fully substituted catalysts. X-SELEX is initiated by the synthesis of diverse repertoires (here 10(14) different sequences), using xeno nucleic acid (XNA) polymerases, on DNA templates primed with DNA, RNA or XNA oligonucleotides that double as substrates, allowing selection for XNA-catalyzed cleavage or ligation. XNAzymes are reverse-transcribed into cDNA using XNA-dependent DNA polymerases, and then PCR-amplified to generate templates for subsequent rounds or deep sequencing. We describe methods developed for four XNA chemistries, arabino nucleic acids (ANAs), 2'-fluoroarabino nucleic acids (FANAs), hexitol nucleic acids (HNAs) and cyclohexene nucleic acids (CeNAs), which require ∼1 week per round, and typically 10-20 rounds; in principle, these methods are scalable and applicable to a wide range of novel XNAzyme chemistries, substrates and reactions. PMID:26401917

  13. Prompt response and durability of polymer ablation from synthetic fibers irradiated by thermal plasmas for arc resistant clothes

    International Nuclear Information System (INIS)

    Interactions between thermal plasmas and synthetic fibers such as polyamide, polyester, phenol and aramid were investigated by thermal plasma irradiation technique. Understanding the above interactions is crucial to design effective flame retardant synthetic fiber clothes with arc resistance to protect a human from arc flash accidents. To investigate the interactions, an Ar inductively coupled thermal plasma (ICTP) was used instead of the arc discharge because the ICTP has high controllability and no contamination. The ICTP irradiation raises polymer ablation in case of polyamide and polyester. Two features of the polymer ablation such as prompt response and durability were fundamentally investigated from viewpoint of shielding the heat flux. It was found that polyamide fiber has both a high prompt response and a long durability.

  14. Synthetic molecular machines and polymer/monomer size switches that operate through dynamic and non-dynamic covalent changes.

    Science.gov (United States)

    Stadler, Adrian-Mihail; Ramírez, Juan

    2012-01-01

    The present chapter is focused on how synthetic molecular machines (e.g. shuttles, switches and molecular motors) and size switches (conversions between polymers and their units, i.e., conversions between relatively large and small molecules) can function through covalent changes. Amongst the interesting examples of devices herein presented are molecular motors and size switches based on dynamic covalent chemistry which is an area of constitutional dynamic chemistry. PMID:22169959

  15. Tissue engineered esophagus scaffold constructed with porcine small intestinal submucosa and synthetic polymers.

    Science.gov (United States)

    Fan, Mei-Rong; Gong, Mei; Da, Lin-Cui; Bai, Lin; Li, Xiu-Qun; Chen, Ke-Fei; Li-Ling, Jesse; Yang, Zhi-Ming; Xie, Hui-Qi

    2014-02-01

    Acellular porcine small intestinal submucosa (SIS) has been successfully used for reconstructing esophagus with half circumferential defects. However, repairing full circumferential esophageal defects with SIS has been restricted due to the latter's poor mechanical properties. In the present study, synthetic polyesters biomaterial poly(3-hydroxybutyrate-co-3-hydroxyhexanoate) (PHBHHx) and poly(lactide-co-glycolide) (PLGA) have been used to improve the mechanical properties of SIS. Feasibility of SIS/PHBHHx-PLGA composite material scaffold for esophageal tissue engineering has been assessed through a series of testing. The appropriate mixing ratio of PHBHHx and PLGA polymers has been determined as 5:5 by mechanical testing and in vitro degradation experiment. The morphology of constructed membranous and tubular scaffolds was also characterized. As confirmed by enzyme-linked immunosorbent assay, the contents of VEGF and TGF-β have respectively reached 657 ± 18 ng mL(-1) and 130 ± 4 pg mL(-1) within the SIS/PHBHHx-PLGA specimens. Biocompatibility of the SIS/PHBHHx-PLGA specimens with rat bone marrow mesenchymal stem cells (MSCs) was also evaluated by scanning electron microscopy and a live-dead cell viability assay. Actin filaments of MSCs on the composite materials were labeled. Biological safety of the extract from SIS/PHBHHx-PLGA specimens, measured as hemolysis rate, was all lower than 5%. Compared with SIS and SIS/PHBHHx-PLGA specimens, inflammatory reaction provoked by the PHBHHx-PLGA specimens in rats was however more severe. Our results have suggested that SIS/PHBHHx-PLGA composite material can offer a new approach for esophageal tissue engineering. PMID:24457267

  16. Tissue engineered esophagus scaffold constructed with porcine small intestinal submucosa and synthetic polymers

    International Nuclear Information System (INIS)

    Acellular porcine small intestinal submucosa (SIS) has been successfully used for reconstructing esophagus with half circumferential defects. However, repairing full circumferential esophageal defects with SIS has been restricted due to the latter's poor mechanical properties. In the present study, synthetic polyesters biomaterial poly(3-hydroxybutyrate-co-3-hydroxyhexanoate) (PHBHHx) and poly(lactide-co-glycolide) (PLGA) have been used to improve the mechanical properties of SIS. Feasibility of SIS/PHBHHx-PLGA composite material scaffold for esophageal tissue engineering has been assessed through a series of testing. The appropriate mixing ratio of PHBHHx and PLGA polymers has been determined as 5:5 by mechanical testing and in vitro degradation experiment. The morphology of constructed membranous and tubular scaffolds was also characterized. As confirmed by enzyme-linked immunosorbent assay, the contents of VEGF and TGF-β have respectively reached 657 ± 18 ng mL−1 and 130 ± 4 pg mL−1 within the SIS/PHBHHx-PLGA specimens. Biocompatibility of the SIS/PHBHHx-PLGA specimens with rat bone marrow mesenchymal stem cells (MSCs) was also evaluated by scanning electron microscopy and a live–dead cell viability assay. Actin filaments of MSCs on the composite materials were labeled. Biological safety of the extract from SIS/PHBHHx-PLGA specimens, measured as hemolysis rate, was all lower than 5%. Compared with SIS and SIS/PHBHHx-PLGA specimens, inflammatory reaction provoked by the PHBHHx-PLGA specimens in rats was however more severe. Our results have suggested that SIS/PHBHHx-PLGA composite material can offer a new approach for esophageal tissue engineering. (paper)

  17. Synthetic Cathinones ("Bath Salts")

    Science.gov (United States)

    ... they are not increased sociability increased sex drive panic attacks excited delirium —extreme agitation and violent behavior What ... nosebleeds paranoia increased sociability increased sex drive hallucinations panic attacks Intoxication from synthetic cathinones has resulted in death. ...

  18. Synthetic polymers in the marine environment: a rapidly increasing, long-term threat.

    Science.gov (United States)

    Moore, Charles James

    2008-10-01

    Synthetic polymers, commonly known as plastics, have been entering the marine environment in quantities paralleling their level of production over the last half century. However, in the last two decades of the 20th Century, the deposition rate accelerated past the rate of production, and plastics are now one of the most common and persistent pollutants in ocean waters and beaches worldwide. Thirty years ago the prevailing attitude of the plastic industry was that "plastic litter is a very small proportion of all litter and causes no harm to the environment except as an eyesore" [Derraik, J.G.B., 2002. The pollution of the marine environment by plastic debris: a review. Mar. Pollut. Bull. 44(9), 842-852]. Between 1960 and 2000, the world production of plastic resins increased 25-fold, while recovery of the material remained below 5%. Between 1970 and 2003, plastics became the fastest growing segment of the US municipal waste stream, increasing nine-fold, and marine litter is now 60-80% plastic, reaching 90-95% in some areas. While undoubtedly still an eyesore, plastic debris today is having significant harmful effects on marine biota. Albatross, fulmars, shearwaters and petrels mistake floating plastics for food, and many individuals of these species are affected; in fact, 44% of all seabird species are known to ingest plastic. Sea turtles ingest plastic bags, fishing line and other plastics, as do 26 species of cetaceans. In all, 267 species of marine organisms worldwide are known to have been affected by plastic debris, a number that will increase as smaller organisms are assessed. The number of fish, birds, and mammals that succumb each year to derelict fishing nets and lines in which they become entangled cannot be reliably known; but estimates are in the millions. We divide marine plastic debris into two categories: macro, >5 mm and micro, marine biota are being directly investigated, since it was found 20 years ago that the mass of ingested plastic in Great

  19. Understanding the folding process of synthetic polymers by small-molecule folding agents

    Indian Academy of Sciences (India)

    S G Ramkumar; S Ramakrishnan

    2008-01-01

    Two acceptor containing polyimides PDI and NDI carrying pyromellitic diimide units and 1,4,5,8-naphthalene tetracarboxy diimide units, respectively, along with hexa(oxyethylene) (EO6) segments as linkers, were prepared from the corresponding dianhydrides and diamines. These polyimides were made to fold by interaction with specifically designed folding agents containing a dialkoxynaphthalene (DAN) donor linked to a carboxylic acid group. The alkali-metal counter-ion of the donor carboxylic acid upon complexation with the EO6 segment brings the DAN unit in the right location to induce a charge-transfer complex formation with acceptor units in the polymer backbone. This two-point interaction between the folding agent and the polymer backbone leads to a folding of the polymer chain, which was readily monitored by NMR titrations. The effect of various parameters, such as structures of the folding agent and polymer, and the solvent composition, on the folding propensities of the polymer was studied.

  20. Use of Synthetic Polymers in Nuclear Emulsions for Fast-Neutron Dosimetry

    International Nuclear Information System (INIS)

    The paper describes the results of tests on the properties of hydrogen-enriched nuclear-track emulsions for detecting fast neutrons, which were prepared in the Radiological Dosimetry Laboratory of the Czechoslovak Academy of Sciences Nuclear Research Institute. It also compares the dosimetric characteristics of these new emulsions with those of the gelatin emulsions used up to the present. The most promising of the series of polymers synthesized in the laboratory were: (1) Polyvinylacetal of 2,4-disulphonic acid benzaldehyde (polymer No. 1); (2) The co-polymer of a-acetylaminoacrylic acid and N-vinylpyrrolidone (polymer No. 2). The author also studied the possibility of using polyvinyl alcohol solutions with a higher hydrogen content than the above polymers for saturating polymer-gelatin emulsions and for preparing from them films for use as proton radiators. Polymers No. 1 and No. 2 were tested beforehand in an ammonia emulsion. It was established that polymer No. 1 has no marked effect on the photochemical properties of the emulsions, whereas the physical and mechanical.properties of the polymer-gelatin emulsions are considerably better than those of normal gelatin emulsions. The polymers have good protective properties, and polymer No. 2; can be used even during physical ageing, since it retards this process only to a small extent. The photochemical properties of the polymer-gelatin emulsions remain practically unchanged during natural ageing, and their mechanical strength is still further increased. After these preliminary tests, polymers No.-1 and No. 2 were used as fillers for a nuclear-track emulsion, in quantities ranging from 50 to 70% of the total amount of protective colloid, the silver content of the emulsion remaining unchanged. To increase their efficiency further, the polymer-gelatin emulsions were saturated with hydrogen, which was passed through the liquid emulsion for a short period of time. When prepared, the emulsions were poured on a tri

  1. Synthetic Polymer Hybridization with DNA and RNA Directs Nanoparticle Loading, Silencing Delivery, and Aptamer Function.

    Science.gov (United States)

    Zhou, Zhun; Xia, Xin; Bong, Dennis

    2015-07-22

    We report herein discrete triplex hybridization of DNA and RNA with polyacrylates. Length-monodisperse triazine-derivatized polymers were prepared on gram-scale by reversible addition-fragmentation chain-transfer polymerization. Despite stereoregio backbone heterogeneity, the triazine polymers bind T/U-rich DNA or RNA with nanomolar affinity upon mixing in a 1:1 ratio, as judged by thermal melts, circular dichroism, gel-shift assays, and fluorescence quenching. We call these polyacrylates "bifacial polymer nucleic acids" (bPoNAs). Nucleic acid hybridization with bPoNA enables DNA loading onto polymer nanoparticles, siRNA silencing delivery, and can further serve as an allosteric trigger of RNA aptamer function. Thus, bPoNAs can serve as tools for both non-covalent bioconjugation and structure-function nucleation. It is anticipated that bPoNAs will have utility in both bio- and nanotechnology. PMID:26138550

  2. Panic Attack or Heart Attack?

    Science.gov (United States)

    Panic Attack or Heart Attack? Diagnosing heart disease in women A Healthy Hearts Guide ® Heart disease in women is often mistaken for panic attack with shortness of breath, anxiety, palpitations and indigestion. ...

  3. Synthetic Polymer Hybridization with DNA and RNA Directs Nanoparticle Loading, Silencing Delivery, and Aptamer Function

    OpenAIRE

    Zhou, Zhun; Xia, Xin; Bong, Dennis

    2015-01-01

    We report herein discrete triplex hybridization of DNA and RNA with polyacrylates. Length-monodisperse triazine-derivatized polymers were prepared on gram-scale by reversible addition–fragmentation chain-transfer polymerization. Despite stereoregio backbone heterogeneity, the triazine polymers bind T/U-rich DNA or RNA with nanomolar affinity upon mixing in a 1:1 ratio, as judged by thermal melts, circular dichroism, gel-shift assays, and fluorescence quenching. We call these polyacrylates “bi...

  4. Research on the structure in solution of optically active synthetic polymers (propylene polysulphide, propylene polyoxide, tertio-butyl polysulphide)

    International Nuclear Information System (INIS)

    It was proposed to study the structure of sulphur-containing synthetic polymers, stereo-regular, optically active in solution and able to adopt a spiral conformation, with special reference to propylene polysulphide. Two methods were used, the first mathematical (conformational energy calculations) and the second physico-chemical, essentially spectroscopic. By conformational analysis it is possible to choose the most probable structures liable to be adopted by a given polymer in solution while the spectro-polarimetric study should, in principle, invalidate or confirm certain of these hypotheses. The conformational energy calculations showed that in fact there is no energy conformation low enough to be stable in solution. Strictly speaking however we can refer to a region of stability in which steric hindrance is low and many energy minima exist. These minima are indistinguishable both by their energy values and by their spatial localizations and are all enclosed in the region bounded by the barriers due to steric hindrance. This uncertainty does not arise from approximations made in the calculations, but from the multitude of stereochemical structure possible. Investigations into the variation of the optical rotary dispersion and the circular dichroism as a function of temperature indicated the existence of three or more equilibrium states in the dioxane. The spectra appear to be the summation of the optical activities of the numerous simultaneously possible conformations. It appears that polymers, such as propylene polysulphide or propylene polyoxide do not have stable structures in solution. These are molecules of great flexibility possessing a large number of degrees of freedom. These properties distinguish them from the natural polymers, carrying precise information, such as DNA which must consequently have stable conformations. (author)

  5. Copyrolysis of wood biomass and synthetic polymers mixtures. Part 2. Characterisation of the liquid phases

    Energy Technology Data Exchange (ETDEWEB)

    Marin, N.; Collura, S.; Weber, J.V. [Laboratoire de Chimie et Applications, Universite de Metz, IUT, rue Victor Demange, 57500 Saint Avold (France); Sharypov, V.I.; Beregovtsova, N.G.; Baryshnikov, S.V.; Kutnetzov, B.N. [Institute of Chemistry and Chemical Technology SB RAS, Academgorodok, 660049 Krasnoyarsk (Russia); Cebolla, V. [Instituto de Carboquimica, CSIC, Zaragoza (Spain)

    2002-10-01

    The copyrolysis of wood biomass-polyolefins was carried out in a rotating autoclave. At 400C, more than 50% (in mass) of final products are found in the liquid phase for a 1:1 (in mass) mixture. The obtained liquids are separated in a distillable liquids fraction and in an extracted liquids fraction. The first fraction can be fully characterised by gas chromatography/mass spectrometry. Only olefins, paraffins and some aromatics (benzene, toluene and xylene), issued from the polymers, are found in this fraction. The origin of the polymer plays the most important role in the chemical composition of this fraction. Some interactions with the solid issued from thermal degradation of the biomass are evidenced, for example by the presence of 2-alkenes with 3n carbon atoms. In the heavy liquids fraction, more than 80% (in mass) of the products are heavy olefins or paraffins. Schematically, we can explain the results of the copyrolysis experiments by: the biomass, whatever its origin, leads to solid, water and gas; polymer leads to liquid and gaseous olefins and paraffins; at a temperature lower than 400C, the biomass reacts and during the pyrolysis at 400C the formed solid evolves to act as a radical donor; assisted by radicals from biomass, polymer chain scission leads to the production of the light liquids; if the presence of biomass has an influence on the chemical composition of final products (particularly the light liquids fraction) their origin has, in general, only a limited effect.

  6. Vascular smooth muscle cells in cultures on synthetic polymers with adhesive microdomains

    Czech Academy of Sciences Publication Activity Database

    Pařízek, Martin; Bačáková, Lucie; Lisá, Věra; Kubová, O.; Švorčík, V.; Heitz, J.

    2006-01-01

    Roč. 9, č. 58-60 (2006), s. 7-10. ISSN 1429-7248 R&D Projects: GA AV ČR(CZ) IAA5011301 Institutional research plan: CEZ:AV0Z50110509 Keywords : smooth muscle cells * microdomain * polymer Subject RIV: EI - Biotechnology ; Bionics

  7. Magnetic polymer beads: Recent trends and developments in synthetic design and applications

    KAUST Repository

    Philippova, Olga

    2011-04-01

    The paper describes the synthesis, properties and applications of magnetic polymer beads. State-of-the-art, future challenges, and promising trends in this field are analyzed. New applications in oil recovery are described. © 2010 Elsevier Ltd. All rights reserved.

  8. Polymer adhesion at surfaces: biological adhesive proteins and their synthetic mimics

    Science.gov (United States)

    Messersmith, Phillip

    2008-03-01

    Mussels are famous for their ability to permanently adhere to a wide variety of wet surfaces, such as rocks, metal and polymer ship hulls, and wood structures. They accomplish this through specialized proteins collectively referred to as mussel adhesive proteins (MAPs). The biophysical aspects of MAP adhesion is being revealed through the use of single molecule force measurements. The results provide insight into the adhesive roles of key amino acids found in these proteins, including the magnitude of adhesive forces, cooperative effects, and their self-healing properties. This molecular-level information is being incorporated into designs of biomimetic polymer coatings for a variety of applications. Our biomimetic approach to polymer design will be illustrated by a few examples where adhesive constituents found in MAPs are exploited to make wet-adhesive polymer coatings. In addition, small molecule analogs of MAPs can be used to apply thin functional films onto virtually any material surface using a facile approach. These coatings have a variety of potential uses in microelectronics, water treatment, prevention of environmental biofouling, and for control of biointerfacial phenomena at the surfaces of medical/diagnostic devices.

  9. Biodegradable Polymers

    OpenAIRE

    Isabelle Vroman; Lan Tighzert

    2013-01-01

    Biodegradable materials are used in packaging, agriculture, medicine and other areas. In recent years there has been an increase in interest in biodegradable polymers. Two classes of biodegradable polymers can be distinguished: synthetic or natural polymers. There are polymers produced from feedstocks derived either from petroleum resources (non renewable resources) or from biological resources (renewable resources). In general natural polymers offer fewer advantages than synthetic polymers. ...

  10. Co-pyrolysis of wood biomass and synthetic polymers mixtures. Part 3. Characterisation of heavy products

    Energy Technology Data Exchange (ETDEWEB)

    Sharypov, V.I.; Beregovtsova, N.G.; Kuznetsov, B.N. [Institute of Chemistry and Chemical Technology SB RAS, K. Marx str., 42, Krasnoyarsk 660049 (Russian Federation); Membrado, L.; Cebolla, V.L. [Instituto de Carboquimica, CSIC, Zaragoza (Spain); Marin, N.; Weber, J.V. [Laboratoire de Chimie et Applications, Universite de Metz, IUT, rue V. Demange, 57500 Saint-Avold (France)

    2003-05-01

    The chemical composition of heavy liquids (b.p.>180C) obtained by co-pyrolysis of polyolefins/wood biomass mixtures in autoclave conditions under inert atmosphere was investigated by FTIR, {sup 1}H NMR, GC-MS, high performance TLC combined with densitometry techniques. The preliminary separation of heavy liquids into different fractions by open LC and TLC methods had been used. Some perspectives of polymer and biomass thermal conversion during co-pyrolysis process were discussed.

  11. PECTIN MICROGELS CONTAINING SYNTHETIC POLYMERS BASED ON NANOCAPSULES FOR THE CONTROLLED RELEASE OF INDOMETHACIN

    OpenAIRE

    Mihaela HOLBAN; Folescu, Elena; Liliana SACHELARIE; Paula MERLUȘCĂ; Adina Simona ROTARU(BÎRGĂOANU); Mihaela VASILIU; Laura DÂRȚU

    2015-01-01

    Nanocapsule-based Eudragit RS100 and Eudragit E100 containing indomethacin have been prepared. The nanosuspensions have been included into pectin microgels of different polysaccharide concentrations, 28-61 µm-ranged polymer microgels with size and size polydispersity highly depending on the pectin amount being thus obtained. Study of the drug release revealed that indomethacin was released at a slower and more controlled rate from the microgels containing nanocapsules than from the empty pect...

  12. DNA Separation by Capillary Electrophoresis with Ultraviolet Detection using Mixed Synthetic Polymers

    Institute of Scientific and Technical Information of China (English)

    Qian WANG; Xu XU

    2003-01-01

    The mixtures of two polymers, poly (N,N-dimethylacrylamide) (PDMA) and polyvinylpyrrolidone (PVP) were synthesized and used as the separation medium for double-stranded and single-stranded DNA fragments by capillary electrophoresis with UV detector. On optimal conditions, 2%w/v PDMA ( 2%w/v PVP can be used to separate the doublet 123/124bp in pBR322/Hae III Markers.

  13. iBodies: Modular Synthetic Antibody Mimetics Based on Hydrophilic Polymers Decorated with Functional Moieties

    Czech Academy of Sciences Publication Activity Database

    Šácha, Pavel; Knedlík, Tomáš; Schimer, Jiří; Tykvart, Jan; Parolek, Jan; Navrátil, Václav; Dvořáková, Petra; Sedlák, František; Ulbrich, Karel; Strohalm, Jiří; Majer, Pavel; Šubr, Vladimír; Konvalinka, Jan

    2016-01-01

    Roč. 55, č. 7 (2016), s. 2356-2360. ISSN 1433-7851 R&D Projects: GA ČR GBP208/12/G016; GA MŠk LO1302 Institutional support: RVO:61388963 ; RVO:61389013 Keywords : antibody mimetics * HPMA * molecular recognition * polymer conjugates * protein targeting Subject RIV: CE - Biochemistry Impact factor: 11.261, year: 2014 http://onlinelibrary.wiley.com/doi/10.1002/anie.201508642/full

  14. Development of partially biodegradable foams from PP/HMSPP blends with natural and synthetic polymers

    International Nuclear Information System (INIS)

    Polymers are used in various application and in different industrial areas providing enormous quantities of wastes in environment. Among diverse components of residues in landfills are polymeric materials, including Polypropylene, which contribute with 20 to 30% of total volume of solid residues. As polymeric materials are immune to microbial degradation, they remain in soil and in landfills as a semi-permanent residue. Environmental concerning in litter reduction is being directed to renewable polymers development for manufacturing of polymeric foams. Foamed polymers are considered future materials, with a wide range of applications; high density structural foams are specially used in civil construction, in replacement of metal, woods and concrete with a final purpose of reducing materials costs. At present development, it was possible the incorporation of PP/HMSPP polymeric matrix blends with sugarcane bagasse, PHB and PLA, in structural foams production. Thermal degradation at 100, 120 and 160 deg C temperatures was not enough to induce biodegradability. Gamma irradiation degradation, at 50, 100, 200 and 500 kGy showed effective for biodegradability induction. Irradiated bagasse blends suffered surface erosion, in favor of water uptake and consequently, a higher biodegradation in bulk structure. (author)

  15. Thermally controlled permeation of ionic molecules through synthetic nanopores functionalized with amine-terminated polymer brushes

    Science.gov (United States)

    Nasir, Saima; Ali, Mubarak; Ensinger, Wolfgang

    2012-06-01

    We present temperature-dependent ionic transport through an array of nanopores (cylindrical and conical) and a single conical nanopore functionalized with amine-terminated poly(N-isopropylacrylamide) [PNIPAAM-NH2] brushes. For this purpose, nanopores are fabricated in heavy ion irradiated polyethylene terephthlate (PET) membranes by a controlled chemical track-etching technique, which leads to the generation of carboxyl (COOH) groups on the pore surface. End-functionalized polymer chains are immobilized onto the inner pore walls via a ‘grafting-to’ approach through the covalent linkage of surface COOH moieties with the terminal amine groups of the PNIPAAM molecules by using carbodiimide coupling chemistry. The success of the chemical modification reaction is corroborated by measuring the permeation flux of charged analytes across the multipore membranes in an aqueous solution, and for the case of single conical pore by measuring the current-voltage (I-V) characteristics, which are dictated by the electrostatic interaction of the charged pore surface with the mobile ions in an electrolyte solution. The effective nanopore diameter is tuned by manipulating the environmental temperature due to the swelling/shrinking behaviour of polymer brushes attached to the inner nanopore walls, leading to a decrease/increase in the ionic transport across the membrane. This process should permit the thermal gating and controlled release of ionic drug molecules through the nanopores modified with thermoresponsive polymer chains across the membrane.

  16. Thermally controlled permeation of ionic molecules through synthetic nanopores functionalized with amine-terminated polymer brushes

    International Nuclear Information System (INIS)

    We present temperature-dependent ionic transport through an array of nanopores (cylindrical and conical) and a single conical nanopore functionalized with amine-terminated poly(N-isopropylacrylamide) [PNIPAAM-NH2] brushes. For this purpose, nanopores are fabricated in heavy ion irradiated polyethylene terephthlate (PET) membranes by a controlled chemical track-etching technique, which leads to the generation of carboxyl (COOH) groups on the pore surface. End-functionalized polymer chains are immobilized onto the inner pore walls via a ‘grafting-to’ approach through the covalent linkage of surface COOH moieties with the terminal amine groups of the PNIPAAM molecules by using carbodiimide coupling chemistry. The success of the chemical modification reaction is corroborated by measuring the permeation flux of charged analytes across the multipore membranes in an aqueous solution, and for the case of single conical pore by measuring the current–voltage (I–V) characteristics, which are dictated by the electrostatic interaction of the charged pore surface with the mobile ions in an electrolyte solution. The effective nanopore diameter is tuned by manipulating the environmental temperature due to the swelling/shrinking behaviour of polymer brushes attached to the inner nanopore walls, leading to a decrease/increase in the ionic transport across the membrane. This process should permit the thermal gating and controlled release of ionic drug molecules through the nanopores modified with thermoresponsive polymer chains across the membrane. (paper)

  17. Porous organic polymers with anchored aldehydes: A new platform for post-synthetic amine functionalization en route for enhanced CO2 adsorption properties

    KAUST Repository

    Guillerm, Vincent

    2014-01-01

    A novel porous organic polymer has been synthesized using the molecular building block approach to deliberately encompass aldehyde functionalities amenable to post functionalization. The resultant porous framework allows a facile, one-step quantitative and post-synthetic functionalization by amines, permitting enhanced CO2 sorption properties. © 2014 The Royal Society of Chemistry.

