WorldWideScience

Sample records for bomb attack investigation

  1. Ancestry Analysis in the 11-M Madrid Bomb Attack Investigation

    OpenAIRE

    Christopher Phillips; Lourdes Prieto; Manuel Fondevila; Antonio Salas; Antonio Gómez-Tato; José Alvarez-Dios; Antonio Alonso; Alejandro Blanco-Verea; María Brión; Marta Montesino; Angel Carracedo; María Victoria Lareu

    2009-01-01

    The 11-M Madrid commuter train bombings of 2004 constituted the second biggest terrorist attack to occur in Europe after Lockerbie, while the subsequent investigation became the most complex and wide-ranging forensic case in Spain. Standard short tandem repeat (STR) profiling of 600 exhibits left certain key incriminatory samples unmatched to any of the apprehended suspects. A judicial order to perform analyses of unmatched samples to differentiate European and North African ancestry became a...

  2. Ancestry analysis in the 11-M Madrid bomb attack investigation.

    Directory of Open Access Journals (Sweden)

    Christopher Phillips

    Full Text Available The 11-M Madrid commuter train bombings of 2004 constituted the second biggest terrorist attack to occur in Europe after Lockerbie, while the subsequent investigation became the most complex and wide-ranging forensic case in Spain. Standard short tandem repeat (STR profiling of 600 exhibits left certain key incriminatory samples unmatched to any of the apprehended suspects. A judicial order to perform analyses of unmatched samples to differentiate European and North African ancestry became a critical part of the investigation and was instigated to help refine the search for further suspects. Although mitochondrial DNA (mtDNA and Y-chromosome markers routinely demonstrate informative geographic differentiation, the populations compared in this analysis were known to show a proportion of shared mtDNA and Y haplotypes as a result of recent gene-flow across the western Mediterranean, while any two loci can be unrepresentative of the ancestry of an individual as a whole. We based our principal analysis on a validated 34plex autosomal ancestry-informative-marker single nucleotide polymorphism (AIM-SNP assay to make an assignment of ancestry for DNA from seven unmatched case samples including a handprint from a bag containing undetonated explosives together with personal items recovered from various locations in Madrid associated with the suspects. To assess marker informativeness before genotyping, we predicted the probable classification success for the 34plex assay with standard error estimators for a naïve Bayesian classifier using Moroccan and Spanish training sets (each n = 48. Once misclassification error was found to be sufficiently low, genotyping yielded seven near-complete profiles (33 of 34 AIM-SNPs that in four cases gave probabilities providing a clear assignment of ancestry. One of the suspects predicted to be North African by AIM-SNP analysis of DNA from a toothbrush was identified late in the investigation as Algerian in origin. The

  3. Suicide bomb attack causing penetrating craniocerebral injury

    Institute of Scientific and Technical Information of China (English)

    Manzar Hussain; Muhammad Ehsan Bari

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma,although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails.In our case,a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack.The skull X-ray showed a single intracranial nail.Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue.At 6 months' follow-up his right-sided power improved to against gravity.

  4. Research on First Attack Probability Model of an Attacker Level Bombing Anti-air Radars

    Institute of Scientific and Technical Information of China (English)

    LUO Peng-cheng; MU Fu-ling; ZHOU Jing-lun

    2007-01-01

    The paper mainly studies the first attack probability (FAP) of an attacker level bombing anti-air radars through analyzing the radiant point orientation and attack (RPOA) process of attackers. Firstly, the searching target process is analyzed, and a corresponding target finding model is brought forward. Secondly, the target approaching process is concretely analyzed when the attacker levelly bombs the anti-air radar, and a corresponding target approaching model is presented. Finally, a demonstration is given to analyze the major factors in the model and prove its validity.

  5. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    OpenAIRE

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (200...