  18. Inhibition of mild steel corrosion in acidic medium using synthetic and naturally occurring polymers and synergistic halide additives

    Energy Technology Data Exchange (ETDEWEB)

    Umoren, S.A. [Department of Chemistry, Faculty of Science, University of Uyo, P.M.B 1017 Uyo (Nigeria)], E-mail: saviourumoren@yahoo.com; Ogbobe, O.; Igwe, I.O. [Department of Polymer and Textile Engineering, School of Engineering and Engineering Technology, Federal University of Technology, P.M.B. 1526 Owerri (Nigeria); Ebenso, E.E. [Department of Chemistry and Chemical Technology, National University of Lesotho, P. O. Roma180, Lesotho (South Africa)

    2008-07-15

    The corrosion inhibition of mild steel in H{sub 2}SO{sub 4} in the presence of gum arabic (GA) (naturally occurring polymer) and polyethylene glycol (PEG) (synthetic polymer) was studied using weight loss, hydrogen evolution and thermometric methods at 30-60 deg. C. PEG was found to be a better inhibitor for mild steel corrosion in acidic medium than GA. The effect of addition of halides (KCl, KBr and KI) was also studied. Results obtained showed that inhibition efficiency (I%) increased with increase in GA and PEG concentration, addition of halides and with increase in temperature. Increase in inhibition efficiency (I%) and degree of surface coverage ({theta}) was found to follow the trend Cl{sup -} < Br{sup -} < I{sup -} which indicates that the radii and electronegativity of the halide ions play a significant role in the adsorption process. GA and PEG alone and in combination with halides were found to obey Temkin adsorption isotherm. Phenomenon of chemical adsorption is proposed from the trend of inhibition efficiency with temperature and values {delta}G{sub ads}{sup 0} obtained. The synergism parameter, S{sub I} evaluated is found to be greater than unity indicating that the enhanced inhibition efficiency caused by the addition of halides is only due to synergism.

  19. Synthetic approaches towards new polymer systems by the combination of living carbocationic and anionic polymerizations

    DEFF Research Database (Denmark)

    Feldthusen, Jesper; Ivan, Bela; Muller, Axel. H.E.; Kops, Jørgen

    1996-01-01

    Recent efforts to obtain block copolymers by combination of living carbocationic and anionic polymerizations are presented.When tolyl-ended polyisobutylene was used as macroinitiator of anionic polymerization of methacrylate derivatives mixtures of homopolymers and block copolymers were formed due...... to incomplete lithiation of this chain end.In another approach a new functionalization method was developed by end-quenching living polyisobutylene with 1,1-diphenylethylene. After transformation of the groups into 2,2-diphenylvinyl end groups and lithiation polymers were synthesized from protected...

  20. PECTIN MICROGELS CONTAINING SYNTHETIC POLYMERS BASED ON NANOCAPSULES FOR THE CONTROLLED RELEASE OF INDOMETHACIN

    Directory of Open Access Journals (Sweden)

    Mihaela HOLBAN

    2015-12-01

    Full Text Available Nanocapsule-based Eudragit RS100 and Eudragit E100 containing indomethacin have been prepared. The nanosuspensions have been included into pectin microgels of different polysaccharide concentrations, 28-61 µm-ranged polymer microgels with size and size polydispersity highly depending on the pectin amount being thus obtained. Study of the drug release revealed that indomethacin was released at a slower and more controlled rate from the microgels containing nanocapsules than from the empty pectin microgels. Also, the rate of released indomethacin increased with the augmentation of pectin amount into the microgels.

  1. Poly (ether ether ketone) derivatives: Synthetic route and characterization of nitrated and sulfonated polymers

    Energy Technology Data Exchange (ETDEWEB)

    Conceicao, T.F.; Bertolino, J.R. [Grupo de Estudo em Materiais Polimericos-Departamento de Quimica, Universidade Federal de Santa Catarina, Florianopolis, SC (Brazil); Barra, G.M.O. [Departamento de Engenharia Mecanica, Universidade Federal de Santa Catarina, Florianopolis, SC (Brazil); Pires, A.T.N. [Grupo de Estudo em Materiais Polimericos-Departamento de Quimica, Universidade Federal de Santa Catarina, Florianopolis, SC (Brazil)], E-mail: alfredotiburcio@pq.cnpq.br

    2009-03-01

    Nitrated and sulfonated poly (ether ether ketone) [SNPEEK] samples were prepared through sulfonation of nitrated PEEK (NPEEK) at different temperatures resulting in polymers with distinct sulfonation degrees (SD). The sulfonation occurred preferentially in the hydroquinone segment even after 81% of this moiety had been nitrated. Sulfonation in the benzophenone moiety was achieved only in 16% of this segment at the reaction temperature of 80 deg. C. The substitution degree was obtained through the TG curves, and values were in agreement with {sup 1}H NMR data when SD is much higher as ND (nitration degree). The highest SD obtained was 72%. Membranes of the sulfonated and nitrated PEEK (SNPEEK) were prepared by casting and showed good ductility depending on the substitution degree, with proton conductivity in the order of 10{sup -2} S cm{sup -1}, an important characteristic in some applications, such as in fuel cells.

  2. Synthetic Methodology for the Fabrication of Porous Porphyrin Materials with Metal-Organic-Polymer Aerogels.

    Science.gov (United States)

    Zhao, Xin; Yuan, Lin; Zhang, Zeng-Qi; Wang, Yong-Song; Yu, Qiong; Li, Jun

    2016-06-01

    A promising fabrication strategy used for designing porous porphyrin materials and a group of rigid carboxyl porphyrins based metal-organic-polymer aerogels (MOPAs) has been proposed recently. These newly synthesized MOPAs were exemplarily characterized by FT-IR, UV-vis-DRS, EDS, PXRD, TGA, SEM, TEM, and gas sorption measurements. A gelation study has shown that solvents, molar ratio, temperature, and peripheral carboxyl number in porphyrins all affect gel generation. The MOPA series exhibit eminent thermal stability, high removal efficiency in dye adsorption, versatile morphologies, and permanent tunable porosity; also the BET surface areas fall within the range 249-779 m(2) g(-1). All of the mentioned properties are significantly superior to some other porous materials, which enable these compounds to be potential candidates for dye uptake, gas storage, and separation. PMID:27159626

  3. Contributions to MALDI TOF- and ESI ion trap mass spectrometry of biopolymers, synthetic polymers and highly polar analytes

    International Nuclear Information System (INIS)

    The present thesis focuses on the so-called 'soft' desorption/ionization techniques matrix assisted laser desorption/ionization (MALDI) and atmospheric pressure ionization (API) mass spectrometry. This thesis contains five publications that describe methods and techniques which have been developed and evaluated for the characterization of (glyco)proteins, carbohydrates, technical polymers, calixarenes and fluorescence labeled peptides. The first paper presents and evaluates several simple methods for cleaning and desalting proteins and glycoproteins prior to MALDI TOF MS, which are especially well suited for small sample amounts. Advantages and disadvantages of these methods, with respect to sample volume, sample amount, time consumption, concentration and losses are discussed. The second paper shows the utility of MALDI MS for the analysis of modified cyclodextrines. These cyclic carbohydrates are used as chiral selectors in enantiomeric separations. It is shown that material purchased from different manufacturers is not identical and exhibits considerable heterogeneity. The third paper describes a new matrix, 4-hydroxy benzylidene malonnitrile, for MALDI MS analysis of industrially relevant synthetic polymers such as polyethyleneglycole, polystyrole, polymethyl methacrylate and especially for polyacryle nitride, which has so far never been investigated by MALDI MS. The advantage of delayed ion extraction in MALDI MS is also demonstrated. In the fourth contribution calixarenes, small cup-shaped molecules, are investigated. These polyphenolic compounds behave similar to carbohydrates in MALDI MS analysis. In the positive ion mode caution adducts can be detected, whereas in the negative ion mode deprotonated molecules dominate the mass spectra. By fragment ion analysis the identity of substituents can be verified. In the last paper the fragment ions of fluorescence labeled peptides, derived from either MALDI PSD MS or ESI IT MS, are compared. Fluorescence labeling

  4. Biopolymeric Mucin and Synthetic Polymer Analogs: Their Structure, Function and Role in Biomedical Applications

    Directory of Open Access Journals (Sweden)

    Sundar P. Authimoolam

    2016-03-01

    Full Text Available Mucin networks are viscoelastic fibrillar aggregates formed through the complex self-association of biopolymeric glycoprotein chains. The networks form a lubricious, hydrated protective shield along epithelial regions within the human body. The critical role played by mucin networks in impacting the transport properties of biofunctional molecules (e.g., biogenic molecules, probes, nanoparticles, and its effect on bioavailability are well described in the literature. An alternate perspective is provided in this paper, presenting mucin’s complex network structure, and its interdependent functional characteristics in human physiology. We highlight the recent advances that were achieved through the use of mucin in diverse areas of bioengineering applications (e.g., drug delivery, biomedical devices and tissue engineering. Mucin network formation is a highly complex process, driven by wide variety of molecular interactions, and the network possess structural and chemical variations, posing a great challenge to understand mucin’s bulk behavior. Through this review, the prospective potential of polymer based analogs to serve as mucin mimic is suggested. These analog systems, apart from functioning as an artificial model, reducing the current dependency on animal models, can aid in furthering our fundamental understanding of such complex structures.

  5. Improving the drug delivery characteristics of graphene oxide based polymer nanocomposites through the "one-pot" synthetic approach of single-electron-transfer living radical polymerization

    Science.gov (United States)

    Gao, Peng; Liu, Meiying; Tian, Jianwen; Deng, Fengjie; Wang, Ke; Xu, Dazhuang; Liu, Liangji; Zhang, Xiaoyong; Wei, Yen

    2016-08-01

    Graphene oxide (GO) based polymer nanocomposites have attracted extensive research interest recently for their outstanding physicochemical properties and potential applications. However, surface modification of GO with synthetic polymers has demonstrated to be trouble for most polymerization procedures are occurred under non-aqueous solution, which will in turn lead to the restacking of GO. In this work, a facile and efficient "one-pot" strategy has been developed for surface modification of GO with synthetic polymers through single-electron-transfer living radical polymerization (SET-LRP). The GO based polymer nanocomposites were obtained via SET-LRP in aqueous solution using poly(ethylene glycol) methyl ether methacrylate (PEGMA) as the monomer and 11-bromoundecanoic acid as the initiator, which could be effectively adsorbed on GO through hydrophobic interaction. The successful preparation of GO based polymer nanocomposites was confirmed by a series of characterization techniques such as 1H nuclear magnetic resonance, Fourier transform infrared spectroscopy, thermogravimetric analysis, transmission electron microscopy and X-ray photoelectron spectroscopy. The resultant products exhibit high water disperisibility, excellent biocompatibility and high efficient drug loading capability, making these PEGylated GO nanocomposites promising candidates for biomedical applications.

  6. Space science applications for conducting polymer particles: synthetic mimics for cosmic dust and micrometeorites.

    Science.gov (United States)

    Fielding, Lee A; Hillier, Jon K; Burchell, Mark J; Armes, Steven P

    2015-12-11

    Over the last decade or so, a range of polypyrrole-based particles have been designed and evaluated for space science applications. This electrically conductive polymer enables such particles to efficiently acquire surface charge, which in turn allows their acceleration up to the hypervelocity regime (>1 km s(-1)) using a Van de Graaff accelerator. Either organic latex (e.g. polystyrene or poly(methyl methacrylate)) or various inorganic materials (such as silica, olivine or pyrrhotite) can be coated with polypyrrole; these core-shell particles are useful mimics for understanding the hypervelocity impact ionisation behaviour of micro-meteorites (a.k.a. cosmic dust). Impacts on metal targets at relatively low hypervelocities (10 km s(-1)) generate predominately atomic species, since many more chemical bonds are cleaved if the particles impinge with higher kinetic energy. Such fundamental studies are relevant to the calibration of the cosmic dust analyser (CDA) onboard the Cassini spacecraft, which was designed to determine the chemical composition of Saturn's dust rings. Inspired by volcanism observed for one of the Jupiter's moons (Io), polypyrrole-coated sulfur-rich latexes have also been designed to help space scientists understand ionisation spectra originating from sulfur-rich dust particles. Finally, relatively large (20 μm diameter) polypyrrole-coated polystyrene latexes have proven to be useful for understanding the extent of thermal ablation of organic projectiles when fired at ultralow density aerogel targets at up to 6.1 km s(-1) using a Light Gas Gun. In this case, the sacrificial polypyrrole overlayer simply provides a sensitive spectroscopic signature (rather than a conductive overlayer), and the scientific findings have important implications for the detection of organic dust grains during the Stardust space mission. PMID:26458233

  7. High basicity adsorbents from solid residue of cellulose and synthetic polymer co-pyrolysis for phenol removal: Kinetics and mechanism

    Science.gov (United States)

    Lorenc-Grabowska, Ewa; Rutkowski, Piotr

    2014-10-01

    The activated carbons (ACs) produced from solid residue of cellulose and synthetic polymer co-pyrolysis (CACs) and commercial activated carbon from coconut shell (GC) were used for phenol removal. The adsorption kinetics and mechanism were investigated. All studied activated carbons are predominantly microporous and are characterized by basic surface characteristics. Surface area SBET varies between 1235 and 1499 m2/g, whereas the pHPZC changes from 7.70 to 10.63. The bath adsorption of phenol (P) was carried out at ambient temperature. The equilibrium time and equilibrium sorption capacity were determined. It was found that the boundary layer effect is bigger in AC with high basic characteristics of the surface. The rate controlling step is the intraparticle diffusion in CACs only, whereas in ACs with higher amount of acidic functionalities the adsorbate-surface interaction influences the rate of kinetic as well. The equilibrium isotherms are L2 type for commercial AC and L4 for CACs. The CACs are characterized by very high adsorption capacity that vary between 312 and 417 mg/g. The main mechanism of phenol adsorption is micropore filling within pores smaller than 1.4 nm. In the absence of solvent effect further adsorption of phenol on CACs takes place. The enhanced adsorption is due to dispersive/repulsive interaction induced by oxygen functionalities.

  8. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion of at...... attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  9. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  10. 人工合成高分子支架材料治疗脊髓损伤★%Synthetic polymer scaffolds for spinal cord injury

    Institute of Scientific and Technical Information of China (English)

    阚瑞; 盛伟斌

    2013-01-01

    BACKGROUND: Synthetic polymer scaffolds for treatment of spinal cord injury are currently a focus of research. OBJECTIVE: To summarize domestic and foreign researches on synthetic polymer scaffolds for the treatment of spinal cord injury. METHODS: Articles on synthetic polymer scaffolds for treatment of spinal cord injury were searched on WanfangMed, CNKI, PubMed and EBSCO databases from 2000-01 to 2012-01, using “spinal cord injury, tissue engineering, synthetic polymer material” appearing in title/abstract as key words. RESULTS AND CONCLUSION: Many kinds of synthetic polymer materials are developed for the treatment of spinal cord injury, including polylactic acid, polyglycolic acid, poly-β hydroxybutyric acid, synthetic hydrogel, and polyethylene glycol. Each material has its pros and cons, but none has complete tissue compatibility and biodegradability. These materials cannot completely mimic the three-dimensional porous structure of the spinal cord. After implantation, the materials are located freely to the spinal cord, which cannot be anatomized with the gray and white matters of the spinal cord, and fatherly cannot correspond to the main fibers in the white matter. Therefore, these materials have not been implemented in clinical trial. Further study on synthetic polymer scaffolds for the treatment of spinal cord injury is required.%  背景:治疗脊髓损伤的人工合成高分子支架材料是目前的研究热点之一。目的:综述国内外人工合成高分子支架材料在治疗脊髓损伤方面的研究进展。方法:应用计算机检索万方医学、中国知网、PubMed、EBSCO 数据库中2000年1月至2012年1月关于人工合成高分子支架材料治疗脊髓损伤方面的文章,在标题和摘要中以“脊髓损伤,组织工程,人工合成高分子材料”或“spinal cord injury,tissue engineering,synthetic polymer material”为检索词进行检索。结果与结论:治疗脊髓损伤的人工合

  11. Heart Attack

    Science.gov (United States)

    ... having another heart attack. These medicines include: aspirin, beta blockers, statins, ACE inhibitors and fish oil. Your doctor ... have had a stent placed in your heart. Beta blockers are a group of drugs that lower the ...

  12. Panic Attack

    OpenAIRE

    Scantamburlo, Gabrielle; Ansseau, Marc

    2004-01-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. Peer reviewed

  13. Challenges in highly-reliable crystal structure analysis of synthetic polymers based on the organized combination of wide-angle X-ray diffraction and wide-angle neutron diffraction methods

    International Nuclear Information System (INIS)

    Various types of technique have been proposed for enhancement of reliability of crystal structure information of synthetic polymers. In particular, the organized combination of high-energy synchrotron X-ray and wide-angle neutron diffraction methods has allowed us to extract the exact hydrogen atomic positions of polymer crystals. The so-called X-N method has been applied for the first time to obtain the bonded electron density distribution of electronically-conjugated polymer system. (author)

  14. Co-pyrolysis of wood biomass and synthetic polymer mixtures. Part 1. Influence of experimental conditions on the evolution of solids, liquids and gases

    Energy Technology Data Exchange (ETDEWEB)

    Sharypov, V.I.; Beregovtsova, N.G.; Baryshnikov, S.V.; Kuznetsov, B.N. [Institute of Chemistry and Chemical Technology SB RAS, 42 Karl Marx Street, Academgorodok, 660049 Krasnoyarsk (Russian Federation); Marin, N.; Weber, J.V. [Laboratoire de Chimie et Applications, Universite de Metz, IUT, Rue V. Demange, 57500 Saint-Avold (France); Cebolla, V.L. [Instituto de Carboquimica, CSIC, Zaragoza (Spain)

    2002-07-01

    The thermal behaviour of wood biomass and synthetic polymer mixtures was studied in a rotating autoclave. Beech wood, pine wood, cellulose, hydrolytic lignin, medium density polyethylene, isotactic and atactic polypropylene were selected as starting materials. The effects of reaction conditions, biomass and polymers' origins on the degree of mixture conversion as well as on the yields of liquid and gaseous products were established and discussed. A preliminary thermogravimetric investigation has shown that biomass is thermally degraded at a lower temperature than the studied polyolefins. As described in the literature, independent thermal behaviors were, in all cases, observed for each component of biomass/plastic mixtures (1:1 weight ratio). Co-pyrolysis of the different types of natural and synthetic polymer mixtures in an inert atmosphere has led to high yield of light distillate fraction and benzene soluble products. The optimum temperature for biomass/plastic mixture conversion which corresponds to the maximum yield of light liquids was 400C. The origins of both biomass and plastic had significant influences on the co-pyrolysis products' distribution. In some cases non-additive effects were observed. This effect, generally, took place at biomass/plastic ratio lower then 1 (weight ratio) and resulted in high yields of distillate liquid fraction.

  15. Molecularly imprinted polymers with synthetic dummy templates for the preparation of capsaicin and dihydrocapsaicin from chili peppers.

    Science.gov (United States)

    Ma, Xiuli; Ji, Wenhua; Chen, Lingxiao; Wang, Xiao; Liu, Jianhua; Wang, Xueyong

    2015-01-01

    In this work, dummy molecularly imprinted polymers with high selectivity and affinity to capsaicin and dihydrocapsaicin are designed using N-vanillylnonanamide as a dummy template. The performance of dummy molecularly imprinted polymers and nonimprinted polymers was evaluated using adsorption isotherms, adsorption kinetics, and selective recognition capacity. Dummy molecularly imprinted polymers were found to exhibit good site accessibility, taking just 20 min to achieve adsorption equilibrium; they were also highly selective toward capsaicin and dihydrocapsaicin. We successfully used dummy molecularly imprinted polymers as a specific sorbent for selectively enriching capsaicin and dihydrocapsaicin from chili pepper samples. In a scaled-up experiment, the selective recovery of capsaicinoids was calculated to be 77.8% using solid-phase extraction. To the best of our knowledge, this is the first example of the use of N-vanillylnonanamide as a dummy template in molecularly imprinted polymers to simultaneously enrich capsaicin and dihydrocapsaicin. PMID:25348490

  16. Evaluation of synthetic water-soluble metal-binding polymers with ultrafiltration for selective concentration of americium and plutonium

    International Nuclear Information System (INIS)

    Water-soluble metal-binding polymers in combination with ultrafiltration are shown to be an effective method for selectively removing dilute actinide ions from acidic solutions of high ionic strength. The actinide-binding properties of commercially available water-soluble polymers and several polymers which have been reported in the literature were evaluated. The functional groups incorporated in the polymers were pyrrolidone, amine, oxime, and carboxylic, phosphonic, or sulfonic acid. The polymer containing phosphonic acid groups gave the best results with high distribution coefficients and concentration factors for 241Am(III) and 238Pu(III)/(IV) at pH 4 to 6 and ionic strengths of 0.1 to 4. (author)

  17. Synthetic staggered architecture composites

    International Nuclear Information System (INIS)

    Highlights: ► Composite design inspired by nature. ► Tuning microstructure via changing ceramic content and aspect ratio. ► Experimental display of structure–property correlationship in synthetic composites. - Abstract: Structural biocomposites (for example, nacre in seashells, bone, etc.) are designed according to the functional role they are delegated for. For instance, bone is primarily designed for withstanding time-dependent loading (for example, withstanding stresses while running, jumping, accidental fall) and hence the microstructure is designed primarily from enhanced toughness and moderate stiffness point of view. On the contrary, seashells (which lie in the abyss of oceans) apart from providing defense to the organism (it is hosting) against predatory attacks, are subjected to static loading (for example, enormous hydrostatic pressure). Hence, emphasis on the shell structure evolution is directed primarily towards providing enhanced stiffness. In order to conform between stiffness and toughness, nature precisely employs a staggered arrangement of inorganic bricks in a biopolymer matrix (at its most elementary level of architecture). Aspect ratio and content of ceramic bricks are meticulously used by nature to synthesize composites having varying degrees of stiffness, strength and toughness. Such an amazing capability of structure–property correlationship has rarely been demonstrated in synthetic composites. Therefore, in order to better understand the mechanical behavior of synthetic staggered composites, the problem becomes two-pronged: (a) synthesize composites with varying brick size and contents and (b) experimental investigation of the material response. In this article, an attempt has been made to synthesize and characterize staggered ceramic–polymer composites having varying aspect ratio and ceramic content using freeze-casting technique. This will in-turn help us in custom-design manufacture of hybrid bio-inspired composite materials

  18. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  19. A Synthetic Polymer Scaffold Reveals the Self-Maintenance Strategies of Rat Glioma Stem Cells by Organization of the Advantageous Niche.

    Science.gov (United States)

    Tabu, Kouichi; Muramatsu, Nozomi; Mangani, Christian; Wu, Mei; Zhang, Rong; Kimura, Taichi; Terashima, Kazuo; Bizen, Norihisa; Kimura, Ryosuke; Wang, Wenqian; Murota, Yoshitaka; Kokubu, Yasuhiro; Nobuhisa, Ikuo; Kagawa, Tetsushi; Kitabayashi, Issay; Bradley, Mark; Taga, Tetsuya

    2016-05-01

    Cancer stem cells (CSCs) are believed to be maintained within a microenvironmental niche. Here we used polymer microarrays for the rapid and efficient identification of glioma CSC (GSC) niche mimicries and identified a urethane-based synthetic polymer, upon which two groups of niche components, namely extracellular matrices (ECMs) and iron are revealed. In cultures, side population (SP) cells, defined as GSCs in the rat C6 glioma cell line, are more efficiently sustained in the presence of their differentiated progenies expressing higher levels of ECMs and transferrin, while in xenografts, ECMs are supplied by the vascular endothelial cells (VECs), including SP cell-derived ones with distinctively greater ability to retain xenobiotics than host VECs. Iron is stored in tumor infiltrating host macrophages (Mφs), whose protumoral activity is potently enhanced by SP cell-secreted soluble factor(s). Finally, coexpression of ECM-, iron-, and Mφ-related genes is found to be predictive of glioma patients' outcome. Our polymer-based approach reveals the intrinsic capacities of GSCs, to adapt the environment to organize a self-advantageous microenvironment niche, for their maintenance and expansion, which redefines the current concept of anti-CSC niche therapy and has the potential to accelerate cancer therapy development. Stem Cells 2016;34:1151-1162. PMID:26822103

  20. Direct observation of the ultrafast electron transfer process in a polymer/fullerene blend. : Section Title: Physical Properties of Synthetic High Polymers

    NARCIS (Netherlands)

    Brabec, Ch J.; Zerza, G.; Sariciftci, N. S.; Cerullo, G.; Lanzani, G.; De Silvestri, S.; Hummelen, J. C.

    2001-01-01

    Optical studies on conjugated polymer-fullerene blends are performed with sub-10-fs temporal resoln. The photoinduced electron transfer process is directly monitored in the time domain, obtaining a forward electron transfer time const. of 45 fs. [on SciFinder(R)

  1. Evaluation of synthetic water-soluble metal-binding polymers with ultrafiltration for selective concentration of americium and plutonium

    International Nuclear Information System (INIS)

    Routine counting methods and ICP-MS are unable to directly measure the new US Department of Energy (DOE) regulatory level for discharge waters containing alpha-emitting radionuclides of 30 pCi/L total alpha or the 0.05 pCi/L regulatory level for Pu or Am activity required for surface waters at the Rocky Flats site by the State of Colorado. This inability indicates the need to develop rapid, reliable, and robust analytical techniques for measuring actinide metal ions, particularly americium and plutonium. Selective separation or preconcentration techniques would aid in this effort. Water-soluble metal-binding polymers in combination with ultrafiltration are shown to be an effective method for selectively removing dilute actinide ions from acidic solutions of high ionic strength. The actinide-binding properties of commercially available water-soluble polymers and several polymers which have been reported in the literature were evaluated. The functional groups incorporated in the polymers were pyrrolidone, amine, oxime, and carboxylic, phosphonic, or sulfonic acid. The polymer containing phosphonic acid groups gave the best results with high distribution coefficients and concentration factors for 241Am(III) and 238Pu(III)/(IV) at pH 4 to 6 and ionic strengths of 0.1 to 4

  2. Heart Attack Risk Assessment

    Science.gov (United States)

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  3. Attack warning

    Energy Technology Data Exchange (ETDEWEB)

    1988-12-01

    The North American Aerospace Defense Command, located at Cheyenne Mountain Air Force Station, is responsible for warning the United States and Canadian leaders that North America is under air, missile, or space attack. The Air Force has been developing a replacement for NORAD's communications computer system, and it expects to spend about $281 million on this program-about $72 million for block I and $209 million for block II. Block I of the replacement system has experienced significant schedule and performance problems, such as the inability to meet the requirement for the unit to restore full mission capability within 267 minutes after a total loss of power, and the incompatibility of the unit with other computer equipment due to the wiring standard. These problems have pushed the planned installation data from 1986 to 1999. The Air Force intends to have the contractor correct the deficiencies during block II development. This report discusses how the replacement program should be reassessed.

  4. Osteogenic induction of human bone marrow-derived mesenchymal progenitor cells in novel synthetic polymer-hydrogel matrices

    OpenAIRE

    Endres, M; Hutmacher, D.W.; Salgado, A. J.; Kaps, C; RINGE, J; Reis, R. L.; Sittinger, M; Brandwood, A.; Schantz, J. T.

    2003-01-01

    The aim of this project was to investigate the in vitro osteogenic potential of human mesenchymal progenitor cells in novel matrix architectures built by means of a three-dimensional bioresorbable synthetic framework in combination with a hydrogel. Human mesenchymal progenitor cells (hMPCs) were isolated from a human bone marrow aspirate by gradient centrifugation. Before in vitro engineering of scaffold-hMPC constructs, the adipogenic and osteogenic differentiation potential was demonstrated...

  5. Grafting of synthetic polyelectrolyte onto polymer surfaces--comparison of glow discharge and 60Co-gamma-irradiation method

    International Nuclear Information System (INIS)

    Water soluble polyelectrolyte synthesized from natural rubber contains sulfamate and carboxylate groups similar to that of heparin. It is observed that synthetic heparinoid polyelectrolyte is capable of inhibiting blood coagulation. In the present study, we attempted to graft the same onto polystyrene and polymethylmethacrylate surfaces using glow discharge technique and 60Co-gamma-irradiation method, and the surfaces were compared with respect to water contact angle and platelet adhesion parameters. Heparinized surfaces are also evaluated for relative comparison

  6. Nanocompósitos de matriz polimérica: estratégias de síntese de materiais híbridos Polymer based nanocomposites: synthetic strategies for hybrid materials

    Directory of Open Access Journals (Sweden)

    Ana Catarina C. Esteves

    2004-10-01

    Full Text Available Associating the well known advantages of hybrid materials to the wide potential of nanomaterials, the new and featuring class of polymer nanocomposites turned into one of the most intensively researched areas. This review highlights recent developments in the field of the synthesis of polymer based nanocomposites. Important issues related to the surface modification of fillers, in order to promote the compatibility between the inorganic/organic components, are also reported. The enhancement of the physical properties and the potential applications of polymer nanocomposites are considered in typical examples, given for each synthetic method described.

  7. In-Line Desalting of Proteins from Buffer and Synthetic Urine Solution Prior to ESI-MS Analysis via a Capillary-Channeled Polymer Fiber Microcolumn

    Science.gov (United States)

    Burdette, Carolyn Q.; Marcus, R. Kenneth

    2013-06-01

    Presented here is a novel in-line solid phase extraction (SPE) method utilizing a capillary-channeled polymer (C-CP) fiber microcolumn prior to introduction to an electrospray ionization (ESI) source. The high permeability of the microcolumn allows for operation under syringe pump or HPLC driven flow, ultimately providing greater mass spectral clarity and accurate molecular weight determinations for different protein/buffer combinations. Studies presented here focus on the desalting of several target proteins from a standard phosphate buffered saline (PBS) matrix and a synthetic urine solution prior to ESI-MS determinations. In every case, responses for μM-level proteins in PBS improve from the situation of not permitting molecular weight determinations to values that are precise to better than ±10 Da, without internal standards, with relative improvements in the signal-to-background ratios (S/B) on the order of 3,000×. De-salting of a myoglobin-spiked (12 μM) synthetic urine results in equally-improved spectral quality.

  8. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  9. Comparison of the in Vitro Uptake and Toxicity of Collagen- and Synthetic Polymer-Coated Gold Nanoparticles

    Directory of Open Access Journals (Sweden)

    Oana T. Marisca

    2015-08-01

    Full Text Available We studied the physico-chemical properties (size, shape, zeta-potential, cellular internalization and toxicity of gold nanoparticles (NPs stabilized with the most abundant mammalian protein, collagen. The properties of these gold NPs were compared to the same sized gold NPs coated with synthetic poly(isobutylene-alt-maleic anhydride (PMA. Intracellular uptake and cytotoxicity were assessed in two cell lines (cervical carcinoma and lung adenocarcinoma cells by employing inductively-coupled plasma-mass spectrometry (ICP-MS analysis and a cell viability assay based on 3-(4,5-dimethylthiazol-2-yl-2,5-diphenyltetrazolium bromide (MTT, respectively. We found that the collagen-coated gold NPs exhibit lower cytotoxicity, but higher uptake levels than PMA-coated gold NPs. These results demonstrate that the surface coating of Au NPs plays a decisive role in their biocompatibility.

  10. Edible Polymers: Challenges and Opportunities

    OpenAIRE

    Subhas C. Shit; Shah, Pathik M.

    2014-01-01

    Edible polymers have established substantial deliberation in modern eons because of their benefits comprising use as edible materials over synthetic polymers. This could contribute to the reduction of environmental contamination. Edible polymers can practically diminish the complexity and thus improve the recyclability of materials, compared to the more traditional non-environmentally friendly materials and may be able to substitute such synthetic polymers. A synthetic hydrogel polymer unlock...

  11. Surface-Directed Assembly of Sequence-Defined Synthetic Polymers into Networks of Hexagonally Patterned Nanoribbons with Controlled Functionalities

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Chun-Long; Zuckermann, Ronald N.; DeYoreo, James J.

    2016-05-24

    The exquisite self-assembly of proteins and peptides in nature into highly ordered functional materials has inspired innovative approaches to biomimetic materials design and synthesis. Here we report the assembly of peptoids—a class of highly stable sequence-defined synthetic polymers—into biomimetic materials on mica surfaces. The assembling 12-mer peptoid contains alternating acidic and aromatic residues, and the presence of Ca2+ cations creates peptoid-peptoid and peptoid-mica interactions that drive assembly. In situ atomic force microscopy (AFM) shows that peptoids first assemble into discrete nanoparticles, these particles then transform into hexagonally-patterned nanoribbons on mica surfaces. AFM-based dynamic force spectroscopy (DFS) studies show that peptoid-mica interactions are much stronger than peptoidpeptoid interactions in the presence of Ca2+, illuminating the physical parameters that drive peptoid assembly. We further demonstrate the display of functional groups at the N-terminus of assembling peptoid sequence to produce biomimetic materials with similar hierarchical structures. This research demonstrates that surface-directed peptoid assembly can be used as a robust platform to develop biomimetic coating materials for applications.

  12. FORMULATION AND IN-VITRO EVALUATION OF EFFERVESCENT FLOATING MATRIX TABLETS OF NIZATIDINE USING NATURAL AND SEMI SYNTHETIC POLYMERS

    Directory of Open Access Journals (Sweden)

    A Sarat Chandra

    2012-12-01

    Full Text Available The aim of this study was to develop a floating gastroretentive dosage form using effervescent technique so as to increase the patient compliance and to provide a prolonged therapeutic effect. Nizatidine was used as a model drug because of its short elimination half-life and localized action in the gastric region. Nine batches containing 75mg of Nizatidine per tablet were developed using release modifiers like xanthan gum and HPMC K100M both individually and in 1:1 combination at 30, 40 and 50% concentrations. Sodium bicarbonate and tartaric acid were used as gas generating agents. The drug-excipient compatibility, pre and post compression parameters, buoyancy properties and swelling index were evaluated. In-vitro dissolution studies were carried out in 0.1N HCl (pH 1.2 at 37±0.5oC. Increase in polymer concentration showed significant retardation of drug release and increase in swelling property. Release kinetics were studied by fitting the data into various models and release mechanism, predicted drug release were studied. Best formulation among the designed batches was selected based on cumulative percentage of drug released by the end of twelfth hour and by comparing the predicted and obtained drug releases at the end of 5th and 8th hours respectively.

  13. Surface-Directed Assembly of Sequence-Defined Synthetic Polymers into Networks of Hexagonally Patterned Nanoribbons with Controlled Functionalities.

    Science.gov (United States)

    Chen, Chun-Long; Zuckermann, Ronald N; DeYoreo, James J

    2016-05-24

    The exquisite self-assembly of proteins and peptides in nature into highly ordered functional materials has inspired innovative approaches to the design and synthesis of biomimetic materials. While sequence-defined polymers hold great promise to mimic proteins and peptides for functions, controlled assembly of them on surfaces still remains underdeveloped. Here, we report the assembly of 12-mer peptoids containing alternating acidic and aromatic monomers into networks of hexagonally patterned nanoribbons on mica surfaces. Ca(2+)-carboxylate coordination creates peptoid-peptoid and peptoid-mica interactions that control self-assembly. In situ atomic force microscopy (AFM) shows that peptoids first assemble into discrete nanoparticles; these particles then transform into hexagonally patterned nanoribbons on mica surfaces. AFM-based dynamic force spectroscopy studies show that peptoid-mica interactions are much stronger than peptoid-peptoid interactions, illuminating the driving forces for mica-directed peptoid assembly. We further demonstrate the display of functional domains at the N-terminus of assembling peptoids to produce extended networks with similar hierarchical structures. This research demonstrates that surface-directed peptoid assembly can be used as a robust platform to develop biomimetic coating materials for applications. PMID:27136277

  14. Formulation and evaluation of a sustained-release tablets of metformin hydrochloride using hydrophilic synthetic and hydrophobic natural polymers

    Directory of Open Access Journals (Sweden)

    K J Wadher

    2011-01-01

    Full Text Available Metformin hydrochloride has relatively short plasma half-life, low absolute bioavailability. The need for the administration two to three times a day when larger doses are required can decrease patient compliance. Sustained release formulation that would maintain plasma level for 8-12 h might be sufficient for daily dosing of metformin. Sustained release products are needed for metformin to prolong its duration of action and to improve patient compliances. The overall objective of this study was to develop an oral sustained release metformin hydrochloride tablet by using hydrophilic Eudragit RSPO alone or its combination with hydrophobic natural polymers Gum copal and gum damar as rate controlling factor. The tablets were prepared by wet granulation method. The in vitro dissolution study was carried out using USP 22 apparatus I, paddle method and the data was analysed using zero order, first order, Higuchi, Korsmeyer and Hixson-Crowell equations. The drug release study revealed that Eudragit RSPO alone was unable to sustain the drug release. Combining Eudragit with gum Copal and gum Damar sustained the drug release for more than 12 h. Kinetic modeling of in vitro dissolution profiles revealed the drug release mechanism ranges from diffusion controlled or Fickian transport to anomalous type or non-Fickian transport. Fitting the in vitro drug release data to Korsmeyer equation indicated that diffusion along with erosion could be the mechanism of drug release.

  15. Chain-length-dependent impact of band broadening on the molar-mass determination of synthetic polymers via size-exclusion chromatography.

    Science.gov (United States)

    Wolpers, Arne; Vana, Philipp

    2016-08-01

    The impact of band-broadening (BB) on the molar-mass determination of synthetic polymers via size-exclusion chromatography (SEC) is systematically studied. BB is simulated using the exponentially modified Gaussian (EMG) model, which combines the two inherent and distinct characteristics contributing to BB in SEC: symmetric Gaussian broadening and asymmetric skewing. It is demonstrated that BB both during the measurement of the analyte itself and during the calibration process has an individual impact on molar-mass determination. In this context, particularly skewing leads to a chain-length-dependent underestimation of molar masses, with deviations of the apparent from the true ones of only a few percent for low molar masses to up to 20% for high ones for reasonable extents of BB. The impact is shown to be independent of the shape of the analyte⬢s molar-mass distribution (MMD) and affects broad and multimodal MMDs similarly to narrow and unimodal ones. As a consequence, strategies are presented for a comprehensive quantitative correction of the observed effects, which may find their application in refined SEC software packages. The potential impact of the findings on general conceptions of repeatability and reproducibility within SEC experiments is discussed. PMID:27393628

  16. Securing iris recognition systems against masquerade attacks

    Science.gov (United States)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  17. Active Linkability Attacks

    OpenAIRE

    Schnoor, Henning; Woizekowski, Oliver

    2013-01-01

    We study linking attacks on communication protocols. We show that an active attacker is strictly more powerful in this setting than previously-considered passive attackers. We introduce a formal model to reason about active linkability attacks, formally define security against these attacks and give very general conditions for both security and insecurity of protocols. In addition, we introduce a composition-like technique that allows to obtain security proofs by only studying small component...

  18. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  19. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle becomes ...

  20. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  1. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  2. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  3. What Is a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  4. What Causes a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Causes a Heart Attack? Coronary Heart Disease A heart attack happens if ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  5. Life After a Heart Attack

    Science.gov (United States)

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  6. Nocturnal panic attacks

    OpenAIRE

    Lopes Fabiana L; Nardi Antonio E; Nascimento Isabella; Valença Alexandre M.; Zin Walter A.

    2002-01-01

    The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sle...

  7. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  8. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  9. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  10. Star Polymers.

    Science.gov (United States)

    Ren, Jing M; McKenzie, Thomas G; Fu, Qiang; Wong, Edgar H H; Xu, Jiangtao; An, Zesheng; Shanmugam, Sivaprakash; Davis, Thomas P; Boyer, Cyrille; Qiao, Greg G

    2016-06-22

    Recent advances in controlled/living polymerization techniques and highly efficient coupling chemistries have enabled the facile synthesis of complex polymer architectures with controlled dimensions and functionality. As an example, star polymers consist of many linear polymers fused at a central point with a large number of chain end functionalities. Owing to this exclusive structure, star polymers exhibit some remarkable characteristics and properties unattainable by simple linear polymers. Hence, they constitute a unique class of technologically important nanomaterials that have been utilized or are currently under audition for many applications in life sciences and nanotechnologies. This article first provides a comprehensive summary of synthetic strategies towards star polymers, then reviews the latest developments in the synthesis and characterization methods of star macromolecules, and lastly outlines emerging applications and current commercial use of star-shaped polymers. The aim of this work is to promote star polymer research, generate new avenues of scientific investigation, and provide contemporary perspectives on chemical innovation that may expedite the commercialization of new star nanomaterials. We envision in the not-too-distant future star polymers will play an increasingly important role in materials science and nanotechnology in both academic and industrial settings. PMID:27299693

  11. Edible Polymers: Challenges and Opportunities

    Directory of Open Access Journals (Sweden)

    Subhas C. Shit

    2014-01-01

    Full Text Available Edible polymers have established substantial deliberation in modern eons because of their benefits comprising use as edible materials over synthetic polymers. This could contribute to the reduction of environmental contamination. Edible polymers can practically diminish the complexity and thus improve the recyclability of materials, compared to the more traditional non-environmentally friendly materials and may be able to substitute such synthetic polymers. A synthetic hydrogel polymer unlocked a new possibility for development of films, coatings, extrudable pellets, and synthetic nanopolymers, particularly designed for medical, agricultural, and industrial fields. Edible polymers offer many advantages for delivering drugs and tissue engineering. Edible polymer technology helps food industries to make their products more attractive and safe to use. Novel edible materials have been derived from many natural sources that have conventionally been regarded as discarded materials. The objective of this review is to provide a comprehensive introduction to edible polymers by providing descriptions in terms of their origin, properties, and potential uses.

  12. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  13. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  14. Signs of a Heart Attack

    Science.gov (United States)

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  15. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  16. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  17. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for...

  18. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  19. Preconcentration of low levels of americium and plutonium from waste waters by synthetic water-soluble metal-binding polymers with ultrafiltration

    International Nuclear Information System (INIS)

    A preconcentration approach to assist in the measurement of low levels of americium and plutonium in waste waters has been developed based on the concept of using water-soluble metal-binding polymers in combination with ultrafiltration. The method has been optimized to give over 90% recovery and accountability from actual waste water. (author)

  20. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    OpenAIRE

    Yi-Hsun Wang; Ching-Hao Mao; Hahn-Ming Lee

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of...

  1. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  2. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  3. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. PMID:24237838

  4. Polymer radiation chemistry

    International Nuclear Information System (INIS)

    This article reviews some of the work carried out in the Polymer and Radiation Group at the University of Queensland over the past ten years. The objective of the work has been to investigate the relationships between polymer structure and sensitivity towards high energy radiation, including 60Co gamma radiation, electron beams and UV radiation. A range of synthetic polymers containing carboxyl groups, acrylate groups, sulfone groups, amide linkages and aromatic residues have been investigated. (author). 18 refs, 2 figs, 4 tabs

  5. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  6. Evaluation of two molecularly imprinted polymers for the solid-phase extraction of natural, synthetic and mycoestrogens from environmental water samples before liquid chromatography with mass spectrometry.

    Science.gov (United States)

    González-Sálamo, Javier; Socas-Rodríguez, Bárbara; Hernández-Borges, Javier; Del Mar Afonso, María; Rodríguez-Delgado, Miguel Ángel

    2015-08-01

    In this work, we have compared the selectivity of two commercial molecularly imprinted polymers (AFFINIMIP®SPE Estrogens and AFFINIMIP®SPE Zearalenone) for the extraction of 12 estrogenic compounds of interest (i.e. 17α-estradiol, 17β-estradiol, estrone, hexestrol, 17α-ethynylestradiol, diethylstibestrol, dienestrol, zearalenone, α-zearalanol, β-zearalanol, α-zearalenol and β-zearalenol) from different water samples. High-performance liquid chromatography coupled with ion trap mass spectrometry with electrospray ionization was used for their determination. Results showed that although both molecularly imprinted polymeric cartridges were specifically designed for different groups of analytes (natural estrogens like estradiol in the first case and zearalenone derivatives in the second) they nearly have the same extraction performance (with recovery values in the range 65-101%) for the same analytes in Milli-Q water because of the cross-reactivity of the polymer. However, when more complex water samples were analyzed, it was clear that the behavior was different and that the AFFINIMIP®SPE Estrogens showed less cross-reactivity than the other cartridge. Validation of the proposed methodology with both cartridges revealed that the extraction was reproducible and that the final limits of detection of the proposed method were in the low ng/L range. PMID:26012850

  7. Facile and rapid deprotection conditions for the cleavage of synthetic oligonucleotides from 1,4-anhydroerythritol-based universal polymer support.

    Science.gov (United States)

    Dhawan, Gagan; Chandra, Ramesh; Gupta, Kailash C; Kumar, Pradeep

    2015-01-01

    In our previous report [Kumar, P.; Dhawan, G.; Chandra, R.; Gupta, K.C. Polyamine-assisted rapid and clean cleavage of oligonucleotides from cis-diol bearing universal support. Nucl. Acids Res. 2002, 30, e130 (1-8)], we demonstrated polyamine-mediated deprotection of oligonucleotides from cis-diol group bearing universal polymer support (I). However, vulnerability of the conventional dC(bz) to modifications under these conditions compelled us to employ dC(ac) during synthesis of oligonucleotide using conventional synthons. Here, a new set of simple and rapid deprotection conditions has been developed for the complete cleavage of oligonucleotides from the 1,4-anhydroerythritol-based universal polymer support employing conventional dC(bz) synthon. Using manganese-imidazole complex in aqueous ammonium hydroxide (∼ 30%), fully deprotected oligonucleotide sequences were obtained in 40 min, which were analyzed on reverse phase-HPLC and compared with the standard oligomers in terms of their retention time. Finally, their biological compatibility was established by analyzing PCR amplified products of npsA gene of N. meningitidis. PMID:25710353

  8. Investigation of fungal deterioration of synthetic paint binders using vibrational spectroscopic techniques.

    Science.gov (United States)

    Cappitelli, Francesca; Vicini, Silvia; Piaggio, Paolo; Abbruscato, Pamela; Princi, Elisabetta; Casadevall, Arturo; Nosanchuk, Joshua D; Zanardini, Elisabetta

    2005-01-14

    The deterioration of synthetic polymers caused by biological process is usually evaluated by visual inspection and measuring physical effects. In contrast to this approach, we have applied vibrational spectroscopies to study the biodegradation of the synthetic resins. 29 synthetic resins used as paint binding media, including acrylic, alkyd and poly(vinyl acetate) polymers, were examined for potential susceptibility to fungal degradation using the standard method ASTM G21-96(2002). In addition, the degraded resins were analysed by Raman spectroscopy, FT-IR and FT-IR photoacoustic spectroscopy. Almost all the acrylic resins studied proved to be resistant to microbial attack, while all alkyd resins and some poly(vinyl acetates) turned out to be biodegradable. Within a few days of inoculation Aspergillus niger was the most copious fungus on the biodegraded resins. A comparison of the IR and Raman spectra of control and biodegraded resins did not show any differences, but photoacoustic spectroscopy revealed additional bands for the fungal-degraded resins, consistent with the presence of fungal-derived substances. The additional bands in the photoacoustic spectra were due to the presence of Aspergillus niger and melanin, a fungal pigment. Since IR photoacoustic spectroscopy can be also a suitable technique for the chemical characterisation of binding media, the same spectroscopic analysis can be employed to both characterise the material and obtain evidence for fungal colonization. Microbial growth on Sobral 1241ML (alkyd resin) after 28 d (growth rating 4) compared with the non-inoculated resin. PMID:15635715

  9. Cell Counting Attack and Browser Attack against TOR Network

    OpenAIRE

    Swati

    2014-01-01

    The onion router (TOR) allows to hide your identity various software under this categories are available that allows online anonymity network, supporting TCP applications over the Internet. It doesn't allow network surveillance or traffic analysis to get tracked but most of these software used equal size of cells (512B). In this paper we are comparing cell-counting attacks and browser attacks against TOR. Different from cell-counting attacks, these attacks can confirm anonymou...

  10. Blocking of Brute Force Attack

    Directory of Open Access Journals (Sweden)

    M.Venkata Krishna Reddy

    2012-08-01

    Full Text Available A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it could take years to find it. Depending on the password's length and complexity, there could be trillions of possible combinations. To speed things up a bit, a brute-force attack could start with dictionary words or slightly modified dictionary words because most people will use those rather than a completely random password. These attacks are called dictionary attacks or hybrid brute-force attacks. Brute-force attacks put user accounts at risk and flood your site with unnecessary traffic. Hackers launch brute-force attacks using widely available tools that utilize wordlists and smart rule set to intelligently and automatically guess user passwords. Although such attacks are easy to detect, they are not so easy to prevent

  11. ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

    Directory of Open Access Journals (Sweden)

    A.MADHURI,

    2010-09-01

    Full Text Available In this paper, we discuss the methods for detecting and preventing the DDoS Attacks and Replay Attacks, which have been posing the problems for the Internet. We explained a scheme AMFDR (AttackPatterns for Marking Filtering DoS and Replay attacks that identifies the attack packets from the packets that are sent by legitimate users and filters the attack packets. A Denial of service attack is generally launched to make a service unavailable even to an unauthorized user. If this attack uses many computers across the world, it is called Distributed Denial of service attack. Replay attack is retransmission of a data transmission which used to gain authentication in a fraudulent manner. These replayed packets or attack packets are identified. This scheme is less expensive and the implementation of this scheme needs minimal interaction with routers. The scheme is like firewall system, so that the occurrence of an attack is recognized quickly and a punitive action is taken without any loss genuine packets.

  12. Simultaneous Attacks by Terrorist Organisations

    Directory of Open Access Journals (Sweden)

    Kathleen Deloughery

    2013-12-01

    Full Text Available While terror attacks that are a part of a coordinated effort receive attention in the popular media, they have not received much attention in the academic literature. The decision to carry out simultaneous attacks should be examined as one of the choices a terrorist organisation makes about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single attack can explain why groups would use this method. Up to one quarter of all attacks coded in two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical analysis shows simultaneous attacks are more likely to be successful and cause more fatalities, though not in a one-to-one fashion. These results underline the importance of considering simultaneous attacks in empirical analysis.

  13. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  14. Synthetic environments

    Science.gov (United States)

    Lukes, George E.; Cain, Joel M.

    1996-02-01

    The Advanced Distributed Simulation (ADS) Synthetic Environments Program seeks to create robust virtual worlds from operational terrain and environmental data sources of sufficient fidelity and currency to interact with the real world. While some applications can be met by direct exploitation of standard digital terrain data, more demanding applications -- particularly those support operations 'close to the ground' -- are well-served by emerging capabilities for 'value-adding' by the user working with controlled imagery. For users to rigorously refine and exploit controlled imagery within functionally different workstations they must have a shared framework to allow interoperability within and between these environments in terms of passing image and object coordinates and other information using a variety of validated sensor models. The Synthetic Environments Program is now being expanded to address rapid construction of virtual worlds with research initiatives in digital mapping, softcopy workstations, and cartographic image understanding. The Synthetic Environments Program is also participating in a joint initiative for a sensor model applications programer's interface (API) to ensure that a common controlled imagery exploitation framework is available to all researchers, developers and users. This presentation provides an introduction to ADS and the associated requirements for synthetic environments to support synthetic theaters of war. It provides a technical rationale for exploring applications of image understanding technology to automated cartography in support of ADS and related programs benefitting from automated analysis of mapping, earth resources and reconnaissance imagery. And it provides an overview and status of the joint initiative for a sensor model API.

  15. LITERATURE SURVEY ON WORMHOLE ATTACK

    OpenAIRE

    Avinash S. Bundela

    2015-01-01

    Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been identified & corresponding solutions have been proposed. These attacks are caused by the malicious node hence ad hoc wireless network is unprotected from the attacks of the malicious node. Between all these attacks the wormhole att ...

  16. Charm and beauty of polymer science

    Czech Academy of Sciences Publication Activity Database

    Raab, Miroslav; Kotek, Jiří

    Praha : Ústav makromolekulární chemie AV ČR, 2009. GL1. ISBN 978-80-85009-60-6. [Workshop: Career in Polymers. 10.07.2009-11.07.2009, Prague] Institutional research plan: CEZ:AV0Z40500505 Keywords : polymer science * natural polymers * synthetic polymers Subject RIV: CD - Macromolecular Chemistry

  17. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  18. Polymer-solvent molecular compounds

    CERN Document Server

    Guenet, Jean-Michel

    2010-01-01

    Crystallisable polymers represent a large share of the polymers used for manufacturing a wide variety of objects, and consequently have received continuous attention from scientists these past 60 years. Molecular compounds from crystallisable polymers, particularly from synthetic polymers, are receiving growing interest due to their potential application in the making of new materials such as multiporous membranes capable of capturing large particles as well as small pollutant molecules. The present book gives a detailed description of these promising systems. The first chapter

  19. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  20. Synthetic Astrobiology

    Science.gov (United States)

    Rothschild, Lynn J.

    2015-01-01

    Synthetic biology - the design and construction of new biological parts and systems and the redesign of existing ones for useful purposes - has the potential to transform fields from pharmaceuticals to fuels. Our lab has focused on the potential of synthetic biology to revolutionize all three major parts of astrobiology: Where do we come from? Where are we going? and Are we alone? For the first and third, synthetic biology is allowing us to answer whether the evolutionary narrative that has played out on planet earth is likely to have been unique or universal. For example, in our lab we are re-evolving the biosynthetic pathways of amino acids in order to understand potential capabilities of an early organism with a limited repertoire of amino acids and developing techniques for the recovery of metals from spent electronics on other planetary bodies. In the future synthetic biology will play an increasing role in human activities both on earth, in fields as diverse as human health and the industrial production of novel bio-composites. Beyond earth, we will rely increasingly on biologically-provided life support, as we have throughout our evolutionary history. In order to do this, the field will build on two of the great contributions of astrobiology: studies of the origin of life and life in extreme environments.

  1. Synthetic Astrobiology

    Science.gov (United States)

    Rothschild, Lynn J.

    2016-01-01

    Synthetic biology - the design and construction of new biological parts and systems and the redesign of existing ones for useful purposes - has the potential to transform fields from pharmaceuticals to fuels. Our lab has focused on the potential of synthetic biology to revolutionize all three major parts of astrobiology: Where do we come from? Where are we going? and Are we alone? For the first and third, synthetic biology is allowing us to answer whether the evolutionary narrative that has played out on planet earth is likely to have been unique or universal. For example, in our lab we are re-evolving the biosynthetic pathways of amino acids in order to understand potential capabilities of an early organism with a limited repertoire of amino acids and developing techniques for the recovery of metals from spent electronics on other planetary bodies. And what about the limits for life? Can we create organisms that expand the envelope for life? In the future synthetic biology will play an increasing role in human activities both on earth, in fields as diverse as human health and the industrial production of novel bio-composites. Beyond earth, we will rely increasingly on biologically-provided life support, as we have throughout our evolutionary history. In order to do this, the field will build on two of the great contributions of astrobiology: studies of the origin of life and life in extreme environments.

  2. Synthetic Rutile

    International Nuclear Information System (INIS)

    This work is about the laboratory scale investigation of the conditions in the rutile synthetic production from one me nita in Aguas Dulces reservoir. The iron mineral is chlorinated and volatilized selectively leaving a residue enriched in titanium dioxide which can be used as a substitute of rutile mineral

  3. Synthetic DNA

    OpenAIRE

    O’ Driscoll, Aisling; Sleator, Roy D.

    2013-01-01

    With world wide data predicted to exceed 40 trillion gigabytes by 2020, big data storage is a very real and escalating problem. Herein, we discuss the utility of synthetic DNA as a robust and eco-friendly archival data storage solution of the future.

  4. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  5. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  6. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are...... caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  7. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  8. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  9. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  10. A Network Attack Model based on Colored Petri Net

    Directory of Open Access Journals (Sweden)

    Xinlei Li

    2014-07-01

    Full Text Available The researches have shown that not all the Petri Net machines can be used to describe attack behavior. When Petri Net machines adapted for attack behavior modeling are detecting the network, for some event of current status, if there is matching event in the model, it has only one corresponding transition; otherwise that may cause errors. Since sharing synthesis and synchronization synthesis of traditional machines cannot ensure synthetic model reserves original detection capability, we propose the novel concept for synthesis operation and colored synthetic operation. By the analysis on the relation among these operations, the ability to reserve original detection is verified. Then an improved colored judgement Petri Net machine is adopted for modeling and renewing the knowledge repository. The inductive learning method is used to extend the attack modes. It creates a four-layered concept space, which actually provides a depth-first search path for matching. To solve the problems in multi-pattern matching and incremental learning, various modes are generalized by colored operation. We also adopt the decomposition and synthesis operation to handle the pattern matching of distributed attack behavior and attack information fusion. Finally the actual cases verify that our algorithm is feasible

  11. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  12. Synthetic chromosomes.

    Science.gov (United States)

    Schindler, Daniel; Waldminghaus, Torsten

    2015-11-01

    What a living organism looks like and how it works and what are its components-all this is encoded on DNA, the genetic blueprint. Consequently, the way to change an organism is to change its genetic information. Since the first pieces of recombinant DNA have been used to transform cells in the 1970s, this approach has been enormously extended. Bigger and bigger parts of the genetic information have been exchanged or added over the years. Now we are at a point where the construction of entire chromosomes becomes a reachable goal and first examples appear. This development leads to fundamental new questions, for example, about what is possible and desirable to build or what construction rules one needs to follow when building synthetic chromosomes. Here we review the recent progress in the field, discuss current challenges and speculate on the appearance of future synthetic chromosomes. PMID:26111960

  13. Synthetic jet

    Czech Academy of Sciences Publication Activity Database

    Dančová, P.; Trávníček, Zdeněk; Vít, T.

    Praha: Institute of Thermomechanics AS CR, v. v. i., 2007 - (Zolotarev, I.), s. 35-36 ISBN 978-80-87012-06-2. [Engineering Mechanics 2007: national conference with international participation. Svratka (CZ), 14.05.2007-17.05.2007] R&D Projects: GA ČR GA101/05/2681 Institutional research plan: CEZ:AV0Z20760514 Keywords : synthetic jets * zero-net-mass-flux jet * flow control Subject RIV: BK - Fluid Dynamics

  14. FLOODING ATTACK AWARE SECURE AODV

    OpenAIRE

    Madhavi, S; K. Duraiswamy

    2013-01-01

    Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the ...

  15. Sulfate attack expansion mechanisms

    Energy Technology Data Exchange (ETDEWEB)

    Müllauer, Wolfram, E-mail: wolf_m@gmx.at; Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  16. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  17. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  18. Synthetically Simple, Highly Resilient Hydrogels

    OpenAIRE

    Cui, Jun; Lackey, Melissa A.; Madkour, Ahmad E.; Saffer, Erika M.; Griffin, David M.; Bhatia, Surita R.; Crosby, Alfred J.; Tew, Gregory N.

    2012-01-01

    Highly resilient synthetic hydrogels were synthesized by using the efficient thiol-norbornene chemistry to cross-link hydrophilic poly(ethylene glycol) (PEG) and hydrophobic polydimethylsiloxane (PDMS) polymer chains. The swelling and mechanical properties of the hydrogels were well-controlled by the relative amounts of PEG and PDMS. In addition, the mechanical energy storage efficiency (resilience) was more than 97% at strains up to 300%. This is comparable with one of the most resilient mat...

  19. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  20. Natural - synthetic - artificial!

    DEFF Research Database (Denmark)

    Nielsen, Peter E

    2010-01-01

    The terms "natural," "synthetic" and "artificial" are discussed in relation to synthetic and artificial chromosomes and genomes, synthetic and artificial cells and artificial life.......The terms "natural," "synthetic" and "artificial" are discussed in relation to synthetic and artificial chromosomes and genomes, synthetic and artificial cells and artificial life....

  1. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security of...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  2. Enzymes as catalysts in polymer chemistry

    OpenAIRE

    Sinigoi, Loris

    2011-01-01

    The use of enzymes in synthetic chemistry is attracting the interest of many researchers thanks to their extraordinary efficiency under mild conditions, high stereo- regio- and chemoselectivity and low environmental impact. Their application in the field of polymer chemistry has provided new synthetic strategies for useful polymers. The advantages coming from the use of enzymes are mainly: i) the possibility to synthesize polymers with novel properties and difficult to produce by conventional...

  3. Synthetic Brainbows

    KAUST Repository

    Wan, Y.

    2013-06-01

    Brainbow is a genetic engineering technique that randomly colorizes cells. Biological samples processed with this technique and imaged with confocal microscopy have distinctive colors for individual cells. Complex cellular structures can then be easily visualized. However, the complexity of the Brainbow technique limits its applications. In practice, most confocal microscopy scans use different florescence staining with typically at most three distinct cellular structures. These structures are often packed and obscure each other in rendered images making analysis difficult. In this paper, we leverage a process known as GPU framebuffer feedback loops to synthesize Brainbow-like images. In addition, we incorporate ID shuffing and Monte-Carlo sampling into our technique, so that it can be applied to single-channel confocal microscopy data. The synthesized Brainbow images are presented to domain experts with positive feedback. A user survey demonstrates that our synthetic Brainbow technique improves visualizations of volume data with complex structures for biologists.

  4. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  5. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the...... security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  6. Suicide Attacks on the Rise

    OpenAIRE

    CCS Research Staff

    2008-01-01

    This article was published in Culture and Conflict Review (March 2008), v.2 no.2 "The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star ...

  7. Coupling of Active Components to Synthetic Polymers

    DEFF Research Database (Denmark)

    Overgaard, Anne Kathrine Kattenhøj

    Arbejdet har fokuseret på fremstilling af kunstig ekstracellulær matrix (ECM) til fremme af den naturlige biologiske helingsproces ved vævsgendannelse efter store vævsskader. Særlig opmærksomhed har været på kemisk kobling af dermatan sulfat (DS), en naturlig glyco-saminoglycan (GAG), med en...

  8. Synthetic LPS-Binding Polymer Nanoparticles

    Science.gov (United States)

    Jiang, Tian

    Lipopolysaccharide (LPS), one of the principal components of most gram-negative bacteria's outer membrane, is a type of contaminant that can be frequently found in recombinant DNA products. Because of its strong and even lethal biological effects, selective LPS removal from bioproducts solution is of particular importance in the pharmaceutical and health care industries. In this thesis, for the first time, a proof-of-concept study on preparing LPS-binding hydrogel-like NPs through facile one-step free-radical polymerization was presented. With the incorporation of various hydrophobic (TBAm), cationic (APM, GUA) monomers and cross-linkers (BIS, PEG), a small library of NPs was constructed. Their FITC-LPS binding behaviors were investigated and compared with those of commercially available LPS-binding products. Moreover, the LPS binding selectivity of the NPs was also explored by studying the NPs-BSA interactions. The results showed that all NPs obtained generally presented higher FITC-LPS binding capacity in lower ionic strength buffer than higher ionic strength. However, unlike commercial poly-lysine cellulose and polymyxin B agarose beads' nearly linear increase of FITC-LPS binding with particle concentration, NPs exhibited serious aggregation and the binding quickly saturated or even decreased at high particle concentration. Among various types of NPs, higher FITC-LPS binding capacity was observed for those containing more hydrophobic monomers (TBAm). However, surprisingly, more cationic NPs with higher content of APM exhibited decreased FITC-LPS binding in high ionic strength conditions. Additionally, when new cationic monomer and cross-linker, GUA and PEG, were applied to replace APM and BIS, the obtained NPs showed improved FITC-LPS binding capacity at low NP concentration. But compared with APM- and BIS-containing NPs, the FITC-LPS binding capacity of GUA- and PEG-containing NPs saturated earlier. To investigate the NPs' binding to proteins, we tested the NPs-bovine serum albumin (BSA) binding, which showed that, different from NPs FITC-LPS interactions, variation of TBAm's content in NPs had very little influence on BSA binding, instead, more cationic NPs with higher content of APM were found to possess higher BSA binding. Additionally, GUA-containing NPs exhibited particularly high BSA binding capacity, especially under low ionic strength conditions. In the current formulations, the aggregation and saturation effects make NPs unsuitable in practical applications. Nevertheless, we anticipate that by attaching NPs onto certain substrates, particles may be effectively separated from each other, and the NPs' LPS binding capacity could potentially be further improved.

  9. Transferases in Polymer Chemistry

    NARCIS (Netherlands)

    van der Vlist, Jeroen; Loos, Katja; Palmans, ARA; Heise, A

    2010-01-01

    Transferases are enzymes that catalyze reactions in which a group is transferred from one compound to another. This makes these enzymes ideal catalysts for polymerization reactions. In nature, transferases are responsible for the synthesis of many important natural macromolecules. In synthetic polym

  10. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  11. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  12. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  13. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  14. Acute ischemic cerebral attack

    Directory of Open Access Journals (Sweden)

    Franco-Garcia Samir

    2010-12-01

    Full Text Available The decrease of the cerebral blood flow below the threshold of autoregulation led to changes of cerebral ischemia and necrosis that traduce in signs and symtoms of focal neurologic dysfunction called acute cerebrovascular symdrome (ACS or stroke. Two big groups according to its etiology are included in this category the hemorragic that constitue a 20% and the ischemic a 80% of cases. Great interest has wom the ischemic ACS because of its high social burden, being the third cause of no violent death in the world and the first of disability. Many risk factors favor the presentation of these events and some of them are susceptible of modification and therfore are objetives of primary prevention just as the control of diabetes, hypertension and the practice of healthy habits of life. The advances in the knowledge of the physiopatology, had taken to sustantial change in the nomenclature and management of ischemic ACS. Within these changes it was substituted the term cerebrovascular accident fo acute stroke, making emphasis in the key rol of a timely management with goals of time similiar to the acute coronary syndrome. It was redefined the time of acute ischemic attack to a one hour. Once stablished the cerebrovascular attack the semiology of symtoms with frecuency will led us make a topographic diagnosis of the in injury that joined to the cerebral TAC will allow us to exclude an hemorragic event and to start the treatment. In the management of these patients its essential the coordination of the differents teams of work, from the early recognition of symtoms on the part of patients andthe family, the rapid activation and response of emergency systems and the gearing of health care institutions. Are pillars of treatment: the abcde of reanimatiion, to avoid the hiperpirexis, the seizures, the hipoglicemy, the hiperglicemy, to achieve the thrombolysis in the first three hours of the begining of symtoms, to use antiplatelets, antithrombotic profilaxis

  15. Panic Attacks and Panic Disorders

    OpenAIRE

    Fontaine, Rejean; Beaudry, Paul

    1984-01-01

    The diagnosis and treatment of panic attacks and panic disorders have progressed markedly during the last decade. Unlike phobic disorders, the key feature of panic disorders is the many panic attacks that are mostly spontaneous or not caused by a particular situation. Recent studies linking its pathogenesis with lactate infusion tests are reviewed. For treatment, psychotherapy combined with in vivo exposure and pharmacotherapy is more efficacious than either treatment alone. In most cases, ps...

  16. Impersonation Attack on EKE Protocol

    OpenAIRE

    Shirisha Tallapally

    2010-01-01

    The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, hence the protocol should resist all types of password guessing attacks. Recently ECC-3PEKE protocol has been proposed by Chang and Chang. They claimed the protocol is secure, efficient and practical. Unless their claims Yoon and Yoo presented an Undetectable online password guessing attack on the above protocol. A key r...

  17. Migraine attacks the Basal Ganglia

    OpenAIRE

    Bigal Marcelo; Brawn Jennifer; Pendse Gautam; Nutile Lauren; Becerra Lino; Maleki Nasim; Burstein Rami; Borsook David

    2011-01-01

    Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unr...

  18. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  19. Luminescent Metal-Containing Polymers for White Light Emission.

    Science.gov (United States)

    Ho, Cheuk-Lam; Wong, Wai-Yeung

    2016-10-01

    This chapter focuses on the recent developments in luminescent metallopolymers. Synthetic routes to these polymers are briefly described and their applications in polymer white light-emitting diodes are discussed. PMID:27573506

  20. Synthetic biology, inspired by synthetic chemistry

    OpenAIRE

    Malinova, V; Nallani, M.; Meier, W. P.; Sinner, E. K.

    2012-01-01

    The topic synthetic biology appears still as an 'empty basket to be filled'. However, there is already plenty of claims and visions, as well as convincing research strategies about the theme of synthetic biology. First of all, synthetic biology seems to be about the engineering of biology -about bottom-up and top-down approaches, compromising complexity versus stability of artificial architectures, relevant in biology. Synthetic biology accounts for heterogeneous approaches towards minimal an...

  1. Degradation effects in polymers

    International Nuclear Information System (INIS)

    The extremely long molecular chains of polymers can be broken easily by the absorption of a quantum of energy above the energy of the covalent bond of the main carbon chain, which typically is in the range of 5-10 eV. The energy of beta and gamma photons of 1 to 10 MeV surpasses by many orders of magnitude this minimum value, representing a high risk of degradation to all kind of polymers, naturals and synthetics alike. The protection of polymers against high doses (20 - 1000 kGy) requires efficient additives preventing and/or stopping chain reaction type oxidative degradation. Primary and secondary antioxidants work well here in synergy. Commercial raw materials are available for radiation-sterilizable medical devices made out of polyolefins and other thermoplastics. Similarly, polymer compounds of suitable formulae are offered commercially for high-dose applications of polymers in nuclear installations. The controlled degradation of polymers of large molecular mass - or even of cross-linked molecular structures - is a promising field of radiation application. One area here is related to recycling non-accessible polymers such as fluorinated plastics of cross-linked rubber products. Another large possible area is the controlled radiation degradation of natural polymer systems. Radiation may facilitate the access to cross-linked natural polymer systems, such as wood, plant cellulose and biomass in general, decreasing to use of aggressive chemicals. The result is energetically favorable, environmentally friendly new procedures and raw materials of natural origin. A limited dose applied to polymers - although may cause some degradation - however may initiate new bonds on the 'wounded' chain. The popular graft-copolymerization technique can be applied in new, up-coming polymer processing technologies such as alloying, composite processing and reconstitutive recycling. By this way, even those polymers described earlier as radiation-degrading types, can be cross

  2. Polymer films

    Science.gov (United States)

    Granick, Steve; Sukhishvili, Svetlana A.

    2008-12-30

    A film contains a first polymer having a plurality of hydrogen bond donating moieties, and a second polymer having a plurality of hydrogen bond accepting moieties. The second polymer is hydrogen bonded to the first polymer.

  3. Routing of individual polymers in designed patterns

    DEFF Research Database (Denmark)

    Knudsen, Jakob Bach; Liu, Lei; Kodal, Anne Louise Bank;

    2015-01-01

    Synthetic polymers are ubiquitous in the modern world, but our ability to exert control over the molecular conformation of individual polymers is very limited. In particular, although the programmable self-assembly of oligonucleotides and proteins into artificial nanostructures has been...... demonstrated, we currently lack the tools to handle other types of synthetic polymers individually and thus the ability to utilize and study their single-molecule properties. Here we show that synthetic polymer wires containing short oligonucleotides that extend from each repeat can be made to assemble...... into arbitrary routings. The wires, which can be more than 200 nm in length, are soft and bendable, and the DNA strands allow individual polymers to self-assemble into predesigned routings on both two- and three-dimensional DNA origami templates. The polymers are conjugated and potentially conducting, and could...

  4. VoIP Malware: Attack Tool & Attack Scenarios

    OpenAIRE

    Nassar, Mohamed; State, Radu; Festor, Olivier

    2009-01-01

    With the appearance of new Internet services like Voice over IP and IP television, malwares are in the way to update and extend their targets. In this paper, we discuss the emergence of a new generation of malwares attacking VoIP infrastructures and services. Such malwares constitute a real threat to the currently deployed VoIP architectures without strong security measures in place. We present one implemented environment that can be used to evaluate such attacks. Our ``VoIP bots'' support a ...

  5. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  6. Synthetically simple, highly resilient hydrogels.

    Science.gov (United States)

    Cui, Jun; Lackey, Melissa A; Madkour, Ahmad E; Saffer, Erika M; Griffin, David M; Bhatia, Surita R; Crosby, Alfred J; Tew, Gregory N

    2012-03-12

    Highly resilient synthetic hydrogels were synthesized by using the efficient thiol-norbornene chemistry to cross-link hydrophilic poly(ethylene glycol) (PEG) and hydrophobic polydimethylsiloxane (PDMS) polymer chains. The swelling and mechanical properties of the hydrogels were controlled by the relative amounts of PEG and PDMS. The fracture toughness (G(c)) was increased to 80 J/m(2) as the water content of the hydrogel decreased from 95% to 82%. In addition, the mechanical energy storage efficiency (resilience) was more than 97% at strains up to 300%. This is comparable with one of the most resilient materials known: natural resilin, an elastic protein found in many insects, such as in the tendons of fleas and the wings of dragonflies. The high resilience of these hydrogels can be attributed to the well-defined network structure provided by the versatile chemistry, low cross-link density, and lack of secondary structure in the polymer chains. PMID:22372639

  7. Polymers for Protein Conjugation

    Directory of Open Access Journals (Sweden)

    Gianfranco Pasut

    2014-01-01

    Full Text Available Polyethylene glycol (PEG at the moment is considered the leading polymer for protein conjugation in view of its unique properties, as well as to its low toxicity in humans, qualities which have been confirmed by its extensive use in clinical practice. Other polymers that are safe, biodegradable and custom-designed have, nevertheless, also been investigated as potential candidates for protein conjugation. This review will focus on natural polymers and synthetic linear polymers that have been used for protein delivery and the results associated with their use. Genetic fusion approaches for the preparation of protein-polypeptide conjugates will be also reviewed and compared with the best known chemical conjugation ones.

  8. Dendritic Polymers for Theranostics

    Science.gov (United States)

    Ma, Yuan; Mou, Quanbing; Wang, Dali; Zhu, Xinyuan; Yan, Deyue

    2016-01-01

    Dendritic polymers are highly branched polymers with controllable structures, which possess a large population of terminal functional groups, low solution or melt viscosity, and good solubility. Their size, degree of branching and functionality can be adjusted and controlled through the synthetic procedures. These tunable structures correspond to application-related properties, such as biodegradability, biocompatibility, stimuli-responsiveness and self-assembly ability, which are the key points for theranostic applications, including chemotherapeutic theranostics, biotherapeutic theranostics, phototherapeutic theranostics, radiotherapeutic theranostics and combined therapeutic theranostics. Up to now, significant progress has been made for the dendritic polymers in solving some of the fundamental and technical questions toward their theranostic applications. In this review, we briefly summarize how to control the structures of dendritic polymers, the theranostics-related properties derived from their structures and their theranostics-related applications.

  9. Pictures of Synthetic Biology

    OpenAIRE

    Cserer, Amelie; Seiringer, Alexandra

    2009-01-01

    This article is concerned with the representation of Synthetic Biology in the media and by biotechnology experts. An analysis was made of German-language media articles published between 2004 and 2008, and interviews with biotechnology-experts at the Synthetic Biology conference SB 3.0 in Zurich 2007. The results have been reflected in terms of the definition of Synthetic Biology, applications of Synthetic Biology and the perspectives of opportunities and risks. In the media, Synthetic Biolog...

  10. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica...

  11. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  12. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  13. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  14. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of a...

  15. Synthetic jet actuation for load control

    International Nuclear Information System (INIS)

    The reduction of wind turbine blade loads is an important issue in the reduction of the costs of energy production. Reduction of the loads of a non-cyclic nature requires so-called smart rotor control, which involves the application of distributed actuators and sensors to provide fast and local changes in aerodynamic performance. This paper investigates the use of synthetic jets for smart rotor control. Synthetic jets are formed by ingesting low-momentum fluid from the boundary layer along the blade into a cavity and subsequently ejecting this fluid with a higher momentum. We focus on the observed flow phenomena and the ability to use these to obtain the desired changes of the aerodynamic properties of a blade section. To this end, numerical simulations and wind tunnel experiments of synthetic jet actuation on a non-rotating NACA0018 airfoil have been performed. The synthetic jets are long spanwise slits, located close to the trailing edge and directed perpendicularly to the surface of the airfoil. Due to limitations of the present experimental setup in terms of performance of the synthetic jets, the main focus is on the numerical flow simulations. The present results show that high-frequency synthetic jet actuation close to the trailing edge can induce changes in the effective angle of attack up to approximately 2.9°

  16. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  17. "Synthetic Metals": A Novel Role for Organic Polymers (Nobel Lecture) Copyright((c)) The Nobel Foundation 2001. We thank the Nobel Foundation, Stockholm, for permission to print this lecture.

    Science.gov (United States)

    MacDiarmid, Alan G.

    2001-07-16

    Since the initial discovery in 1977, that polyacetylene (CH)(x), now commonly known as the prototype conducting polymer, could be p- or n-doped either chemically or electrochemically to the metallic state, the development of the field of conducting polymers has continued to accelerate at an unexpectedly rapid rate and a variety of other conducting polymers and their derivatives have been discovered. Other types of doping are also possible, such as "photo-doping" and "charge-injection doping" in which no counter dopant ion is involved. One exciting challenge is the development of low-cost disposable plastic/paper electronic devices. Conventional inorganic conductors, such as metals, and semiconductors, such as silicon, commonly require multiple etching and lithographic steps in fabricating them for use in electronic devices. The number of processing and etching steps involved limits the minimum price. On the other hand, conducting polymers combine many advantages of plastics, for example, flexibility and processing from solution, with the additional advantage of conductivity in the metallic or semiconducting regimes; however, the lack of simple methods to obtain inexpensive conductive polymer shapes/patterns limit many applications. Herein is described a novel, simple, and cheap method to prepare patterns of conducting polymers by a process which we term, "Line Patterning". PMID:11458347

  18. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang

    2012-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to

  19. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  20. Hidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation

    OpenAIRE

    Deka, Deepjyoti; Baldick, Ross; Vishwanath, Sriram

    2014-01-01

    Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an adversary trying to manipulate state estimators. The adversary gains control of a few meters, and is...

  1. Radiation Synthesis of Superabsorbent Polymers Based on Natural Polymers

    International Nuclear Information System (INIS)

    The objectives of proposed research contract were first synthesize superabsorbent polymers based on natural polymers to be used as disposable diapers and soil conditioning materials in agriculture, horticulture and other super adsorbent using industries. We have planned to use the natural polymers; locust beam gum, tara gum, guar gum and sodium alginate on the preparation of natural superabsorbent polymers(SAP). The aqueous solution of natural polymers and their blends with trace amount of monomer and cross-linking agents will be irradiated in paste like conditions by gamma rays for the preparation of cross-linked superabsorbent systems. The water absorption and deswellling capacity of prepared super adsorbents and retention capacity, absorbency under load, suction power, swelling pressure and pet-rewet properties will be determined. Use of these materials instead of synthetic super absorbents will be examined by comparing the performance of finished products. The experimental studies achieved in the second year of project mainly on the effect of radiation on the chemistry of sodium alginate polymers in different irradiation conditions and structure-property relationship particularly with respect to radiation induced changes on the molecular weight of natural polymers and preliminary studies on the synthesis of natural-synthetic hydride super adsorbent polymers were given in details

  2. Starch-based completely biodegradable polymer materials

    Directory of Open Access Journals (Sweden)

    2009-06-01

    Full Text Available Starch is a natural polymer which possesses many unique properties and some shortcoming simultaneously. Some synthetic polymers are biodegradable and can be tailor-made easily. Therefore, by combining the individual advantages of starch and synthetic polymers, starch-based completely biodegradable polymers (SCBP are potential for applications in biomedical and environmental fields. Therefore it received great attention and was extensively investigated. In this paper, the structure and characteristics of starch and some synthetic degradable polymers are briefly introduced. Then, the recent progress about the preparation of SCBP via physical blending and chemical modification is reviewed and discussed. At last, some examples have been presented to elucidate that SCBP are promising materials for various applications and their development is a good solution for reducing the consumption of petroleum resources and environmental problem.

  3. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  4. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  5. Diabetes Ups Risk of Heart Attack Death

    Science.gov (United States)

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  6. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    ... medlineplus.gov/ency/patientinstructions/000080.htm Diabetes - preventing heart attack and stroke To use the sharing features on ... with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure ...

  7. Heart attack - what to ask your doctor

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000231.htm Heart attack - what to ask your doctor To use the ... features on this page, please enable JavaScript. A heart attack occurs when blood flow to a part of ...

  8. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  9. DULOXETINE-RELATED PANIC ATTACKS

    OpenAIRE

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-01-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients’ trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who respon...

  10. Coyote Attacks: An Increasing Suburban Problem

    OpenAIRE

    Timm, Robert M.; Baker, Rex O.; Bennett, Joe R.; Coolahan, Craig C.

    2004-01-01

    Coyote attacks on humans and pets have increased within the past 5 years in California. We discuss documented occurrences of coyote aggression and attacks on people, using data from USDA Wildlife Services, the California Department of Fish & Game, and other sources. Forty-eight such attacks on children and adults were verified from 1998 through 2003, compared to 41 attacks during the period 1988 through 1997; most incidents occurred in Southern California near the suburban-wildland interfac...

  11. Sybil attack in Wireless Sensor Network

    OpenAIRE

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  12. Faked states attack and quantum cryptography protocols

    CERN Document Server

    Denny, Travis

    2011-01-01

    Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems. This attack exploits a weakness in the typical real-world implementation of quantum cryptosystems. Cryptanalysts have successfully attacked several protocols. In this paper, we examine the Kak quantum cryptography protocol and how it may perform under such attacks.

  13. Panic attacks simulate presence of somatic illnesses

    OpenAIRE

    Latas Milan; Soldatović Ivan; Stamenović Marko; Starčević Vladan

    2009-01-01

    Introduction. Panic attacks are characterized with sudden attacks of anxiety with numerous somatic symptoms, such as palpitations, tachycardia, tachypnea, nausea, vertigo. The objective of this study was to analyze symptoms of panic attacks in patients with panic disorder, especially, to determine the specific relationship of somatic and neurological symptoms of panic attacks in boundaries of somatic systems. Material and methods. The study sample consisted of 97 patients with primary diagnos...

  14. Amylase action pattern on starch polymers

    OpenAIRE

    Bijttebier, Annabel; Goesaert, Hans; Delcour, Jan

    2008-01-01

    Several decades ago, the first reports on differences in action pattern between amylases from different sources indicated that the starch polymers are not degraded in a completely random manner. We here give an overview of different action patterns of amylases on amylose and amylopectin, focusing on the so-called multiple attack action of the enzymes. Nowadays, the multiple attack action is generally an accepted concept to explain the differences in amylase action pattern. However, the pancre...

  15. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  16. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Stroke More Understand Your Risks to Prevent a Heart Attack Updated:Aug 2,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  17. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  18. A Novel Attack against Android Phones

    CERN Document Server

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  19. Vanadium Attack with Sigma Phase Occurrence in Fe-CrNi Alloy (ASTM A447)

    International Nuclear Information System (INIS)

    The vanadium attack of sigma phase occurrence in high chromium-nickel steel (ASTM A447) has been studied in fuel oil combustion environment. 80mole% V2O5-20mole% Na2SO4 was used as corrosive synthetic ash. Using metallograph and scanning electron microscope, various changes of microstructure of the specimen were observed in the corrosion process. The vanadium attack was affected by carbide rather than sigma phase in initial period of the test, but in the later period, sigma phase occurrence was more related for the attack. Vanadium attack seemed to be propagated along the boundary of matrix and sigma phase. Finally, sigma phase itself might be flaked out from grain boundary. However, stress corrosion cracking might be propagated through sigma phase which is brittle

  20. The structural diversity of artificial genetic polymers

    OpenAIRE

    Anosova, Irina; Kowal, Ewa A.; Dunn, Matthew R.; Chaput, John C.; Van Horn, Wade D.; Egli, Martin

    2015-01-01

    Synthetic genetics is a subdiscipline of synthetic biology that aims to develop artificial genetic polymers (also referred to as xeno-nucleic acids or XNAs) that can replicate in vitro and eventually in model cellular organisms. This field of science combines organic chemistry with polymerase engineering to create alternative forms of DNA that can store genetic information and evolve in response to external stimuli. Practitioners of synthetic genetics postulate that XNA could be used to safeg...

  1. Low band gap polymers for organic photovoltaics

    DEFF Research Database (Denmark)

    Bundgaard, Eva; Krebs, Frederik C

    2007-01-01

    Low band gap polymer materials and their application in organic photovoltaics (OPV) are reviewed. We detail the synthetic approaches to low band gap polymer materials starting from the early methodologies employing quinoid homopolymer structures to the current state of the art that relies...

  2. Bio-based polycarbonate as synthetic toolbox

    Science.gov (United States)

    Hauenstein, O.; Agarwal, S.; Greiner, A.

    2016-06-01

    Completely bio-based poly(limonene carbonate) is a thermoplastic polymer, which can be synthesized by copolymerization of limonene oxide (derived from limonene, which is found in orange peel) and CO2. Poly(limonene carbonate) has one double bond per repeating unit that can be exploited for further chemical modifications. These chemical modifications allow the tuning of the properties of the aliphatic polycarbonate in nearly any direction. Here we show synthetic routes to demonstrate that poly(limonene carbonate) is the perfect green platform polymer, from which many functional materials can be derived. The relevant examples presented in this study are the transformation from an engineering thermoplastic into a rubber, addition of permanent antibacterial activity, hydrophilization and even pH-dependent water solubility of the polycarbonate. Finally, we show a synthetic route to yield the completely saturated counterpart that exhibits improved heat processability due to lower reactivity.

  3. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  4. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  5. Polymers in cell encapsulation from an enveloped cell perspective

    NARCIS (Netherlands)

    de Vos, Paul; Lazarjani, Hamideh Aghajani; Poncelet, Denis; Faas, Marijke M.

    2014-01-01

    In the past two decades, many polymers have been proposed for producing immunoprotective capsules. Examples include the natural polymers alginate, agarose, chitosan, cellulose, collagen, and xanthan and synthetic polymers poly(ethylene glycol), polyvinyl alcohol, polyurethane, poly(ether-sulfone), p

  6. Conjugated polymers containing diketopyrrolopyrrole units in the main chain

    OpenAIRE

    Bernd Tieke; A. Raman Rabindranath; Kai Zhang; Yu Zhu

    2010-01-01

    Research activities in the field of diketopyrrolopyrrole (DPP)-based polymers are reviewed. Synthetic pathways to monomers and polymers, and the characteristic properties of the polymers are described. Potential applications in the field of organic electronic materials such as light emitting diodes, organic solar cells and organic field effect transistors are discussed.

  7. Attacking Embedded Systems through Power Analysis

    Directory of Open Access Journals (Sweden)

    Dr. Sastry JKR

    2011-03-01

    Full Text Available Embedded Systems are being used for the development and implementation of Safety and Mission Critical Systems. Malfunctions of such type of embedded systems will lead to disasters at times. The embedded systems must be fully secured from outside intervention in order to have effective functioning as well as to provide protective environment to these mission critical systems. There are several attacking systems discussed in the literature each requiring a kind of counter attacking system. Power Analysis and variations of power analysis are the significant attacking mechanisms discussed in the literature. Crypto servers are the main areas of attacking as they deal with securing the data that flow in-between several components of the embedded systems. Most of the attacking systems suggested in the litterer suffer from lack of experimental models to emulate the attacking system. An attacking system could be amply proved when several samples of data are used for attacking and the samples of data provides for knowledge base. In this paper an experimental setup is proposed which is an embedded system itself for creation of a Knowledgebase which shall form the basis for attacking. The experimental setup required for undertaking the actual attacking with the usage of the knowledgebase is also presented. Further the proposed attacking system is applied for mission critical system and the experimental results obtained through the simulation are also presented.

  8. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  9. Fragmentation pathways of polymer ions.

    Science.gov (United States)

    Wesdemiotis, Chrys; Solak, Nilüfer; Polce, Michael J; Dabney, David E; Chaicharoen, Kittisak; Katzenmeyer, Bryan C

    2011-01-01

    Tandem mass spectrometry (MS/MS) is increasingly applied to synthetic polymers to characterize chain-end or in-chain substituents, distinguish isobaric and isomeric species, and determine macromolecular connectivities and architectures. For confident structural assignments, the fragmentation mechanisms of polymer ions must be understood, as they provide guidelines on how to deduce the desired information from the fragments observed in MS/MS spectra. This article reviews the fragmentation pathways of synthetic polymer ions that have been energized to decompose via collisionally activated dissociation (CAD), the most widely used activation method in polymer analysis. The compounds discussed encompass polystyrenes, poly(2-vinyl pyridine), polyacrylates, poly(vinyl acetate), aliphatic polyester copolymers, polyethers, and poly(dimethylsiloxane). For a number of these polymers, several substitution patterns and architectures are considered, and questions regarding the ionization agent and internal energy of the dissociating precursor ions are also addressed. Competing and consecutive dissociations are evaluated in terms of the structural insight they provide about the macromolecular structure. The fragmentation pathways of the diverse array of polymer ions examined fall into three categories, viz. (1) charge-directed fragmentations, (2) charge-remote rearrangements, and (3) charge-remote fragmentations via radical intermediates. Charge-remote processes predominate. Depending on the ionizing agent and the functional groups in the polymer, the incipient fragments arising by pathways (1)-(3) may form ion-molecule complexes that survive long enough to permit inter-fragment hydrogen atom, proton, or hydride transfers. PMID:20623599

  10. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  11. Polymer Chemistry and Liposome Technology

    OpenAIRE

    Tirrell, David A.

    1988-01-01

    Polymer chemistry has a great deal to offer in the construction of synthetic liposomal membranes for use in biology and medicine. This chapter explores the preparation and properties of polymeric liposomes , with particular emphasis on the use of controlled polyelectrolyte adsorption to manipulate liposomal membrane properties.

  12. Molecularly imprinted polymers for mycotoxins

    Science.gov (United States)

    Molecularly imprinted polymers (MIPs) are a class of synthetic receptors capable of selective recognition of analytes. Recent developments in imprinting technology have made it possible to apply this technology in a range of applications, including mycotoxin detection. Structure-activity relations...

  13. Single-chain technology using discrete synthetic macromolecules

    Science.gov (United States)

    Ouchi, Makoto; Badi, Nezha; Lutz, Jean-François; Sawamoto, Mitsuo

    2011-12-01

    Fundamental polymer science is undergoing a profound transformation. As a result of recent progress in macromolecular chemistry and physics, synthetic polymer chains are becoming much more than just the modest building blocks of traditional 'plastics'. Promising options for controlling the primary and secondary structures of synthetic polymers have been proposed and, therefore, similarly to biopolymers, synthetic macromolecules may now be exploited as discrete objects with carefully engineered structures and functions. Although it is not possible today to reach the high level of complexity found in biomaterials, these new chemical possibilities open interesting avenues for applications in microelectronics, photovoltaics, catalysis and biotechnology. Here, we describe in detail these recent advances in macromolecular science and emphasize the possible emergence of technologies based on single-chain devices.

  14. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  15. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  16. Development of partially biodegradable foams from PP/HMSPP blends with natural and synthetic polymers; Desenvolvimento de espumas parcialmente biodegradaveis a partir de blendas de PP/HMSPP com polimeros naturais e sinteticos

    Energy Technology Data Exchange (ETDEWEB)

    Cardoso, Elizabeth Carvalho Leite

    2014-07-01

    Polymers are used in various application and in different industrial areas providing enormous quantities of wastes in environment. Among diverse components of residues in landfills are polymeric materials, including Polypropylene, which contribute with 20 to 30% of total volume of solid residues. As polymeric materials are immune to microbial degradation, they remain in soil and in landfills as a semi-permanent residue. Environmental concerning in litter reduction is being directed to renewable polymers development for manufacturing of polymeric foams. Foamed polymers are considered future materials, with a wide range of applications; high density structural foams are specially used in civil construction, in replacement of metal, woods and concrete with a final purpose of reducing materials costs. At present development, it was possible the incorporation of PP/HMSPP polymeric matrix blends with sugarcane bagasse, PHB and PLA, in structural foams production. Thermal degradation at 100, 120 and 160 deg C temperatures was not enough to induce biodegradability. Gamma irradiation degradation, at 50, 100, 200 and 500 kGy showed effective for biodegradability induction. Irradiated bagasse blends suffered surface erosion, in favor of water uptake and consequently, a higher biodegradation in bulk structure. (author)

  17. To mitigate Black-hole attack with CBDS in MANET

    OpenAIRE

    Navjot; Er.Pooja Ran

    2015-01-01

    Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperati...

  18. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  19. Polymer Directed Protein Assemblies

    Directory of Open Access Journals (Sweden)

    Patrick van Rijn

    2013-05-01

    Full Text Available Protein aggregation and protein self-assembly is an important occurrence in natural systems, and is in some form or other dictated by biopolymers. Very obvious influences of biopolymers on protein assemblies are, e.g., virus particles. Viruses are a multi-protein assembly of which the morphology is dictated by poly-nucleotides namely RNA or DNA. This “biopolymer” directs the proteins and imposes limitations on the structure like the length or diameter of the particle. Not only do these bionanoparticles use polymer-directed self-assembly, also processes like amyloid formation are in a way a result of directed protein assembly by partial unfolded/misfolded biopolymers namely, polypeptides. The combination of proteins and synthetic polymers, inspired by the natural processes, are therefore regarded as a highly promising area of research. Directed protein assembly is versatile with respect to the possible interactions which brings together the protein and polymer, e.g., electrostatic, v.d. Waals forces or covalent conjugation, and possible combinations are numerous due to the large amounts of different polymers and proteins available. The protein-polymer interacting behavior and overall morphology is envisioned to aid in clarifying protein-protein interactions and are thought to entail some interesting new functions and properties which will ultimately lead to novel bio-hybrid materials.

  20. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  1. Classification of Attacks in Wireless Sensor Networks

    OpenAIRE

    Messai, Mohamed-Lamine

    2014-01-01

    In wireless sensor networks (WSNs), security has a vital importance. Recently, there was a huge interest to propose security solutions in WSNs because of their applications in both civilian and military domains. Adversaries can launch different types of attacks, and cryptography is used to countering these attacks. This paper presents challenges of security and a classification of the different possible attacks in WSNs. The problems of security in each layer of the network's OSI model are dis...

  2. Detection Block Model for SQL Injection Attacks

    OpenAIRE

    Diksha G. Kumar; Madhumita Chatterjee

    2014-01-01

    With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack te...

  3. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to...... properties of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  4. Synthetic cornea: biocompatibility and optics

    Science.gov (United States)

    Parel, Jean-Marie A.; Kaminski, Stefan; Fernandez, Viviana; Alfonso, E.; Lamar, Peggy; Lacombe, Emmanuel; Duchesne, Bernard; Dubovy, Sander; Manns, Fabrice; Rol, Pascal O.

    2002-06-01

    Purpose. Experimentally find a method to provide a safe surgical technique and an inexpensive and long lasting mesoplant for the restoration of vision in patients with bilateral corneal blindness due to ocular surface and stromal diseases. Methods. Identify the least invasive and the safest surgical technique for synthetic cornea implantation. Identify the most compatible biomaterials and the optimal shape a synthetic cornea must have to last a long time when implanted in vivo. Results. Penetrating procedures were deemed too invasive, time consuming, difficult and prone to long term complications. Therefore a non-penetrating delamination technique with central trephination was developed to preserve the integrity of Descemet's membrane and the anterior segment. Even though this approach limits the number of indications, it is acceptable since the majority of patients only have opacities in the stroma. The prosthesis was designed to fit in the removed tissue plane with its skirt fitted under the delaminated stroma. To improve retention, the trephination wall was made conical with the smallest opening on the anterior surface and a hat-shaped mesoplant was made to fit. The skirt was perforated in its perimeter to allow passage of nutrients and tissues ingrowths. To simplify the fabrication procedure, the haptic and optic were made of the same polymer. The intrastromal biocompatibility of several hydrogels was found superior to current clinically used PMMA and PTFE materials. Monobloc mesoplants made of 4 different materials were implanted in rabbits and followed weekly until extrusion occurred. Some remained optically clear allowing for fundus photography. Conclusions. Hydrogel synthetic corneas can be made to survive for periods longer than 1 year. ArF excimer laser photoablation studies are needed to determine the refractive correction potential of these mesoplants. A pilot FDA clinical trial is needed to assess the mesoplant efficacy and very long-term stability.

  5. Detecting Denial of Service Attacks in Tor

    Science.gov (United States)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  6. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  7. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  8. Two-dimensional polymers: concepts and perspectives.

    Science.gov (United States)

    Payamyar, Payam; King, Benjamin T; Öttinger, Hans Christian; Schlüter, A Dieter

    2016-01-01

    Creation of polymers comprised of repeat units that can create topologically planar macromolecules (rather than linear) has been the topic of several recent studies in the field of synthetic polymer chemistry. Such novel macromolecules, known as 2D polymers, are the result of advanced synthetic methodology which allows creation of monolayer sheets with a periodic internal structure and functional groups placed at predetermined sites under mild conditions. Given the promising potentials of 2D polymers, this feature paper aims at discussing the concept of these novel macromolecules from a topological viewpoint in Section 1. This is followed by spotlighting the expected behavior of 2D polymers in the context of polymer physics (entropy elasticity, strength, percolation, and persistence) and polymer chemistry (copolymers and growth kinetics) in Section 2. Section 3 delineates synthetic and analytical matters associated with 2D polymers followed by a brief final section highlighting the potential of these sheet-like macromolecules for application purposes. We hope this article will trigger the interest of chemists, physicists and engineers to help develop this encouraging new class of materials further such that societally relevant applications will be accessible in the market soon. PMID:26522010

  9. Utilization of Nitrones in Radical Polymerizations and Polymer Conjugations

    OpenAIRE

    Ranieri Lynn, Kayte

    2015-01-01

    Much research has been performed in the last 10 years on the use of nitrones in synthetic polymer chemistry. Nitrone polymer chemistry represents an additional tool to the “polymer toolbox”, which contributes to the advancement of modern polymer science and technology. In this present thesis, four interconnecting themes centered on the use of nitrones in radical polymerizations and coupling have been investigated. (1) Synthesize nitrones with various functionalities. (2) Utilize controlled ra...

  10. Polymer and polymer-hybrid nanoparticles from synthesis to biomedical applications

    CERN Document Server

    Rangelov, Stanislav

    2013-01-01

    Polymeric and hybrid nanoparticles have received increased scientific interest in terms of basic research as well as commercial applications, promising a variety of uses for nanostructures in fields including bionanotechnology and medicine. Condensing the relevant research into a comprehensive reference, Polymer and Polymer-Hybrid Nanoparticles: From Synthesis to Biomedical Applications covers an array of topics from synthetic procedures and macromolecular design to possible biomedical applications of nanoparticles and materials based on original and unique polymers. The book presents a well-r

  11. Variable Synthetic Capacitance

    Science.gov (United States)

    Kleinberg, L. L.

    1986-01-01

    Feedback amplifier circuit synthesizes electronically variable capacitance. Variable Synthetic Capacitor is amplifier circuit with follower/feedback configuration. Effective input capacitance depends on input set current. If synthetic capacitor is connected across resonant element of oscillator, oscillator frequency controlled via input set current. Circuit especially suitable for fine frequency adjustments of piezoelectric-crystal or inductor/capacitor resonant oscillators.

  12. Designing synthetic biology.

    Science.gov (United States)

    Agapakis, Christina M

    2014-03-21

    Synthetic biology is frequently defined as the application of engineering design principles to biology. Such principles are intended to streamline the practice of biological engineering, to shorten the time required to design, build, and test synthetic gene networks. This streamlining of iterative design cycles can facilitate the future construction of biological systems for a range of applications in the production of fuels, foods, materials, and medicines. The promise of these potential applications as well as the emphasis on design has prompted critical reflection on synthetic biology from design theorists and practicing designers from many fields, who can bring valuable perspectives to the discipline. While interdisciplinary connections between biologists and engineers have built synthetic biology via the science and the technology of biology, interdisciplinary collaboration with artists, designers, and social theorists can provide insight on the connections between technology and society. Such collaborations can open up new avenues and new principles for research and design, as well as shed new light on the challenging context-dependence-both biological and social-that face living technologies at many scales. This review is inspired by the session titled "Design and Synthetic Biology: Connecting People and Technology" at Synthetic Biology 6.0 and covers a range of literature on design practice in synthetic biology and beyond. Critical engagement with how design is used to shape the discipline opens up new possibilities for how we might design the future of synthetic biology. PMID:24156739

  13. Synthetic Aperture Sequential Beamforming

    DEFF Research Database (Denmark)

    Kortbek, Jacob; Jensen, Jørgen Arendt; Gammelmark, Kim Løkke

    2008-01-01

    A synthetic aperture focusing (SAF) technique denoted Synthetic Aperture Sequential Beamforming (SASB) suitable for 2D and 3D imaging is presented. The technique differ from prior art of SAF in the sense that SAF is performed on pre-beamformed data contrary to channel data. The objective is to...

  14. Agent Based Preventive Measure for UDP Flood Attack in DDoS Attacks

    Directory of Open Access Journals (Sweden)

    AARTI SINGH,

    2010-08-01

    Full Text Available Distributed Denial-of-Service (DDoS attack is an attack which makes victim resources and services unavailable to its intended users. In particular, User Datagram Protocol (UDP flood attack in DDoS attacks is a method causing host based denial of service. It occurs when attacker sends UDP packets to a random port on the victim system,causing responses to be sent to forged IP address. The basic thrust of this paper is agent based solution for UDP lood attack because software agent technology seems to be a strong candidate for defending DDoS attacks and very few researchers have thought of deploying agents towards providing solution for UDP attack earlier.

  15. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  16. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  17. The use of azide-alkyne click chemistry in recent syntheses and applications of polytriazole-based nanostructured polymers

    Science.gov (United States)

    Shi, Yi; Cao, Xiaosong; Gao, Haifeng

    2016-02-01

    The rapid development of efficient organic click coupling reactions has significantly facilitated the construction of synthetic polymers with sophisticated branched nanostructures. This Feature Article summarizes the recent progress in the application of efficient copper-catalyzed and copper-free azide-alkyne cycloaddition (CuAAC and CuFAAC) reactions in the syntheses of dendrimers, hyperbranched polymers, star polymers, graft polymers, molecular brushes, and cyclic graft polymers. Literature reports on the interesting properties and functions of these polytriazole-based nanostructured polymers are also discussed to illustrate their potential applications as self-healing polymers, adhesives, polymer catalysts, opto-electronic polymer materials and polymer carriers for drug and imaging molecules.

  18. A Efficient Approach for Password Attacks

    Directory of Open Access Journals (Sweden)

    I. Naga Geethika

    2014-03-01

    Full Text Available Online password guessing attacks has emerged as a major problem in password based systems. To avoid this we implemented many solutions day by day to restrict bruteforce attacks and password guessing attacks and dictionary attacks. The approach in this paper is that using of mobile alert messages and giving options to the mobile user for more security that will intimate admin that someone is trying to hack his email. The legal users/attackers are challenged to answer the code that is sent to the mobile to retrieve the login page when the number of failed login attempts from a single machine crosses certain threshold value. This protocol uses either the IP addresses of the machines or the browser cookies, or both to identify the machines from which successful logins are made previously. A machine is said to be known when a successful login is made from it and its IP address is added to whitelist. The main goal of this protocol is to limit the attackers with a few failed login attempts made from each unknown machine and forcing them to challenge the security options. Attackers can have a threshold value (For ex 5 which is Whenever a user/attacker types an invalid username.

  19. Panic attacks simulate presence of somatic illnesses

    Directory of Open Access Journals (Sweden)

    Latas Milan

    2009-01-01

    Full Text Available Introduction. Panic attacks are characterized with sudden attacks of anxiety with numerous somatic symptoms, such as palpitations, tachycardia, tachypnea, nausea, vertigo. The objective of this study was to analyze symptoms of panic attacks in patients with panic disorder, especially, to determine the specific relationship of somatic and neurological symptoms of panic attacks in boundaries of somatic systems. Material and methods. The study sample consisted of 97 patients with primary diagnosis of panic disorder, without any acute, severe and unstable somatic illness. The presence and frequency of symptoms of panic attacks were estimated by the Panic Disorder Questionnaire. Results. The study results indicate that the most frequent symptoms of panic attacks were cardiological signs (heart pounding or racing and trembling, followed by unsteady and fainting feeling symptoms, sweating, respiratory symptoms and gastroenterological symptoms. The results of correlation analyses indicate that symptoms of panic attacks classified into cardio-vascular, gastro-enterological, respiratory and neuro-otological systems show statistically significant correlations. Conclusion. The results of analyses of symptoms of panic attacks point to their intercorrelation. This specific association of the symptoms, if they are examined on their own in the patients, could lead to false clinical manifestation of some somatic illness. Therefore, it is necessary to analyze adequately and make the proper differential diagnosis of patients with panic disorder.

  20. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  1. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  2. The cost of attack in competing networks.

    Science.gov (United States)

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  3. Automated Detection System for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Dr K.V.N.Sunitha

    2010-10-01

    Full Text Available Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL Injection vulnerability (SQLIV, which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. The intent is that Web applications will limit the kinds of queries that can be generated to a safe subset of all possible queries, regardless of what input users provide. SQL Injection attacks are possible due to the design drawbacks of the web sites, which interact with back-end databases. Successful attacks may damage more. We introduce a system that deals with new automated technique for preventing SQLIA based on the novel concept of regular expressions is to detect SQL Injection attacks. The proposed system can detect the attacks that are from Internet and Insider Attacks, by analyzing the packets of the network servers.

  4. Conjugated Polymers for Energy Production

    DEFF Research Database (Denmark)

    Livi, Francesco

    This dissertation is aimed at developing materials for flexible, large area, ITO-free polymer solar cells (PSCs) fully printed under ambient conditions. A large screening of conjugated polymers, both novel and well-known materials, has been carried out in order to find suitable candidates...... for scalable PSCs fully printed under ambient conditions [Adv. Energy Mater. 2015, 5, 1402186]. PPDTBT resulted to be the conjugated polymer with the best photovoltaic performance within the 104 synthesized macromolecules. Therefore, further studies have been done on such material. The impact of side chain...... arylation (DAr) and direct arylation polymerization (DArP) have been applied to the preparation of PPDTBT, making this polymer readily available in only 4 synthetic steps and thus easily transferable to a large scale-production setup. DArP avoids organometallic species and therefore is an appealing...

  5. Enhancing network robustness against targeted and random attacks using a memetic algorithm

    Science.gov (United States)

    Tang, Xianglong; Liu, Jing; Zhou, Mingxing

    2015-08-01

    In the past decades, there has been much interest in the elasticity of infrastructures to targeted and random attacks. In the recent work by Schneider C. M. et al., Proc. Natl. Acad. Sci. U.S.A., 108 (2011) 3838, the authors proposed an effective measure (namely R, here we label it as R t to represent the measure for targeted attacks) to evaluate network robustness against targeted node attacks. Using a greedy algorithm, they found that the optimal structure is an onion-like one. However, real systems are often under threats of both targeted attacks and random failures. So, enhancing networks robustness against both targeted and random attacks is of great importance. In this paper, we first design a random-robustness index (Rr) . We find that the onion-like networks destroyed the original strong ability of BA networks in resisting random attacks. Moreover, the structure of an R r -optimized network is found to be different from that of an onion-like network. To design robust scale-free networks (RSF) which are resistant to both targeted and random attacks (TRA) without changing the degree distribution, a memetic algorithm (MA) is proposed, labeled as \\textit{MA-RSF}\\textit{TRA} . In the experiments, both synthetic scale-free networks and real-world networks are used to validate the performance of \\textit{MA-RSF}\\textit{TRA} . The results show that \\textit{MA-RSF} \\textit{TRA} has a great ability in searching for the most robust network structure that is resistant to both targeted and random attacks.

  6. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  7. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  8. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  9. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers....

  10. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  11. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  12. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  13. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  14. Research on First Attack Probability Model of an Attacker Level Bombing Anti-air Radars

    Institute of Scientific and Technical Information of China (English)

    LUO Peng-cheng; MU Fu-ling; ZHOU Jing-lun

    2007-01-01

    The paper mainly studies the first attack probability (FAP) of an attacker level bombing anti-air radars through analyzing the radiant point orientation and attack (RPOA) process of attackers. Firstly, the searching target process is analyzed, and a corresponding target finding model is brought forward. Secondly, the target approaching process is concretely analyzed when the attacker levelly bombs the anti-air radar, and a corresponding target approaching model is presented. Finally, a demonstration is given to analyze the major factors in the model and prove its validity.

  15. Synthetic biological networks

    International Nuclear Information System (INIS)

    Despite their obvious relationship and overlap, the field of physics is blessed with many insightful laws, while such laws are sadly absent in biology. Here we aim to discuss how the rise of a more recent field known as synthetic biology may allow us to more directly test hypotheses regarding the possible design principles of natural biological networks and systems. In particular, this review focuses on synthetic gene regulatory networks engineered to perform specific functions or exhibit particular dynamic behaviors. Advances in synthetic biology may set the stage to uncover the relationship of potential biological principles to those developed in physics. (review article)

  16. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  17. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  18. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  19. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  20. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  1. Building synthetic memory

    OpenAIRE

    Inniss, Mara C.; Silver, Pamela A.

    2013-01-01

    Cellular memory – conversion of a transient signal into a sustained response – is a common feature of biological systems. Synthetic biologists aim to understand and reengineer such systems in a reliable and predictable manner. Synthetic memory circuits have been designed and built in vitro and in vivo based on diverse mechanisms such as oligonucleotide hybridization, recombination, transcription, phosphorylation, and RNA editing. Thus far, building these circuits has helped us explore the bas...

  2. Synthetic Vision Systems

    Science.gov (United States)

    Prinzel, L.J.; Kramer, L.J.

    2009-01-01

    A synthetic vision system is an aircraft cockpit display technology that presents the visual environment external to the aircraft using computer-generated imagery in a manner analogous to how it would appear to the pilot if forward visibility were not restricted. The purpose of this chapter is to review the state of synthetic vision systems, and discuss selected human factors issues that should be considered when designing such displays.

  3. Synthetic biology and biosecurity.

    Science.gov (United States)

    Robienski, Jürgen; Simon, Jürgen

    2014-01-01

    This article discusses the conflict fields and legal questions of synthetic biology, esp. concerning biosecurity. A respective jurisprudential discussion has not taken place yet in Germany apart from few statements and recommendations. But in Germany, Europe and the USA, it is generally accepted that a broad discussion is necessary. This is esp. true for the question of biosecurity and the possible dangers arising from Synthetic Biology. PMID:25845204

  4. Liquid crystalline order in polymers

    CERN Document Server

    Blumstein, Alexandre

    1978-01-01

    Liquid Crystalline Order in Polymers examines the topic of liquid crystalline order in systems containing rigid synthetic macromolecular chains. Each chapter of the book provides a review of one important area of the field. Chapter 1 discusses scattering in polymer systems with liquid crystalline order. It also introduces the field of liquid crystals. Chapter 2 treats the origin of liquid crystalline order in macromolecules by describing the in-depth study of conformation of such macromolecules in their unassociated state. The chapters that follow describe successively the liquid crystalli

  5. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  6. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  7. RAPTOR: Routing Attacks on Privacy in Tor

    OpenAIRE

    Sun, Yixin; Edmundson, Anne; Vanbever, Laurent; Li, Oscar; Rexford, Jennifer; Chiang, Mung; Mittal, Prateek

    2015-01-01

    The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the iceberg. We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes) to compromise user anonymity. First, AS-level adversaries can exploit the asymmetric nature of Internet routing to increase the chance of...

  8. Security Attacks On MANET Routing Protocols

    Directory of Open Access Journals (Sweden)

    Chiragkumar V. Patel

    2013-10-01

    Full Text Available The paper gives idea about various routing protocols for Mobile Ad-Hoc Network against security issues. MANET is vulnerable to various security attacks due to its dynamically changing topology, self configurable nature and lack of centralized control. Malicious node can significantly degrade the performance and reliability of Ad-hoc Network routing protocols. From the survey it has been made quite clear that basic MANET protocols are vulnerable to various routing attacks. While Secure AODV (SAODV routing protocol performs quite well to improve performance in presence of security attack in MANET.

  9. An Integrated Laboratory Approach toward the Preparation of Conductive Poly(phenylene vinylene) Polymers

    Science.gov (United States)

    Knoerzer, Timm A.; Balaich, Gary J.; Miller, Hannah A.; Iacono, Scott T.

    2014-01-01

    Poly(phenylene vinylene) (PPV) represents an important class of conjugated, conducting polymers that have been readily exploited in the preparation of organic electronic materials. In this experiment, students prepare a PPV polymer via a facile multistep synthetic sequence with robust spectroscopic evaluation of synthetic intermediates and the…

  10. Electrospinning polymer blends for biomimetic scaffolds for ACL tissue engineering

    Science.gov (United States)

    Garcia, Vanessa Lizeth

    The anterior cruciate ligament (ACL) rupture is one of the most common knee injuries. Current ACL reconstructive strategies consist of using an autograft or an allograft to replace the ligament. However, limitations have led researchers to create tissue engineered grafts, known as scaffolds, through electrospinning. Scaffolds made of natural and synthetic polymer blends have the potential to promote cell adhesion while having strong mechanical properties. However, enzymes found in the knee are known to degrade tissues and affect the healing of intra-articular injuries. Results suggest that the natural polymers used in this study modify the thermal properties and tensile strength of the synthetic polymers when blended. Scanning electron microscopy display bead-free and enzyme biodegradability of the fibers. Raman spectroscopy confirms the presence of the natural and synthetic polymers in the scaffolds while, amino acid analysis present the types of amino acids and their concentrations found in the natural polymers.

  11. Who Is at Risk for a Heart Attack?

    Science.gov (United States)

    ... on Twitter. Who Is at Risk for a Heart Attack? Certain risk factors make it more likely that ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  12. Controlled Synthesis of Polymer Brushes via Polymer Single Crystal Templates

    Science.gov (United States)

    Zhou, Tian

    A novel synthetic method of polymer brushes using polymer single crystals (PSCs) as solid-state templates is introduced in this study. PSC has a quasi-2D lamellae structure with polymer chains fold back-and-forth perpendicular to the lamellae surfaces. During crystallization, the chain ends are excluded from the unit cell onto the lamellae surfaces, which makes the material extremely versatile in its functionality. Such structure holds the unique capability to harvest nanoparticles, or being immobilized onto macroscopic flat surfaces. After dissolving PSCs in good solvent, polymer brushes are chemically tethered on either nanoparticles or flat macroscopic surfaces. Because the chain-folding structure can be conveniently tailored by changing the molecular weight of polymer and the crystallization temperature, the thickness, grafting density and morphology of resulted polymer brushes can be precisely controlled. As a model system, poly(?-caprolactone) with thiol or alkoxysilane terminal groups was used, and polymer brushes were successfully prepared on both nanoparticles and glass/Au flat surfaces. The structure-property relationships of the as-prepared polymer brushes were studied in detail using multiple characterization techniques. First of all, when functionalizing nanoparticles, by engineering the chain-folding structure of the PSCs, interesting complex nanostructures can be formed by nanoparticles including Janus nanoparticles and nanoparticle dimers. These unique structures render hybrid nanoparticles very interesting responsive behavior which have been studied in detail in this dissertation. When grafted onto a flat surface on the other hand, not only the molecular weight and grafting density can be precisely controlled, the tethering points of a single polymer chain can also be conveniently tailored, resulting polymer brushes with either tail or loop structures. Such difference in brush structure can significantly alter the properties of functional surface

  13. Synthetic gauge fields in synthetic dimensions,

    OpenAIRE

    Celi, A; Massignan, P.; Ruseckas, J.; Goldman, N; Spielman, I. B.; Juzeliūnas, G.; Lewenstein, M.

    2013-01-01

    We describe a simple technique for generating a cold-atom lattice pierced by a uniform magnetic field. Our method is to extend a one-dimensional optical lattice into the "dimension" provided by the internal atomic degrees of freedom, yielding a synthetic 2D lattice. Suitable laser-coupling between these internal states leads to a uniform magnetic flux within the 2D lattice. We show that this setup reproduces the main features of magnetic lattice systems, such as the fractal Hofstadter butterf...

  14. Polymer Chemistry

    Science.gov (United States)

    Williams, Martha; Roberson, Luke; Caraccio, Anne

    2010-01-01

    This viewgraph presentation describes new technologies in polymer and material chemistry that benefits NASA programs and missions. The topics include: 1) What are Polymers?; 2) History of Polymer Chemistry; 3) Composites/Materials Development at KSC; 4) Why Wiring; 5) Next Generation Wiring Materials; 6) Wire System Materials and Integration; 7) Self-Healing Wire Repair; 8) Smart Wiring Summary; 9) Fire and Polymers; 10) Aerogel Technology; 11) Aerogel Composites; 12) Aerogels for Oil Remediation; 13) KSC's Solution; 14) Chemochromic Hydrogen Sensors; 15) STS-130 and 131 Operations; 16) HyperPigment; 17) Antimicrobial Materials; 18) Conductive Inks Formulations for Multiple Applications; and 19) Testing and Processing Equipment.

  15. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    OpenAIRE

    Patel, A K; Jaypalsinh. A. Gohil; D.T. Meva

    2010-01-01

    Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between commun...

  16. Cycloadditions in modern polymer chemistry.

    Science.gov (United States)

    Delaittre, Guillaume; Guimard, Nathalie K; Barner-Kowollik, Christopher

    2015-05-19

    Synthetic polymer chemistry has undergone two major developments in the last two decades. About 20 years ago, reversible-deactivation radical polymerization processes started to give access to a wide range of polymeric architectures made from an almost infinite reservoir of functional building blocks. A few years later, the concept of click chemistry revolutionized the way polymer chemists approached synthetic routes. Among the few reactions that could qualify as click, the copper-catalyzed azide-alkyne cycloaddition (CuAAC) initially stood out. Soon, many old and new reactions, including cycloadditions, would further enrich the synthetic macromolecular chemistry toolbox. Whether click or not, cycloadditions are in any case powerful tools for designing polymeric materials in a modular fashion, with a high level of functionality and, sometimes, responsiveness. Here, we wish to describe cycloaddition methodologies that have been reported in the last 10 years in the context of macromolecular engineering, with a focus on those developed in our laboratories. The overarching structure of this Account is based on the three most commonly encountered cycloaddition subclasses in organic and macromolecular chemistry: 1,3-dipolar cycloadditions, (hetero-)Diels-Alder cycloadditions ((H)DAC), and [2+2] cycloadditions. Our goal is to briefly describe the relevant reaction conditions, the advantages and disadvantages, and the realized polymer applications. Furthermore, the orthogonality of most of these reactions is highlighted because it has proven highly beneficial for generating unique, multifunctional polymers in a one-pot reaction. The overview on 1,3-dipolar cycloadditions is mostly centered on the application of CuAAC as the most travelled route, by far. Besides illustrating the capacity of CuAAC to generate complex polymeric architectures, alternative 1,3-dipolar cycloadditions operating without the need for a catalyst are described. In the area of (H)DA cycloadditions

  17. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  18. Recovery of infrastructure networks after localised attacks

    Science.gov (United States)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  19. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  20. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  1. Karachi Commander Escapes Attack, 10 Dead

    Institute of Scientific and Technical Information of China (English)

    潘志强

    2004-01-01

    KARACHI: The army commander in the Pakistani city of Karachi narrowly① escaped assassination② yesterday when gunmen attacked his convoy③ with gunfire and a bomb, killing at least 10 and wounding his driver, officials said.

  2. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  3. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  4. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  5. Desynchronization Attacks on RFID Security Protocols

    Directory of Open Access Journals (Sweden)

    Miaolei Deng

    2013-02-01

    Full Text Available The characteristics of radio frequency identification (RFID systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This paper analyze several of the newest RFID security protocols which proposed by Niu et al., Fu et al. and Habibi et al. respectively form the security viewpoint of data desynchronization attack. These lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand spaces model, data desynchronization attacks on these protocols were analyzed and described. Furthermore, improvements to overcome the security vulnerabilities of two protocols presented by Niu et al. and Fu et al. were given.

  6. Dengue Virus May Bolster Zika's Attack

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159534.html Dengue Virus May Bolster Zika's Attack Prior exposure to ... 23, 2016 (HealthDay News) -- Prior exposure to the dengue fever virus may increase the severity of Zika ...

  7. Fault attacks on two software countermeasures

    OpenAIRE

    Moro, Nicolas; Heydemann, Karine; Dehbaoui, Amine; Robisson, Bruno; Encrenaz, Emmanuelle

    2014-01-01

    Short version of the article "Experimental evaluation of two software countermeasures against fault attacks" presented at the 2014 IEEE Symposium on Hardware-Oriented Security and Trust (HOST) in May 2014.

  8. CASE STUDY OF SQL INJECTION ATTACKS

    OpenAIRE

    Sonakshi*, Rakesh Kumar, Girdhar Gopal

    2016-01-01

    Today, most of the web applications are associated with database at back-end so there are possibilities of SQL injection attacks (SQLIA) on it. A number of preventive measures have also been discovered by various researchers to overcome this attack, but which measure is more convenient and provides fast access to application without compromising the security is also a major concern nowadays. This paper provides a clear distinction among different types of SQLIAs and how these can be performed...

  9. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  10. Panic Attack during Elective Gastrointestinal Endoscopy

    OpenAIRE

    Charalampos Mitsonis; Nikolaos Dimopoulos; Marianna Zavrou; Vassiliki Psarra; Christos Giofkos; Christos Fiorakis; Athanasios Dimitriadis; Dimitrios Valavanis; Eleni Vousoura; Iannis Zervas; Efstathios Papavassiliou

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatie...

  11. Attacks in WEB Based Embedded Applications

    OpenAIRE

    C. Yaashuwanth; Ramesh, R.

    2010-01-01

    This paper deals with the issues related to embedded applications when they are implemented in internet. There are various attacks in embedded systems when implemented in the internet. These attacks have a negligible effect in the operating system which results in the decrease in the system performance. But in embedded system case, it has life and death consequence attached to it. Many of these embedded systems work in hazardous environment where a system failure results to catastrophic effec...

  12. Wireless Sensor Networks Attacks and Solutions

    OpenAIRE

    Alajmi, Naser

    2014-01-01

    A few years ago, wireless sensor networks (WSNs) used by only military. Now, we have seen many of organizations use WSNs for some purposes such as weather, pollution, traffic control, and healthcare. Security is becoming on these days a major concern for wireless sensor network. In this paper I focus on the security types of attacks and their detection. This paper anatomizes the security requirements and security attacks in wireless sensor networks. Also, indicate to the benchmarks for the se...

  13. Cluster headache attacks and multiple sclerosis

    OpenAIRE

    Gentile, Salvatore; Ferrero, Margherita; Vaula, Giovanna; Rainero, Innocenzo; Pinessi, Lorenzo

    2007-01-01

    We report the case of a patient who developed typical cluster headache attacks and was diagnosed as having multiple sclerosis (MS) at the same time. The headache attacks resolved after i.v. treatment with methylprednisolone. MR imaging showed a pontine demyelinating lesion involving the trigeminal nerve root inlet area, on the same side as the pain. The association between cluster headache and MS has been rarely described before. This case suggests that in patients with cluster headache neuro...

  14. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  15. Two Improved Multiple-Differential Collision Attacks

    OpenAIRE

    An Wang; Liji Wu; Zongyue Wang; Xuexin Zheng; Man Chen; Jing Ma

    2014-01-01

    In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementat...

  16. Various Database Attacks and its Prevention Techniques

    OpenAIRE

    K.A.VarunKumar; M.Prabakaran; Ajay Kaurav; S.Sibi Chakkaravarthy; Thiyagarajan, S; Pokala Venkatesh

    2014-01-01

    Increasing in the popularity of internet, the application of database also widely spread. There are some serious threats because of hackers done various attempts to steal the data in the database. Various attacks like Sql injection, Cross site scripting may change the information in the databases which decreases the truthfulness of the database. Intrusion detection system is used to detect whether the attack is carried on the database. In this paper we surveyed different types of database att...

  17. Private Circuits II versus Fault Injection Attacks

    OpenAIRE

    Rakotomalala, Henitsoa; Ngo, Xuan Thuy; Najm, Zakaria; Danger, Jean-Luc; Guilley, Sylvain

    2015-01-01

    —Cryptographic implementations are subject to physical attacks. Private circuits II is a proven protection against a strong attacker, able to read and write on a finite number of chosen internal nodes. In practice, side-channel analyses and fault injections are less accurate: typically, classical injection techniques (clock and power glitches, electromagnetic pulses, etc.) can be reproducible, but they do not allow to choose the targeted nodes (the situation is different for software dual-rai...

  18. Logical Modes of Attack in Argumentation Networks

    OpenAIRE

    Gabbay, Dov M.; Garcez, A. S. D. Avila

    2009-01-01

    This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the meta level to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, the...

  19. Session Initiation Protocol Attacks and Challenges

    OpenAIRE

    Keshavarz, Hassan; Sattari, Mohammad Reza Jabbarpour; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are comp...

  20. Physiological and Chemical Investigations into Microbial Degradation of Synthetic Poly(cis-1,4-isoprene)

    OpenAIRE

    Bode, Helge B; Zeeck, Axel; Plückhahn, Kirsten; Jendrossek, Dieter

    2000-01-01

    Streptomyces coelicolor 1A and Pseudomonas citronellolis were able to degrade synthetic high-molecular-weight poly(cis-1,4-isoprene) and vulcanized natural rubber. Growth on the polymers was poor but significantly greater than that of the nondegrading strain Streptomyces lividans 1326 (control). Measurement of the molecular weight distribution of the polymer before and after degradation showed a time-dependent increase in low-molecular-weight polymer molecules for S. coelicolor 1A and P. citr...

  1. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  2. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked...... mean to focus on intended, as opposed to incidental, attacks. Finally, although "attack" often implies initiation of a conflict ("I didn't attack him! He started it!"), it does not do so here. An unjust aggressor who initiates a conflict can be, and indeed very often is, liable to attack. All...

  3. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  4. Automated synthetic scene generation

    Science.gov (United States)

    Givens, Ryan N.

    Physics-based simulations generate synthetic imagery to help organizations anticipate system performance of proposed remote sensing systems. However, manually constructing synthetic scenes which are sophisticated enough to capture the complexity of real-world sites can take days to months depending on the size of the site and desired fidelity of the scene. This research, sponsored by the Air Force Research Laboratory's Sensors Directorate, successfully developed an automated approach to fuse high-resolution RGB imagery, lidar data, and hyperspectral imagery and then extract the necessary scene components. The method greatly reduces the time and money required to generate realistic synthetic scenes and developed new approaches to improve material identification using information from all three of the input datasets.

  5. Polymer Informatics

    Science.gov (United States)

    Adams, Nico

    Polymers are arguably the most important set of materials in common use. The increasing adoption of both combinatorial as well as high-throughput approaches, coupled with an increasing amount of interdisciplinarity, has wrought tremendous change in the field of polymer science. Yet the informatics tools required to support and further enhance these changes are almost completely absent. In the first part of the chapter, a critical analysis of the challenges facing modern polymer informatics is provided. It is argued, that most of the problems facing the field today are rooted in the current scholarly communication process and the way in which chemists and polymer scientists handle and publish data. Furthermore, the chapter reviews existing modes of representing and communicating polymer information and discusses the impact, which the emergence of semantic technologies will have on the way in which scientific and polymer data is published and transmitted. In the second part, a review of the use of informatics tools for the prediction of polymer properties and in silico design of polymers is offered.

  6. Polymers & People

    Science.gov (United States)

    Lentz, Linda; Robinson, Thomas; Martin, Elizabeth; Miller, Mary; Ashburn, Norma

    2004-01-01

    Each Tuesday during the fall of 2002, teams of high school students from three South Carolina counties conducted a four-hour polymer institute for their peers. In less than two months, over 300 students visited the Charleston County Public Library in Charleston, South Carolina, to explore DNA, nylon, rubber, gluep, and other polymers. Teams of…

  7. Synthetic guide star generation

    Science.gov (United States)

    Payne, Stephen A [Castro Valley, CA; Page, Ralph H [Castro Valley, CA; Ebbers, Christopher A [Livermore, CA; Beach, Raymond J [Livermore, CA

    2008-06-10

    A system for assisting in observing a celestial object and providing synthetic guide star generation. A lasing system provides radiation at a frequency at or near 938 nm and radiation at a frequency at or near 1583 nm. The lasing system includes a fiber laser operating between 880 nm and 960 nm and a fiber laser operating between 1524 nm and 1650 nm. A frequency-conversion system mixes the radiation and generates light at a frequency at or near 589 nm. A system directs the light at a frequency at or near 589 nm toward the celestial object and provides synthetic guide star generation.

  8. Synthesis of a Molecularly Imprinted Polymer for Dioxin

    Directory of Open Access Journals (Sweden)

    Magda Brattoli

    2006-08-01

    Full Text Available A molecularly imprinted polymer for recognising selectively 2,3,7,8-tetrachlorodibenzodioxin (TCDD was made by a new non-covalent method employing a“dummy” template. The proposed way represents a simplification of a synthetic schemeproposed by Lübke et al.[1] for covalent imprinting. Comparison of extraction yields of thenovel polymer, a non imprinted polymer and an imprinting polymer, prepared by theoriginal procedure demonstrates the binding capacity of the proposed polymer, which is inprinciple applicable to solid phase extraction (SPE of dioxin.

  9. Synthesis of regioregular pentacene-containing conjugated polymers

    KAUST Repository

    Okamoto, Toshihiro

    2011-01-01

    We report the synthesis and characterization of a new class of regioregular pentacene-containing conjugated polymers via our synthetic routes reported previously. We found that our regioregular pentacene polymers showed improved ordering than their regiorandom counterpart as well as ambipolar OFET performance. © 2011 The Royal Society of Chemistry.

  10. The response of healing corneal epithelium to grooved polymer surfaces.

    NARCIS (Netherlands)

    Evans, M.D.; McFarland, G.A.; Taylor, S.; Walboomers, X.F.

    2005-01-01

    Corneal epithelial wounds heal rapidly by the inwards growth of tissue with a contracting wound front. A synthetic polymer lens to correct refractive error (an implantable contact lens) could be incorporated into the cornea using this wound healing process. Topographical cues on the polymer surface

  11. Bio-based and recycled polymers for cleaner production : an assessment of plastics and fibres

    OpenAIRE

    Shen, L.

    2011-01-01

    Today, almost all man-made plastics and fibres are produced from synthetic polymers. Synthetic polymers, made from petroleum which took millions of years to form, have three sustainability challenges: (i) the limited fossil fuel resources, (ii) the environmental impacts caused by non-degradable plastics waste, and (iii) greenhouse gas emissions caused by combusting fossil fuels. To tackle these sustainability challenges, two strategies have been proposed. First, use bio-based polymers to repl...

  12. Atomic Oxygen Erosion Yield Dependence Upon Texture Development in Polymers

    Science.gov (United States)

    Banks, Bruce A.; Loftus, Ryan J.; Miller, Sharon K.

    2016-01-01

    The atomic oxygen erosion yield (volume of a polymer that is lost due to oxidation per incident atom) of polymers is typically assumed to be reasonably constant with increasing fluence. However polymers containing ash or inorganic pigments, tend to have erosion yields that decrease with fluence due to an increasing presence of protective particles on the polymer surface. This paper investigates two additional possible causes for erosion yields of polymers that are dependent upon atomic oxygen. These are the development of surface texture which can cause the erosion yield to change with fluence due to changes in the aspect ratio of the surface texture that develops and polymer specific atomic oxygen interaction parameters. The surface texture development under directed hyperthermal attack produces higher aspect ratio surface texture than isotropic thermal energy atomic oxygen attack. The fluence dependence of erosion yields is documented for low Kapton H (DuPont, Wilmington, DE) effective fluences for a variety of polymers under directed hyperthermal and isotropic thermal energy attack.

  13. Synthetic Aperture Radar Interferometry

    Science.gov (United States)

    Rosen, P. A.; Hensley, S.; Joughin, I. R.; Li, F.; Madsen, S. N.; Rodriguez, E.; Goldstein, R. M.

    1998-01-01

    Synthetic aperture radar interferometry is an imaging technique for measuring the topography of a surface, its changes over time, and other changes in the detailed characteristics of the surface. This paper reviews the techniques of interferometry, systems and limitations, and applications in a rapidly growing area of science and engineering.

  14. Advanced Developments in Cyclic Polymers: Synthesis, Applications, and Perspectives

    OpenAIRE

    Zhu, Yinghuai; Narayan S. Hosmane

    2015-01-01

    Due to the topological effect, cyclic polymers demonstrate different and unique physical and biological properties in comparison with linear counterparts having the same molecular-weight range. With advanced synthetic and analytic technologies, cyclic polymers with different topologies, e.g. multicyclic polymers, have been reported and well characterized. For example, various cyclic DNA and related structures, such as cyclic duplexes, have been prepared conveniently by click chemistry. These ...

  15. Scalable production of mechanically tunable block polymers from sugar

    OpenAIRE

    Xiong, Mingyong; Schneiderman, Deborah K.; Bates, Frank S.; Hillmyer, Marc A.; Zhang, Kechun

    2014-01-01

    In recent years there has been extensive research toward the development of sustainable polymeric materials. However, environmentally benign, bioderived polymers still represent a woefully small fraction of plastics and elastomers on the market today. To displace the widely useful oil-based polymers that currently dominate the industry, a bioderived synthetic polymer must be both cost and performance competitive. In this paper we address this challenge by combining the efficient bioproduction...

  16. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  17. Detecting and Localizing Wireless Network Attacks Techniques

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  18. A computational study of a phenolic based polymer with a spring-like structure

    Science.gov (United States)

    Bauschlicher, Charles W.

    2016-07-01

    We report the stretching potentials for a helical phenolic-based polymer with high symmetry and a spring-like structure that can be stretched by a factor of 4 along the spring direction and still return to its original structure. We hope that synthetic polymer chemists assess if this polymer or a similar one can be synthesized and tested.

  19. Synthetic River Valleys

    Science.gov (United States)

    Brown, R.; Pasternack, G. B.

    2011-12-01

    The description of fluvial form has evolved from anecdotal descriptions to artistic renderings to 2D plots of cross section or longitudinal profiles and more recently 3D digital models. Synthetic river valleys, artificial 3D topographic models of river topography, have a plethora of potential applications in fluvial geomorphology, and the earth sciences in general, as well as in computer science and ecology. Synthetic river channels have existed implicitly since approximately the 1970s and can be simulated from a variety of approaches spanning the artistic and numerical. An objective method of synthesizing 3D stream topography based on reach scale attributes would be valuable for sizing 3D flumes in the physical and numerical realms, as initial input topography for morphodynamic models, stream restoration design, historical reconstruction, and mechanistic testing of interactions of channel geometric elements. Quite simply - simulation of synthetic channel geometry of prescribed conditions can allow systematic evaluation of the dominant relationships between river flow and geometry. A new model, the control curve method, is presented that uses hierarchically scaled parametric curves in over-lapping 2D planes to create synthetic river valleys. The approach is able to simulate 3D stream geometry from paired 2D descriptions and can allow experimental insight into form-process relationships in addition to visualizing past measurements of channel form that are limited to two dimension descriptions. Results are presented that illustrate the models ability to simulate fluvial topography representative of real world rivers as well as how channel geometric elements can be adjusted. The testing of synthetic river valleys would open up a wealth of knowledge as to why some 3D attributes of river channels are more prevalent than others as well as bridging the gap between the 2D descriptions that have dominated fluvial geomorphology the past century and modern, more complete, 3D

  20. Power analysis attacks revealing the secrets of smart cards

    CERN Document Server

    Mangard, Stefan; Popp, Thomas

    2008-01-01

    A comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. It discusses simple and differential power analysis as well as advanced techniques like template attacks.

  1. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  2. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  3. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2016-01-01

    approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  4. 77 FR 12508 - Schedules of Controlled Substances: Placement of Five Synthetic Cannabinoids Into Schedule I

    Science.gov (United States)

    2012-03-01

    ... of individuals exposed to synthetic cannabinoids with symptoms that include anxiety and panic attacks...-hydroxycyclohexyl)-phenol (cannabicyclohexanol, CP- 47,497 C8 homologue). 75 FR 71635. Following this, on March 1... scheduling provisions of 21 U.S.C. 811(h). 76 FR 11075. This Final Order, which became effective on the...

  5. Emulsification-Induced Homohelicity in Racemic Helical Polymer for Preparing Optically Active Helical Polymer Nanoparticles.

    Science.gov (United States)

    Zhao, Biao; Deng, Jinrui; Deng, Jianping

    2016-04-01

    Optically active nano- and microparticles have constituted a significant category of advanced functional materials. However, constructing optically active particles derived from synthetic helical polymers still remains as a big challenge. In the present study, it is attempted to induce a racemic helical polymer (containing right- and left-handed helices in equal amount) to prefer one predominant helicity in aqueous media by using emulsifier in the presence of chiral additive (emulsification process). Excitingly, the emulsification process promotes the racemic helical polymer to unify the helicity and directly provides optically active nanoparticles constructed by chirally helical polymer. A possible mechanism is proposed to explain the emulsification-induced homohelicity effect. The present study establishes a novel strategy for preparing chirally helical polymer-derived optically active nanoparticles based on racemic helical polymers. PMID:26829250

  6. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    Directory of Open Access Journals (Sweden)

    A.K. Patel

    2010-05-01

    Full Text Available Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between communicating Access Points to prevent Rouge Access Points from masquerading as false neighbours. Our defense greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.

  7. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  8. Crystalline conjugated polymers for organic electronics

    International Nuclear Information System (INIS)

    We reported the characterization of a series of semiconducting polymers based on naphthodithiophenes (NDTs) and naphthobisthiadiazole (NTz). Four different isomeric NDTs are selectively synthesized using the similar synthetic protocol. The isomeric NDTs provide quite distinct electronic structures and crystallinity of the corresponding polymers and thus the device performances. Polymers with one of the NDT isomers, NDT3, showed high hole mobilities in excess of 0.5 cm2/Vs. On the other hand, an NTz-based polymer exhibited high hole mobility of >0.5 cm2/Vs in OFETs and power conversion efficiencies of >7% in OPVs. These high performances of the present polymers are found to originate in their highly crystalline structures in the thin films

  9. Liability for damage caused by terrorist attacks

    International Nuclear Information System (INIS)

    After the terrorist attacks on September 11, 2001, one of the questions raised was about the potential liability of the operator of a nuclear power plant for damage sustained by a third party as a result of a comparable terrorist attack on a nuclear power plant. Internationally, this situation is regulated by the Convention on Third-Party Liability in Nuclear Power, the so-called Paris Liability Convention, of 1960, 1964, 1982. Among other things, that Convention excludes liability in cases directly resulting form 'actions of armed conflict..'. The problem arises, among other things, from the absence of an internationally acknowledged definition of terrorism or terrorist attack, and from the idea that, according to the Paris Convention, the legal entities assumed to be involved in such actions are states and weapons. National and international agreements and laws about the liability of the operator of nuclear facility for damage to third parties as a result of terrorist actions are analyzed and discussed. (orig.)

  10. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  11. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  12. Early Detection of SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hossain Shahriar

    2013-07-01

    Full Text Available SQL Injection (SQLI is a common vulnerability found in web applications.The starting point of SQLIattack is the client-side (browser. If attack inputs can be detected early at the browse side, then it could bethwarted early by not forwarding the malicious inputs to the server-side for further processing.This paperpresents a client-side approach to detect SQLI attacks1. The client-side accepts shadow SQL queries fromthe server-side and checks any deviation betweenshadow queries with dynamic queries generated withuser supplied inputs. We measure the deviation of shadow query and dynamic query based on conditionalentropy metrics and propose four metrics in this direction. We evaluate the approach with three PHPapplications containing SQLI vulnerabilities. The evaluation results indicate that our approach can detectwell-known SQLI attacks early at the client-side and impose negligible overhead.

  13. Chemical virology: Packing polymers in protein cages

    Science.gov (United States)

    Cornelissen, Jeroen J. L. M.

    2012-10-01

    The combination of addressable synthetic macromolecules with proteins of precise structure and function often leads to materials with unique properties, as is now shown by the efficient multi-site initiation of polymer growth inside the cavity of a virus capsid.

  14. Plastic Antibodies: Molecular Recognition with Imprinted Polymers

    Science.gov (United States)

    Rushton, Gregory T.; Furmanski, Brian; Shimizu, Ken D.

    2005-01-01

    Synthetic polymers are prepared and tested in a study for their molecular recognition properties of an adenine derivative, ethyl adenine-9-acetate (EA9A), within two laboratory periods. The procedure introduces undergraduate chemistry students to noncovalent molecular imprinting as well as the analytical techniques for assessing their recognition…

  15. Synthetic Genomics and Synthetic Biology Applications Between Hopes and Concerns

    OpenAIRE

    König, Harald; Frank, Daniel; Heil, Reinhard; Coenen, Christopher

    2013-01-01

    New organisms and biological systems designed to satisfy human needs are among the aims of synthetic genomics and synthetic biology. Synthetic biology seeks to model and construct biological components, functions and organisms that do not exist in nature or to redesign existing biological systems to perform new functions. Synthetic genomics, on the other hand, encompasses technologies for the generation of chemically-synthesized whole genomes or larger parts of genomes, allowing to simultaneo...

  16. Immunodiagnosis of parasitic diseases with synthetic peptides.

    Science.gov (United States)

    Noya, O; Patarroyo, M E; Guzmán, F; Alarcón de Noya, B

    2003-08-01

    Parasitic diseases remain as a major public health problem worldwide, not only based on their historically high morbidity and mortality rates, but also because risk factors associated with their transmission are increasing. Laboratory diagnosis and particularly immunodiagnosis is a basic tool for the demonstration, clinical management and control of these infections. Classically, the serological tests for the detection of antibodies or antigens are based on the use of crude and purified antigens. Synthetic peptides have opened a new field and perspectives, as the source of pure epitopes and molecules for diagnosis of malaria, Chagas' disease, leishmaniasis, schistosomiasis, hidatidosis, cysticercosis and fasciolosis based on the detection of antibodies and circulating antigens. Herein, are critically reviewed the relevant advances and applications of the synthetic peptides on immunodiagnosis of parasitic diseases. A variety of sequences, constructs (monomers, polymers, MAPs), immunological methods and samples have been used, demonstrating their diagnostic potential. However, in most parasitic infections it is necessary to use more than a single peptide in order to avoid the genetic restriction against certain epitopes, as well as to test them in well characteized groups of patients, in order to confirm their sensitivity and specificity. The concept of multidiagnosis with synthetic peptides, using a novel multi-dot blot assay is introduced. Finally, the chemical imitation of antigens, offers a tremendous posibilities in the diagnosis of parasitic infections in developing countries since this strategy is cheaper, simpler, reproducible, useful for large scale testing and in most cases, specific and sensitive. PMID:14529537

  17. Organometallic Polymers.

    Science.gov (United States)

    Carraher, Charles E., Jr.

    1981-01-01

    Reactions utilized to incorporate a metal-containing moiety into a polymer chain (addition, condensation, and coordination) are considered, emphasizing that these reactions also apply to smaller molecules. (JN)

  18. Coloured Polymers

    OpenAIRE

    Pesando, I.

    1993-01-01

    We show that non-oriented coloured polymers (self--avoiding walks with different types of links) are in the same universality class of the ordinary self--avoiding walks, while the oriented coloured are not.

  19. Polymer electrolytes

    Czech Academy of Sciences Publication Activity Database

    Abbrent, Sabina; Greenbaum, S.; Peled, E.; Golodnitsky, D.

    Singapore: World Scientific Publishing, 2015 - (Dudney, N.; West, W.; Nanda, J.), s. 523-589 ISBN 978-981-4651-89-9 Institutional support: RVO:61389013 Keywords : polymer electrolytes * applications * mesuring techniques Subject RIV: CD - Macromolecular Chemistry

  20. Quantifying Public Response towards Islam on Twitter after Paris Attacks

    OpenAIRE

    Magdy, Walid; Darwish, Kareem; Abokhodair, Norah

    2015-01-01

    The Paris terrorist attacks occurred on November 13, 2015 prompted a massive response on social media including Twitter, with millions of posted tweets in the first few hours after the attacks. Most of the tweets were condemning the attacks and showing support to Parisians. One of the trending debates related to the attacks concerned possible association between terrorism and Islam and Muslims in general. This created a global discussion between those attacking and those defending Islam and M...

  1. Effect of migraine attacks on paracetamol absorption.

    OpenAIRE

    Tokola, R A; Neuvonen, P J

    1984-01-01

    The absorption of effervescent paracetamol (1000 mg) was investigated in nine female patients during a migraine attack and in the same patients when headache free. Migraine attack decreased (P less than 0.05) the areas under the serum paracetamol concentration-time curves (AUC) of 0-2 h, 0-4 h and 0-6 h and the peak serum concentration. The severity of nausea correlated significantly with the decrease in the AUC values. Our results support findings of delayed gastric emptying in migraine atta...

  2. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  3. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  4. Fast Collision Attack on MD5

    OpenAIRE

    Stevens, Marc

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfill restrictions to properly rotate the differentials in the first round. We will present a new algorithm to find the first block and we will use an algorithm of Klima to find the second block. To o...

  5. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  6. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  7. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  8. Study of semi-synthetic plastic objects of historic interest using non-invasive total reflectance FT-IR

    OpenAIRE

    Cucci, C.; Bartolozzi, G.; Marchiafava, V.; Picollo, M.; Richardson, E.

    2016-01-01

    A significant proportion of modern and contemporary artifacts and objects of historical interest, are composed of materials in the form of synthetic, semi-synthetic, and natural polymers. Each class of polymer and corresponding composite plastics are subject to different degradation processes. This means that conservators and curators of 20th century collections are faced with varied, nontrivial preservation issues. An unresolved problem is the identification of early plastics based on semi-s...

  9. Synthetic Fuels Program

    International Nuclear Information System (INIS)

    Studies on waste water derived from synthetic fuel processes included acute toxicity of coal conversion effluent components and acute toxicity of aqueous waste and wastewater components of the ORNL Bench-Scale hydrocarbonization process. The potential hazards of synthetic fuels technology development to terrestrial ecosystems were studied with regard to toxicity of PAH and azaarenes. Aquatic transport studies included the following: aquatic transport of PAH and rates of PAH photolysis at the Bethlehem, Pennsylvania, coking plant site; microbial transformations of polycyclic aromatic hydrocarbons in water and sediment samples; persistence of azaarenes in aquatic systems; bioaccumulation of pathways of azaarenes; sorption of PAH to suspended particles in natural waters; and transport and fate of anthracene in pond microcosms. Studies were also conducted on environmental characterization of solid waste from a Lurgi facility

  10. Engineered Asymmetric Synthetic Vesicles

    Science.gov (United States)

    Lu, Li; Chiarot, Paul

    2013-11-01

    Synthetic vesicles are small, fluid-filled spheres that are enclosed by a bilayer of lipid molecules. They can be used as models for investigating membrane biology and as delivery vehicles for pharmaceuticals. In practice, it is difficult to simultaneously control membrane asymmetry, unilamellarity, vesicle size, vesicle-to-vesicle uniformity, and luminal content. Membrane asymmetry, where each leaflet of the bilayer is composed of different lipids, is of particular importance as it is a feature of most natural membranes. In this study, we leverage microfluidic technology to build asymmetric vesicles at high-throughput. We use the precise flow control offered by microfluidic devices to make highly uniform emulsions, with controlled internal content, that serve as templates to build the synthetic vesicles. Flow focusing, dielectrophoretic steering, and interfacial lipid self-assembly are critical procedures performed on-chip to produce the vesicles. Fluorescent and confocal microscopy are used to evaluate the vesicle characteristics.

  11. Wholly Synthetic Molecular Machines.

    Science.gov (United States)

    Cheng, Chuyang; Stoddart, J Fraser

    2016-06-17

    The past quarter of a century has witnessed an increasing engagement on the part of physicists and chemists in the design and synthesis of molecular machines de novo. This minireview traces the development of artificial molecular machines from their prototypes in the form of shuttles and switches to their emergence as motors and pumps where supplies of energy in the form of chemical fuel, electrochemical potential and light activation become a minimum requirement for them to function away from equilibrium. The challenge facing this rapidly growing community of scientists and engineers today is one of putting wholly synthetic molecules to work, both individually and as collections. Here, we highlight some of the recent conceptual and practical advances relating to the operation of wholly synthetic rotary and linear motors. PMID:26833859

  12. These Synthetic Times

    Institute of Scientific and Technical Information of China (English)

    KIT GILLET

    2008-01-01

    @@ Already slated to be one of the most important cultural events in the buildup to this summer's Olympic games, Synthetic Times-Media Art China 2008 will feature the works of more than 30 artists from around the world. Upwards of 40 media art installations will be exhibited in the National Art Museum of China alone, along with performances, workshops, presentations, and discussion panels focusing on the art works and the growth of media art as a discipline.

  13. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    OpenAIRE

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (200...

  14. Cryptographic Attacks and Countermeasures - A Mathematical View

    OpenAIRE

    Canright, David; Stanica, Pantelimon

    2009-01-01

    2009 CyberSecurity Summit, Naval Postgraduate School 1st NPS Cyber Summit was held at the Naval Postgraduate School in Monterey, California on October 29, 2009. Sessions were held on the following topics: security requirements, Kerchkoffs' principle, mathematics of cybersecurity, the data encryption standard, nonlinear equations, Cyber attacks on Bluetooth EQ, Crypto properties of S-boxes.

  15. Modified localized attack on complex network

    Science.gov (United States)

    Dong, Gaogao; Du, Ruijin; Hao, Huifang; Tian, Lixin

    2016-01-01

    Since a shell structure contains a wealth of information, it is not only very important for understanding the transport properties of the network, but also essential to identify influential spreaders in complex networks. Nodes within each shell can be classified into two categories: protected nodes and unprotected nodes. In this paper, we propose a generalization of the localized attack, modified localized attack, which means that when a randomly chosen node (root node) is under attack, protected nodes will not be removed, but unprotected nodes in the nearest shells will fail. We numerically and analytically study the system robustness under this attack by taking an Erdös-Rényi (ER) network, a regular random (RR) network and a scale-free (SF) network as examples. Moreover, a fraction of nodes belonging to giant component S and a critical threshold q c , where S approaches to zero, are given. The result implies that increasing connection density has been found to be useful to significantly improve network robustness.

  16. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  17. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  18. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  19. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  20. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with…

  1. After Heart Attack, New Threat: Heart Failure

    Science.gov (United States)

    ... nih.gov/medlineplus/news/fullstory_159007.html After Heart Attack, New Threat: Heart Failure 1 in 4 survivors develops this serious ... TUESDAY, May 24, 2016 (HealthDay News) -- Risk of heart failure appears high within a few years of ...

  2. Nonepileptic attack disorder among married women

    Directory of Open Access Journals (Sweden)

    Dhanaraj M

    2005-01-01

    Full Text Available Aim : To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD among married women. Design: Prospective cohort study with 1-year follow-up. Setting: A tertiary care teaching hospital. Subjects: Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. Materials and Methods: The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized ′attack.′ The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. Results: The mean duration of illness was 18 months, and the pattern of the attack was ′fall and lying still′ in 53% and ′fall with generalized motor movements′ in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (c2 = 9.02, P = 0.003 and constant quarrel with other family members (c2 = 5.19, P = 0.02. The prevalence of sexual abuse was low (7%. Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (c2 = 4.52, P = 0.03 and lower frequency of attack at the time of reporting (c2 = 3.88, P = 0.05 correlated with good outcomes. Conclusion : Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  3. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  4. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  5. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim. PMID:16936505

  6. Effects of the Biodegradation on Biodegradable Polymer Blends and Polypropylene

    Science.gov (United States)

    Pereira, R. C. T.; Franchetti, S. M. M.; Agnelli, J. A. M.; Mattoso, L. H. C.

    2008-08-01

    The large use of plastics in the world generates a large amount of waste which persists around 200 years in the environment. To minimize this effect is important to search some new polymer materials: the blends of biodegradable polymers with synthetic polymers. It is a large area that needs an intensive research to investigate the blends properties and its behavior face to the different treatments to aim at the biodegradation. The blends used in this work are: some biodegradable polymers such as: poly(hydroxybutyrate) (PHB) and poly(ɛ-polycaprolactone) (PCL) with a synthetic polymer, polypropylene (PP), in lower concentration. These blends were prepared using an internal mixer (Torque Rheometer), and pressed. These films were submitted to fungus biotreatment. The films analyses will be carried out by Fourier Transform Infrared (FTIR), UV-Vis absorption (UV-Vis), Scanning Electronic Microscopy (SEM), DSC and TGA.

  7. Use of complementary nucleobase-containing synthetic polymers to prepare complex self-assembled morphologies in water† †Electronic supplementary information (ESI) available: Characterization of monomers, polymers and particles: NMR, SEC, TEM, SAXS, and DLS. See DOI: 10.1039/c6py00263c Click here for additional data file.

    Science.gov (United States)

    Kang, Yan; Pitto-Barry, Anaïs; S. Rolph, Marianne; Hua, Zan; Hands-Portman, Ian; Kirby, Nigel

    2016-01-01

    Amphiphilic nucleobase-containing block copolymers with poly(oligo(ethylene glycol) methyl ether methacrylate) as the hydrophilic block and nucleobase-containing blocks as the hydrophobic segments were successfully synthesized using RAFT polymerization and then self-assembled via solvent switch in aqueous solutions. Effects of the common solvent on the resultant morphologies of the adenine (A) and thymine (T) homopolymers, and A/T copolymer blocks and blends were investigated. These studies highlighted that depending on the identity of the common solvent, DMF or DMSO, spherical micelles or bicontinuous micelles were obtained. We propose that this is due to the presence of A–T interactions playing a key role in the morphology and stability of the resultant nanoparticles, which resulted in a distinct system compared to individual adenine or thymine polymers. Finally, the effects of annealing on the self-assemblies were explored. It was found that annealing could lead to better-defined spherical micelles and induce a morphology transition from bicontinuous micelles to onion-like vesicles, which was considered to occur due to a structural rearrangement of complementary nucleobase interactions resulting from the annealing process. PMID:27358655

  8. Polymer architectures via mass spectrometry and hyphenated techniques: A review.

    Science.gov (United States)

    Crotty, Sarah; Gerişlioğlu, Selim; Endres, Kevin J; Wesdemiotis, Chrys; Schubert, Ulrich S

    2016-08-17

    This review covers the application of mass spectrometry (MS) and its hyphenated techniques to synthetic polymers of varying architectural complexities. The synthetic polymers are discussed as according to their architectural complexity from linear homopolymers and copolymers to stars, dendrimers, cyclic copolymers and other polymers. MS and tandem MS (MS/MS) has been extensively used for the analysis of synthetic polymers. However, the increase in structural or architectural complexity can result in analytical challenges that MS or MS/MS cannot overcome alone. Hyphenation to MS with different chromatographic techniques (2D × LC, SEC, HPLC etc.), utilization of other ionization methods (APCI, DESI etc.) and various mass analyzers (FT-ICR, quadrupole, time-of-flight, ion trap etc.) are applied to overcome these challenges and achieve more detailed structural characterizations of complex polymeric systems. In addition, computational methods (software: MassChrom2D, COCONUT, 2D maps etc.) have also reached polymer science to facilitate and accelerate data interpretation. Developments in technology and the comprehension of different polymer classes with diverse architectures have significantly improved, which allow for smart polymer designs to be examined and advanced. We present specific examples covering diverse analytical aspects as well as forthcoming prospects in polymer science. PMID:27286765

  9. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  10. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  11. Viscoelasticity and primitive path analysis of entangled polymer liquids: From f-actin to polyethylene

    OpenAIRE

    Uchida, Nariya; Grest, Gary S.; Everaers, Ralf

    2007-01-01

    We combine computer simulations and scaling arguments to develop a unified view of polymer entanglement based on the primitive path analysis (PPA) of the microscopic topological state. Our results agree with experimentally measured plateau moduli for three different polymer classes over a wide rangeof reduced polymer densities: (i) semi-dilute theta solutions of synthetic polymers, (ii) the corresponding dense melts above the glass transition or crystallization temperature, and (iii) solution...

  12. Structural Characterization of Polymer-Clay Nanocomposites Prepared by Co-Precipitation Using EPR Techniques

    OpenAIRE

    Udo Kielmann; Gunnar Jeschke; Inés García-Rubio

    2014-01-01

    Polymer-clay nanocomposites (PCNCs) containing either a rubber or an acrylate polymer were prepared by drying or co-precipitating polymer latex and nanolayered clay (synthetic and natural) suspensions. The interface between the polymer and the clay nanoparticles was studied by electron paramagnetic resonance (EPR) techniques by selectively addressing spin probes either to the surfactant layer (labeled stearic acid) or the clay surface (labeled catamine). Continuous-wave (CW) EPR studies of th...

  13. Engineering Polymer Informatics

    OpenAIRE

    Adams, Nico; Ryder, Jennifer; Jessop, David M; Corbett, Peter; Murray-Rust, Peter

    2007-01-01

    The poster describes a strategy of for the development of polymer informatics. In particular, the development of polymer markup language, a polymer ontology and natural language processing tools for polymer literature.

  14. Antimocrobial Polymer

    Energy Technology Data Exchange (ETDEWEB)

    McDonald, William F. (Utica, OH); Huang, Zhi-Heng (Walnut Creek, CA); Wright, Stacy C. (Columbus, GA)

    2005-09-06

    A polymeric composition having antimicrobial properties and a process for rendering the surface of a substrate antimicrobial are disclosed. The composition comprises a crosslinked chemical combination of (i) a polymer having amino group-containing side chains along a backbone forming the polymer, (ii) an antimicrobial agent selected from quaternary ammonium compounds, gentian violet compounds, substituted or unsubstituted phenols, biguanide compounds, iodine compounds, and mixtures thereof, and (iii) a crosslinking agent containing functional groups capable of reacting with the amino groups. In one embodiment, the polymer is a polyamide formed from a maleic anhydride or maleic acid ester monomer and alkylamines thereby producing a polyamide having amino substituted alkyl chains on one side of the polyamide backbone; the crosslinking agent is a phosphine having the general formula (A)3P wherein A is hydroxyalkyl; and the antimicrobial agent is chlorhexidine, dimethylchlorophenol, cetyl pyridinium chloride, gentian violet, triclosan, thymol, iodine, and mixtures thereof.

  15. CASH vs. SYNTHETIC CDOs

    Directory of Open Access Journals (Sweden)

    Silviu Eduard Dinca

    2016-01-01

    Full Text Available During the past few years, in the recent post-crisis aftermath, global asset managers are constantly searching new ways to optimize their investment portfolios while financial and banking institutions around the world are exploring new alternatives to better secure their financing and refinancing demands altogether with the enhancement of their risk management capabilities. We will exhibit herewith a comparison between the true-sale and synthetic CDO securitizations as financial markets-based funding, investment and risks mitigation techniques, highlighting certain key structuring and implementation specifics on each of them.

  16. Transition in synthetic jets

    Czech Academy of Sciences Publication Activity Database

    Tesař, Václav; Kordík, Jozef

    Roč. 187, NOV 2012 ( 2012 ), s. 105-117. ISSN 0924-4247 R&D Projects: GA TA ČR(CZ) TA02020795; GA ČR(CZ) GPP101/12/P556; GA ČR(CZ) GCP101/11/J019 Institutional research plan: CEZ:AV0Z20760514 Keywords : turbulence * synthetic jet * transition * velocity spectra Subject RIV: BK - Fluid Dynamics Impact factor: 1.841, year: 2012 http://www.sciencedirect.com/science/article/pii/S0924424712005031

  17. Synthetic Aperture Compound Imaging

    DEFF Research Database (Denmark)

    Hansen, Jens Munk

    Medical ultrasound imaging is used for many purposes, e.g. for localizing and classifying cysts, lesions, and other processes. Almost any mass is first observed using B-mode imaging and later classified using e.g. color flow, strain, or attenuation imaging. It is therefore important that the B...... and the limiting factor is the amount of memory IO resources available. An equally high demand for memory throughput is found in the computer gaming industry, where a large part of the processing takes place on the graphics processing unit (GPU). Using the GPU, a framework for synthetic aperture imaging...

  18. Biomolecular conjugation inside synthetic polymer nanopores viaglycoprotein-lectin interactions

    Science.gov (United States)

    Ali, Mubarak; Ramirez, Patricio; Tahir, Muhammad Nawaz; Mafe, Salvador; Siwy, Zuzanna; Neumann, Reinhard; Tremel, Wolfgang; Ensinger, Wolfgang

    2011-04-01

    We demonstrate the supramolecular bioconjugation of concanavalin A (Con A) protein with glycoenzymehorseradish peroxidase (HRP) inside single nanopores, fabricated in heavy ion tracked polymermembranes. Firstly, the HRP-enzyme was covalently immobilized on the inner wall of the pores using carbodiimide coupling chemistry. The immobilized HRP-enzyme molecules bear sugar (mannose) groups available for the binding of Con A protein. Secondly, the bioconjugation of Con A on the pore wall was achieved through its biospecific interactions with the mannose residues of the HRP enzyme. The immobilization of biomolecules inside the nanopore leads to the reduction of the available area for ionic transport, and this blocking effect can be exploited to tune the conductance and selectivity of the nanopore in aqueous solution. Both cylindrical and conical nanopores were used in the experiments. The possibility of obtaining two or more conductance states (output), dictated by the degree of nanopore blocking resulted from the different biomolecules in solution (input), as well as the current rectification properties obtained with the conical nanopore, could also allow implementing information processing at the nanometre scale. Model simulations based on the transport equations further verify the feasibility of the sensing procedure that involves concepts from supramolecular chemistry, molecular imprinting, recognition, and nanotechnology.

  19. Molecularly Imprinted Polymers: synthetic receptors for diagnostic medical devices

    OpenAIRE

    Peeters, Marloes

    2013-01-01

    Irritable Bowel Syndrome (IBS) is a functional bowel disorder which is characterized by abdominal pain and changes in bowel habit. It has a profound negative impact on the quality of a patient’s life and is associated with more than €20 billion of indirect and direct medial costs per year. Most IBS therapies are based on relief of the symptoms, since the organic cause of the disease remains largely unknown. Recently, the involvement of biogenic amines such as serotonin and histamine has been ...

  20. COMPOSITES BASED ON SYNTHETIC POLYMERS AND WOOD WASTE

    Directory of Open Access Journals (Sweden)

    Lucia DUMITRESCU

    2015-12-01

    Full Text Available The paper presents the results of the research dedicated to synthesis and characterization of some new, ecological composite materials based on an acrylic copolymer, lignin derivative iron and chromium lignosulfonate and Salix wood sawdust. The FT-IR analysis put into evidence the complex interactions, by esterification and etherification reactions, between the organic functional hydroxyl groups of lignosulfonate and Salix sawdust (the fillers with the organic functional groups (carboxyl, ester from the structure of acrylic copolymer (the matrix and explain the improved properties of the new composites. The proposed new composites are in agreement with the research in the field of recycling lignocellulosic waste to obtain new ecological, environmental friendly materials.

  1. Polymer electronics

    CERN Document Server

    Geoghegan, Mark

    2013-01-01

    Polymer electronics is the science behind many important new developments in technology, such as the flexible electronic display (e-ink) and many new developments in transistor technology. Solar cells, light-emitting diodes, and transistors are all areas where plastic electronics is likely to, or is already having, a serious impact on our daily lives. With polymer transistors and light-emitting diodes now being commercialised, there is a clear need for a pedagogic text thatdiscusses the subject in a clear and concise fashion suitable for senior undergraduate and graduate students. The content

  2. Polymer Materials

    Institute of Scientific and Technical Information of China (English)

    Charles C. Han; DONG Jinyong; NIU Hui; CHENG He; HUANG Ye; ZHENG Jianfen; XU Shanshan

    2011-01-01

    @@ Since the second half of the 20th century, polymer materials have already become an essential part of our daily life.The use of polymeric materials has already exceeded that of metals and ceramics in terms of volume and is intimately connected to our clothing, food, household use, transportation, and medical needs.Meanwhile it also brought some recycle and environmental problems.In the 21 st century, human beings are facing ever increasing challenges on environmental protection, energy shortage, and health-medical problems, which have made even higher demand on polymer materials due to its light weight, flexibility and high functionality.

  3. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  4. Nanostructured conductive polymers for advanced energy storage.

    Science.gov (United States)

    Shi, Ye; Peng, Lele; Ding, Yu; Zhao, Yu; Yu, Guihua

    2015-10-01

    Conductive polymers combine the attractive properties associated with conventional polymers and unique electronic properties of metals or semiconductors. Recently, nanostructured conductive polymers have aroused considerable research interest owing to their unique properties over their bulk counterparts, such as large surface areas and shortened pathways for charge/mass transport, which make them promising candidates for broad applications in energy conversion and storage, sensors, actuators, and biomedical devices. Numerous synthetic strategies have been developed to obtain various conductive polymer nanostructures, and high-performance devices based on these nanostructured conductive polymers have been realized. This Tutorial review describes the synthesis and characteristics of different conductive polymer nanostructures; presents the representative applications of nanostructured conductive polymers as active electrode materials for electrochemical capacitors and lithium-ion batteries and new perspectives of functional materials for next-generation high-energy batteries, meanwhile discusses the general design rules, advantages, and limitations of nanostructured conductive polymers in the energy storage field; and provides new insights into future directions. PMID:26119242

  5. A trefoil knotted polymer produced through ring expansion.

    Science.gov (United States)

    Cao, Peng-Fei; Mangadlao, Joey; Advincula, Rigoberto

    2015-04-20

    A synthetic strategy is reported for the production of a trefoil knotted polymer from a copper(I)-templated helical knot precursor through ring expansion. The expected changes in the properties of the knotted polymer compared to a linear analogue, for example, reduced hydrodynamic radius and lower intrinsic viscosity, together with an atomic force microscopy (AFM) image of individual molecular knots, confirmed the formation of the resulting trefoil knotted polymer. The strategies employed here could be utilized to enrich the variety of available polymers with new architectures. PMID:25728998

  6. Development of polymers for large scale roll-to-roll processing of polymer solar cells

    DEFF Research Database (Denmark)

    Carlé, Jon Eggert

    platform for polymer development. PSC devices based on PDTSTTz-4 and PCBM were produced using the laboratory roll coater and through optimerization of the processing parameters a PCE of 2.95 % at ambient condition. This efficiency is among the highest obtained on flexible ITO-free substrates using slot......Development of polymers for large scale roll-to-roll processing of polymer solar cells Conjugated polymers potential to both absorb light and transport current as well as the perspective of low cost and large scale production has made these kinds of material attractive in solar cell research. The...... and how this affects the PSC parameters are presented. It is generally found that it is possible to synthetically control the absorption spectrum of conjugated polymer systems. One way to alter the spectrum is by incorporating alternating donor-acceptor motifs, resulting in an additional optical...

  7. Analog synthetic biology.

    Science.gov (United States)

    Sarpeshkar, R

    2014-03-28

    We analyse the pros and cons of analog versus digital computation in living cells. Our analysis is based on fundamental laws of noise in gene and protein expression, which set limits on the energy, time, space, molecular count and part-count resources needed to compute at a given level of precision. We conclude that analog computation is significantly more efficient in its use of resources than deterministic digital computation even at relatively high levels of precision in the cell. Based on this analysis, we conclude that synthetic biology must use analog, collective analog, probabilistic and hybrid analog-digital computational approaches; otherwise, even relatively simple synthetic computations in cells such as addition will exceed energy and molecular-count budgets. We present schematics for efficiently representing analog DNA-protein computation in cells. Analog electronic flow in subthreshold transistors and analog molecular flux in chemical reactions obey Boltzmann exponential laws of thermodynamics and are described by astoundingly similar logarithmic electrochemical potentials. Therefore, cytomorphic circuits can help to map circuit designs between electronic and biochemical domains. We review recent work that uses positive-feedback linearization circuits to architect wide-dynamic-range logarithmic analog computation in Escherichia coli using three transcription factors, nearly two orders of magnitude more efficient in parts than prior digital implementations. PMID:24567476

  8. Synthetic biology: Understanding biological design from synthetic circuits

    OpenAIRE

    Mukherji, Shankar; van Oudenaarden, Alexander

    2009-01-01

    An important aim of synthetic biology is to uncover the design principles of natural biological systems through the rational design of gene and protein circuits. Here, we highlight how the process of engineering biological systems — from synthetic promoters to the control of cell–cell interactions — has contributed to our understanding of how endogenous systems are put together and function. Synthetic biological devices allow us to grasp intuitively the ranges of behaviour generated by simple...

  9. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  10. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  11. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date. PMID:26115644

  12. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  13. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  14. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof;

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In...... this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible...... attacks in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  15. Heart Attack Before 50 Ups Early Death Risk

    Science.gov (United States)

    ... 160692.html Heart Attack Before 50 Ups Early Death Risk But healthy living can improve those odds, ... 30, 2016 (HealthDay News) -- The risk of early death after a heart attack has lessened over the ...

  16. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    Science.gov (United States)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  17. Concrete Deterioration under Alternate Action of Carbonation and Sulfate Attack

    Directory of Open Access Journals (Sweden)

    Fenglan Li

    2013-11-01

    Full Text Available By micro- and macro-observations, the study reveals the deterioration mechanisms of concrete under alternate action of carbonation and sodium sulfate solution attack (C-SA comparied with the single sodium sulfate solution attack (SA. The studies indicate that in both cases, the main attack product is ettringite, some gypsum is checked only in the first layer of case SA, the thaumasite form of sulfate attack is not initiated in case C-SA. Compared with the single sodium sulfate solution attack, although the carbonation layer mitigates the extent of sulfate attack in limited exposure period, the alternate action of carbonation and sulfate attack still leads to strength degradation to some extent. The effect of carbonation on sulfate attack for longer exposure period deserves further research.

  18. Sex Suffers for Younger Adults After Heart Attack

    Science.gov (United States)

    ... gov/news/fullstory_160722.html Sex Suffers for Younger Adults After Heart Attack Lack of interest a ... 2016 (HealthDay News) -- After a heart attack, many younger adults experience sexual difficulties -- and women more so ...

  19. Heart Attack Help? There's an App for That

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159504.html Heart Attack Help? There's an App for That Emergency medicine ... American Heart Association. When someone is suffering a heart attack, stroke or cardiac arrest, quick action can be ...

  20. Extensions of the Cube Attack Based on Low Degree Annihilators

    Science.gov (United States)

    Zhang, Aileen; Lim, Chu-Wee; Khoo, Khoongming; Wei, Lei; Pieprzyk, Josef

    At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit relations with low-degree polynomials.

  1. Heart Attack: Tips for Recovering and Staying Well

    Science.gov (United States)

    ... version Heart Attack | Tips for Recovering and Staying Well If you have had a heart attack, you ... healthy diet. The food you eat affects how well your blood flows through your heart and arteries. ...

  2. NEXAFS imaging of synthetic organic materials

    Directory of Open Access Journals (Sweden)

    Ben Watts

    2012-04-01

    Full Text Available The utilization of near edge x-ray absorption fine structure spectroscopy (NEXAFS in achieving strong, novel contrast for soft x-ray microscopy and scattering methods has been afforded significant success in elucidating outstanding issues in organic materials systems due to the unique combination of high sensitivity to chemical functionality and thus composition, moderately high spatial resolution and moderate radiation damage. We illustrate the basic operating principles of NEXAFS spectroscopy, scanning transmission x-ray microscopy, and resonant soft x-ray scattering, and exemplify the impact by discussing a few recent applications. The focus of this perspective will be the characterization of synthetic organic materials, with a further emphasis on applications involving semi-conducting polymers. We also provide a brief perspective of future instrument and method developments.

  3. Polymer physics

    CERN Document Server

    Gedde, Ulf W

    1999-01-01

    This book is the result of my teaching efforts during the last ten years at the Royal Institute of Technology. The purpose is to present the subject of polymer physics for undergraduate and graduate students, to focus the fundamental aspects of the subject and to show the link between experiments and theory. The intention is not to present a compilation of the currently available literature on the subject. Very few reference citations have thus been made. Each chapter has essentially the same structure: starling with an introduction, continuing with the actual subject, summarizing the chapter in 30D-500 words, and finally presenting problems and a list of relevant references for the reader. The solutions to the problems presented in Chapters 1-12 are given in Chapter 13. The theme of the book is essentially polymer science, with the exclusion of that part dealing directly with chemical reactions. The fundamentals in polymer science, including some basic polymer chemistry, are presented as an introduction in t...

  4. Polymer Science.

    Science.gov (United States)

    Frank, Curtis W.

    1979-01-01

    Described is a series of four graduate level courses in polymer science, offered or currently in preparation, at Stanford University. Course descriptions and a list of required and recommended texts are included. Detailed course outlines for two of the courses are presented. (BT)

  5. Securing iris recognition systems against masquerade attacks

    OpenAIRE

    Galbally Herrero, Javier; Gómez-Barrero, Marta; Ross, Arun A.; Fiérrez, Julián; Ortega-García, Javier

    2013-01-01

    Javier Galbally ; Marta Gomez-Barrero ; Arun Ross ; Julian Fierrez ; Javier Ortega-Garcia; "Securing iris recognition systems against masquerade attacks", Biometric and Surveillance Technology for Human and Activity Identification X, Proc. SPIE 8712 (May 31, 2013); doi:10.1117/12.2015690. Copyright 2013 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in...

  6. Incidence of Fungal attack on Aircraft Fuselage

    Directory of Open Access Journals (Sweden)

    H. M. Dayal

    1968-10-01

    Full Text Available Incidence of fungal attack on the fuselage of a few Vampire aircraft has been observed. The fungus isolated from the infected regions has been tentatively indentified as TorulaSp. Laboratory experiments have revealed that within four weeks this fungus causes about 44 percent loss in the tensile strength of the brich plywood used in the manufacture of the fuselage of the aircraft.

  7. Transient ischemic attack after Mesobuthus gibbosus envenomation

    OpenAIRE

    Golcuk, Yalcin; Ozsarac, Murat; Bilge, Adnan; Golcuk, Burcu; Cinar, Bilge Piri; Hayran, Mustafa

    2014-01-01

    Endometriosis Mesobuthus gibbosus is a medically important venomous scorpion in western of Turkey which causes significant morbidity. Envenoming of this species scorpion results with varying degrees of local symptoms and clinically important systemic effects. This case describes an authenticated first case of transient ischemic attack in a 68 year-old-woman following envenoming by M. gibbosus in Turkey.Keywords: Scorpion, Envenomation, Emergency department

  8. Visualizing Endpoint Security Technologies using Attack Trees

    OpenAIRE

    Pettersson , Stefan

    2008-01-01

    Software vulnerabilities in programs and malware deployments have been increasing almost every year since we started measuring them. Information about how to program securely, how malware shall be avoided and technological countermeasures for this are more available than ever. Still, the trend seems to favor the attacker. This thesis tries to visualize the effects of a selection of technological countermeasures that have been proposed by researchers. These countermeasures: non-executable memo...

  9. Towards a translational model of panic attacks

    OpenAIRE

    Luiz Carlos Schenberg

    2010-01-01

    About 20 years ago, Deakin and Graeff proposed that whereas generalized anxiety disorder is produced by the overactivity of 5-HT excitatory projections from dorsal raphe nucleus to the areas of prefrontal cortex and amygdala which process distal threat, panic attacks are a dysfunction of 5-HT inhibitory projections from dorsal raphe nucleus to the dorsal periaqueductal gray matter, thereby releasing the responses to proximal threat, innate fear or anoxia. Besides, they suggested that the decr...

  10. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  11. An Analysis of Various Attacks in MANET

    OpenAIRE

    M.Udhayamoorthi; C. Senthilkumar; Dr S. Karthik; Dr. T.Kalaikumaran

    2014-01-01

    An Ad-hoc network is a self-organized network, without a central coordinator, and which frequently changes its topology. According to the perspective of our paper, we try to connect the current status of computers era to adhoc networking. As adhoc networks has been unleashing several updated technologies, it is the most growing area in the field of networks in information and communication Engineering has ever seen .we start with area introduction, deeply reviewed about the various attacks es...

  12. Attacks and Counterattacks on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nusrat Fatema

    2013-12-01

    Full Text Available WSN is formed by autonomous nodes with partial memo ry, communication range, power, and bandwidth. Their occupation depends on inspecting corporal and environmental conditions and communing through a system and performing data processing. The applicat ion field is vast, comprising military, ecology, healthcare, home or commercial and require a highly secured communication. The paper analyses different types of attacks and counterattacks and provides so lutions for the WSN threats.

  13. Quantum Key Distribution against Trojan Horse Attacks

    Institute of Scientific and Technical Information of China (English)

    CAI Qing-Yu; LV Hua

    2007-01-01

    Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology.

  14. Nonepileptic attack disorder among married women

    OpenAIRE

    Dhanaraj M; Rangaraj R; Arulmozhi T; Vengatesan A

    2005-01-01

    Aim : To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Design: Prospective cohort study with 1-year follow-up. Setting: A tertiary care teaching hospital. Subjects: Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. Materials and Methods: The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the...

  15. NETWORK SECURITY: ATTACKS, TOOLS AND TECHNIQUES

    OpenAIRE

    Mhatre Suvidnya Shashikant; Potadar Devangi; Salvi Bhageshree

    2015-01-01

    Network security is main issue of this generation of computing because many types of attacks are increasing day by day. Establishing a network is not a big issue for network admini st rators but protecting the entire network is a big issue. There are various methods and tools are available today for destroying the existing network. In this paper we mainly emphasize on the network security also we present some major issues that can affect our network.

  16. The structural diversity of artificial genetic polymers.

    Science.gov (United States)

    Anosova, Irina; Kowal, Ewa A; Dunn, Matthew R; Chaput, John C; Van Horn, Wade D; Egli, Martin

    2016-02-18

    Synthetic genetics is a subdiscipline of synthetic biology that aims to develop artificial genetic polymers (also referred to as xeno-nucleic acids or XNAs) that can replicate in vitro and eventually in model cellular organisms. This field of science combines organic chemistry with polymerase engineering to create alternative forms of DNA that can store genetic information and evolve in response to external stimuli. Practitioners of synthetic genetics postulate that XNA could be used to safeguard synthetic biology organisms by storing genetic information in orthogonal chromosomes. XNA polymers are also under active investigation as a source of nuclease resistant affinity reagents (aptamers) and catalysts (xenozymes) with practical applications in disease diagnosis and treatment. In this review, we provide a structural perspective on known antiparallel duplex structures in which at least one strand of the Watson-Crick duplex is composed entirely of XNA. Currently, only a handful of XNA structures have been archived in the Protein Data Bank as compared to the more than 100 000 structures that are now available. Given the growing interest in xenobiology projects, we chose to compare the structural features of XNA polymers and discuss their potential to access new regions of nucleic acid fold space. PMID:26673703

  17. Attack Detection By Clustering And Classification Approach

    Directory of Open Access Journals (Sweden)

    Priyanka J. Pathak, Prof. Snehlata Dongre

    2012-04-01

    Full Text Available Intrusion detection is a software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Security is becoming big issue for all networks. Hackers and intruders have made many successful attempts to bring down high profile company networks and web services. Intrusion Detection System (IDS is an important detection that is used as a countermeasure to preserve data integrity and system availability from attacks. The work is implemented in two phases, in first phase clustering by K-means is done and in next step of classification is done with k-nearest neighbours and decision trees. The objects are clustered or grouped based on the principle of maximizing the intra-class similarity and minimizing the interclass similarity. This paper proposes an approach which make the clusters of similar attacks and in next step of classification with K nearest neighbours and Decision trees it detect the attack types. This method is advantageous over single classifier as it detect better class than single classifier system.

  18. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    OpenAIRE

    Honglong Chen; Wei Lou; Xice Sun; Zhi Wang

    2010-01-01

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against worm...

  19. A Structured Multi-signature Scheme Against Forgery Attack

    Directory of Open Access Journals (Sweden)

    Wenjun Luo

    2011-12-01

    Full Text Available There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s schemes that can not resist inside attack and outside attack. In this paper, we briefly review Burmester’s program and relate safety analysis, Burmester’s scheme vulnerable to forgery attack. Then we propose a structured multi-signature scheme against forgery attack. In the new scheme, we increase the signature parameter verification to improve security.

  20. Migraineurs with exercise-triggered attacks have a distinct migraine

    OpenAIRE

    Koppen, Hille; van Veldhoven, Peter LJ

    2013-01-01

    Background Sport as a migraine trigger has been reported, but extensive information on these triggered attacks and the patients experiencing these attacks is lacking. Goal of this study was to investigate the lifetime prevalence of exercise triggered migraine attacks in migraine patients and if patients with exercise triggered attacks experience specific prodromal or ictal migraine symptoms. Methods 103 consecutive migraine patients seen during their first visit at a Dutch headache clinic wer...

  1. Machine Learning Methods for Attack Detection in the Smart Grid

    OpenAIRE

    Ozay, Mete; Esnaola, Inaki; Vural, Fatos T. Yarman; Kulkarni, Sanjeev R.; Poor, H. Vincent

    2015-01-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed appro...

  2. Detecting man-in-the-middle attacks by precise timing

    OpenAIRE

    Aziz, Benjamin; Hamilton, G.

    2009-01-01

    Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a s...

  3. Polymer Therapeutics in Relation to Dentistry.

    Science.gov (United States)

    Rojo, Luis; Deb, Sanjukta

    2015-01-01

    The successful clinical application arising from advances in polymer and macromolecular sciences in different fields of medicine has opened new explorative approaches for the future design and development of the ever more sophisticated bio-/nanotechnologies that are needed to realise the full potential of modern dentistry. In this chapter, the most recent polymer therapeutic approaches for alveolar ridge augmentation, bone grafts, periodontal disease, restorative materials and scaffolds or carriers for cell-based therapies are presented highlighting the potential of either synthetic or natural polymers, such as polyesters, polyolefins, polyacrylates or chitosan for example, being tailored and engineered to yield a range of properties valuable in the design and development of dental polymer therapeutics. PMID:26201272

  4. Tissue Harmonic Synthetic Aperture Imaging

    DEFF Research Database (Denmark)

    Rasmussen, Joachim

    The main purpose of this PhD project is to develop an ultrasonic method for tissue harmonic synthetic aperture imaging. The motivation is to advance the field of synthetic aperture imaging in ultrasound, which has shown great potentials in the clinic. Suggestions for synthetic aperture tissue...... harmonic techniques have been made, but none of these methods have so far been applicable for in-vivo imaging. The basis of this project is a synthetic aperture technique known as synthetic aperture sequential beamforming (SASB). The technique utilizes a two step beamforming approach to drastically reduce...... system complexity compared to conventional synthetic aperture techniques. In this project, SASB is sought combined with a pulse inversion technique for 2nd harmonic tissue harmonic imaging. The advantages in tissue harmonic imaging (THI) are expected to further improve the image quality of SASB. The...

  5. Polyphosphazenes - New polymers with inorganic backbone atoms

    Science.gov (United States)

    Allcock, H. R.

    1976-01-01

    Unique and useful properties of the class of nonhydrocarbon, nonhalocarbon, nonsilicone polymers known as polyphosphazenes are discussed at length. These polymers, with molecular weights to 4 million (degree of polymerization 15,000), can be fabricated as tubes, fibers, woven fabrics, flexible films, or plates, and many variants are stable to attack by water, bases, aqueous acids, jet fuels, oils, hydraulic fluids, gasoline, or other hydrocarbons. Rubbery polymers with these properties can be fashioned into flexible hose, fuel hose, gaskets, or O-rings. Since they do not provoke clotting reactions in blood, and reveal no carcinogenic effects to date, they are considered for internal prosthetic applications (replacement bone, temporary skin, heart valves), as biodegradable suturing material, as carriers for slow release of drugs, and as carriers for chemotherapeutic agents against cancers.

  6. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  7. Attacks Prevention and Detection Techniques In MANET: A Survey

    Directory of Open Access Journals (Sweden)

    Pranjali D. Nikam,

    2014-11-01

    Full Text Available Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node which is dynamically moves from one location to another location. Both attacks Active as well as Passive attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as compare to wired networks. In last few years many security and attacks issue are face many researchers in MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks and Packet modification attacks found in MANET. At the time of data communication all the above mentioned attacks access data easily without permission. To solve the problem of attacks in MANET and secure data communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid algorithm for secure intrusion detection in MANET.

  8. A Review of Man-in-the-Middle Attacks

    OpenAIRE

    Gangan, Subodh

    2015-01-01

    This paper presents a survey of man-in-the-middle (MIM) attacks in communication networks and methods of protection against them. In real time communication, the attack can in many situations be discovered by the use of timing information. The most common attacks occur due to Address Resolution Protocol (ARP) cache poisoning, DNS spoofing, session hijacking, and SSL hijacking.

  9. Vulnerability Assessment by Learning Attack Specifications in Graphs

    OpenAIRE

    Franqueira, Virginia N L; Lopes, Raul H. C.

    2007-01-01

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies to networks in general, including social networks and computer grid.

  10. Synthetic circuits, devices and modules

    OpenAIRE

    Zhang, Hong; Jiang, Taijiao

    2010-01-01

    The aim of synthetic biology is to design artificial biological systems for novel applications. From an engineering perspective, construction of biological systems of defined functionality in a hierarchical way is fundamental to this emerging field. Here, we highlight some current advances on design of several basic building blocks in synthetic biology including the artificial gene control elements, synthetic circuits and their assemblies into devices and modules. Such engineered basic buildi...

  11. Synthetic Biology for Therapeutic Applications

    OpenAIRE

    Abil, Zhanar; Xiong, Xiong; Zhao, Huimin

    2014-01-01

    Synthetic biology is a relatively new field with the key aim of designing and constructing biological systems with novel functionalities. Today, synthetic biology devices are making their first steps in contributing new solutions to a number of biomedical challenges, such as emerging bacterial antibiotic resistance and cancer therapy. This review discusses some synthetic biology approaches and applications that were recently used in disease mechanism investigation and disease modeling, drug d...

  12. A Versatile Synthetic Extracellular Matrix Mimic via Thiol-Norbornene Photopolymerization

    OpenAIRE

    Fairbanks, Benjamin D.; Schwartz, Michael P.; Halevi, Alexandra E.; Nuttelman, Charles R.; Bowman, Christopher N.; Anseth, Kristi S.

    2009-01-01

    Synthetic hydrogels with engineered, cell-mediated degradation sites are an important category of biomimetic materials. Here, hydrogels are synthesized by a step-growth reaction mechanism via a radically mediated thiol-norbornene (thiol-ene) photopolymerization. This reaction combines the advantages of ideal, homogeneous polymer network formation, facile incorporation of peptides without post-synthetic modification, and spatial and temporal control over the network evolution into a single sys...

  13. Flow Control of the Stingray UAV at Low Angles of Attack

    Science.gov (United States)

    Farnsworth, John; Vaccaro, John; Amitay, Michael

    2007-11-01

    The effectiveness of active flow control, via synthetic jets and steady blowing jets, on the aerodynamic performance of the Stingray UAV was investigated experimentally in a wind tunnel. Global flow measurements were conducted using a six component sting balance, static pressure, and Particle Image Velocimetry (PIV) measurements. Using active control for trimming the Stingray UAV in pitch and roll at low angles of attack has similar effects to those with conventional control effectors. The synthetic jets were able to alter the local streamlines through the formation of a quasi-steady interaction region on the suction surface of the vehicle's wing. Phase locked data were acquired to provide insight into the growth, propagation, and decay of the synthetic jet impulse and its interaction with the cross-flow. The changes induced on the moments and forces can be proportionally controlled by either changing the momentum coefficient or by driving the synthetic jets with a pulse modulation waveform. This can lead the way for future development of closed-loop control models.

  14. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  15. Synthetic Aperture Ultrasound Imaging

    DEFF Research Database (Denmark)

    Jensen, Jørgen Arendt; Nikolov, Svetoslav; Gammelmark, Kim Løkke;

    2006-01-01

    The paper describes the use of synthetic aperture (SA) imaging in medical ultrasound. SA imaging is a radical break with today's commercial systems, where the image is acquired sequentially one image line at a time. This puts a strict limit on the frame rate and the possibility of acquiring a...... SA imaging. Due to the complete data set, it is possible to have both dynamic transmit and receive focusing to improve contrast and resolution. It is also possible to improve penetration depth by employing codes during ultrasound transmission. Data sets for vector flow imaging can be acquired using...... short imaging sequences, whereby both the correct velocity magnitude and angle can be estimated. A number of examples of both phantom and in-vivo SA images will be presented measured by the experimental ultrasound scanner RASMUS to demonstrate the many benefits of SA imaging....

  16. Synthetic antibiofilm peptides.

    Science.gov (United States)

    de la Fuente-Núñez, César; Cardoso, Marlon Henrique; de Souza Cândido, Elizabete; Franco, Octavio Luiz; Hancock, Robert E W

    2016-05-01

    Bacteria predominantly exist as multicellular aggregates known as biofilms that are associated with at least two thirds of all infections and exhibit increased adaptive resistance to conventional antibiotic therapies. Therefore, biofilms are major contributors to the global health problem of antibiotic resistance, and novel approaches to counter them are urgently needed. Small molecules of the innate immune system called host defense peptides (HDPs) have emerged as promising templates for the design of potent, broad-spectrum antibiofilm agents. Here, we review recent developments in the new field of synthetic antibiofilm peptides, including mechanistic insights, synergistic interactions with available antibiotics, and their potential as novel antimicrobials against persistent infections caused by biofilms. This article is part of a Special Issue entitled: Antimicrobial peptides edited by Karl Lohner and Kai Hilpert. PMID:26724202

  17. Variation and Synthetic Speech

    CERN Document Server

    Miller, C; Massey, N; Miller, Corey; Karaali, Orhan; Massey, Noel

    1997-01-01

    We describe the approach to linguistic variation taken by the Motorola speech synthesizer. A pan-dialectal pronunciation dictionary is described, which serves as the training data for a neural network based letter-to-sound converter. Subsequent to dictionary retrieval or letter-to-sound generation, pronunciations are submitted a neural network based postlexical module. The postlexical module has been trained on aligned dictionary pronunciations and hand-labeled narrow phonetic transcriptions. This architecture permits the learning of individual postlexical variation, and can be retrained for each speaker whose voice is being modeled for synthesis. Learning variation in this way can result in greater naturalness for the synthetic speech that is produced by the system.

  18. Fiber-reinforced polymer concrete: Property improvement by gamma irradiation

    Energy Technology Data Exchange (ETDEWEB)

    Martinez B, G. [Laboratorio de Investigacion y Desarrollo de Materiales Avanzados, Facultad de Quimica, Universidad Autonoma del Estado de Mexico, Km. 12 Carretera Toluca-Atlacomulco, San Cayetano 50200, Estado de Mexico (Mexico); Brostow, W. [Laboratory of Advanced Polymers and Optimized Materials, Department of Materials Science and Engineering, University of North Texas, Denton TX 76203-5310 (United States)], e-mail: gonzomartinez02@yahoo.com.mx

    2009-07-01

    Polymer concrete (PC) is a particulate composite in which a thermoset resin forms a polymeric matrix and binds inorganic aggregates (dispersed particles of strengthening phases). This in contrast to Portland cement concrete (PCC) in which the binding is a result of interaction of cement with water. Adding polymeric materials to the concrete one can obtain high compressive and flexural strength, high impact and abrasion resistance, lower weight and lower costs. Moreover, PC is a very good repair material for structure elements damaged by trapping water inside the structure and by acid attacks which take place in the PCC. In the present chapter we discuss uses of polymer concrete and the importance of using gamma radiation as a novel technology for manufacturing fiber-reinforced polymer concrete. Our technology is different from the costly and time consuming current procedures such as chemical attack or thermal treatment. (Author)

  19. Compartmentalization and Transport in Synthetic Vesicles.

    Science.gov (United States)

    Schmitt, Christine; Lippert, Anna H; Bonakdar, Navid; Sandoghdar, Vahid; Voll, Lars M

    2016-01-01

    Nanoscale vesicles have become a popular tool in life sciences. Besides liposomes that are generated from phospholipids of natural origin, polymersomes fabricated of synthetic block copolymers enjoy increasing popularity, as they represent more versatile membrane building blocks that can be selected based on their specific physicochemical properties, such as permeability, stability, or chemical reactivity. In this review, we focus on the application of simple and nested artificial vesicles in synthetic biology. First, we provide an introduction into the utilization of multicompartmented vesosomes as compartmentalized nanoscale bioreactors. In the bottom-up development of protocells from vesicular nanoreactors, the specific exchange of pathway intermediates across compartment boundaries represents a bottleneck for future studies. To date, most compartmented bioreactors rely on unspecific exchange of substrates and products. This is either based on changes in permeability of the coblock polymer shell by physicochemical triggers or by the incorporation of unspecific porin proteins into the vesicle membrane. Since the incorporation of membrane transport proteins into simple and nested artificial vesicles offers the potential for specific exchange of substances between subcompartments, it opens new vistas in the design of protocells. Therefore, we devote the main part of the review to summarize the technical advances in the use of phospholipids and block copolymers for the reconstitution of membrane proteins. PMID:26973834

  20. Compartmentalization and Transport in Synthetic Vesicles

    Directory of Open Access Journals (Sweden)

    Christine eSchmitt

    2016-02-01

    Full Text Available Nano-scale vesicles have become a popular tool in life sciences. Besides liposomes that are generated from phospholipids of natural origin, polymersomes fabricated of synthetic block copolymers enjoy increasing popularity, as they represent more versatile membrane building blocks that can be selected based on their specific physicochemical properties, like permeability, stability or chemical reactivity.In this review, we focus on the application of simple and nested artificial vesicles in synthetic biology. First, we provide an introduction into the utilization of multi-compartmented vesosomes as compartmentalized nano-scale bioreactors. In the bottom-up development of protocells from vesicular nano-reactors, the specific exchange of pathway intermediates across compartment boundaries represents a bottleneck for future studies. To date, most compartmented bioreactors rely on unspecific exchange of substrates and products. This is either based on changes in permeability of the coblock polymer shell by physicochemical triggers or by the incorporation of unspecific porin proteins into the vesicle membrane. Since the incorporation of membrane transport proteins into simple and nested artificial vesicles offers the potential for specific exchange of substances between subcompartments, it opens new vistas in the design of protocells. Therefore we devote the main part of the review to summarize the technical advances in the use of phospholipids and block copolymers for the reconstitution of membrane proteins.