  6. Indicators of the need for ICU admission following suicide bombing attacks

    Directory of Open Access Journals (Sweden)

    Bala Miklosh

    2012-03-01

    Full Text Available Abstract Introduction Critical hospital resources, especially the demand for ICU beds, are usually limited following mass casualty incidents such as suicide bombing attacks (SBA. Our primary objective was to identify easily diagnosed external signs of injury that will serve as indicators of the need for ICU admission. Our secondary objective was to analyze under- and over-triage following suicidal bombing attacks. Methods A database was collected prospectively from patients who were admitted to Hadassah University Hospital Level I Trauma Centre, Jerusalem, Israel from August 2001-August 2005 following a SBA. One hundred and sixty four victims of 17 suicide bombing attacks were divided into two groups according to ICU and non-ICU admission. Results There were 86 patients in the ICU group (52.4% and 78 patients in the non-ICU group (47.6%. Patients in the ICU group required significantly more operating room time compared with patients in the non-ICU group (59.3% vs. 25.6%, respectively, p = 0.0003. For the ICU group, median ICU stay was 4 days (IQR 2 to 8.25 days. On multivariable analysis only the presence of facial fractures (p = 0.014, peripheral vascular injury (p = 0.015, injury ≥ 4 body areas (p = 0.002 and skull fractures (p = 0.017 were found to be independent predictors of the need for ICU admission. Sixteen survivors (19.5% in the ICU group were admitted to the ICU for one day only (ICU-LOS = 1 and were defined as over-triaged. Median ISS for this group was significantly lower compared with patients who were admitted to the ICU for > 1 day (ICU-LOS > 1. This group of over-triaged patients could not be distinguished from the other ICU patients based on external signs of trauma. None of the patients in the non-ICU group were subsequently transferred to the ICU. Conclusions Our results show that following SBA, injury to ≥ 4 areas, and certain types of injuries such as facial and skull fractures, and peripheral vascular injury, can serve

  7. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  8. Investigation for effects of the atomic bomb on Nagasaki. {gamma}-ray measurements by Neher electrometer

    Energy Technology Data Exchange (ETDEWEB)

    Nakane, Ryohei [Nishina Memorial Foundation, Tokyo (Japan)

    2000-07-01

    Neher electrometer, invented as an equipment to investigate the relationship of cosmic ray and terrestrial magnetism in 1930s, had excellent properties as an equipment to measure {gamma}-ray outdoor and thus was used for measurement of radiation exposure after A-bomb explosion in Hiroshima and Nagasaki. In Nagasaki, measurement with this equipment enabled to locate the bombing center where the monument is standing now in the A-bomb Park. Measurement also revealed that the circular earth surface of 2000 m diameter had the induced radioactivity by neutron and that outside the area, the {gamma}-ray intensity was virtually similar to the background level. Ash composing of Pu and other fission products moved over Konpira-san on the west wind, most of which came down with rainfall onto around Nishiyama reservoir. In the A-bomb movies, there is a scene that Neher electrometer was working for {gamma}-ray measurement. (K.H.)

  9. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  10. An Attack Investigation, Characterization and Simulation of Various Attacks in MANET

    Directory of Open Access Journals (Sweden)

    Pratik Gite

    2015-01-01

    Full Text Available Mobile Ad-hoc Network is one of the most popular network technology in the field of research and development community. Due to their dynamic and ad-hoc nature, the network suffers from the various performance and security issues. The main objective of this paper is to evaluate the performance of Ad-hoc On Demand Distance Vector (AODV routing protocol under normal condition and attacks conditions on the basis of different performance metrics. This paper is also concerned about the different kinds of attacks formation viz. Black Hole, Worm Hole, Gray Hole and Denial of Service attacks on MANET environment. In addition of that different kinds of approaches available for detection and prevention of such attacks are also investigated. Finally using different experimentation and simulations through NS-2, the effort is made to identify the effective network characteristics. After concluding the effects and simulation the need of a new Intrusion Detection System (IDS model is presented for future implementation.

  11. DNS Pharming through PHP Injection: Attack Scenario and Investigation

    Directory of Open Access Journals (Sweden)

    Divya Rishi Sahu

    2015-03-01

    Full Text Available With the increase in technology, Internet has provided set of tools and technologies which has enabled web programmers to develop effective websites. PHP is most widely used server side scripting language and more than twenty million of web sites are designed through PHP. It has used as a core script in Web Content Management System (WCMS, such as Joomla, WordPress, Drupal, SilverStripe etc. PHP has also security flaws due to the certain vulnerabilities such as PHP injection, remote file inclusion and unauthorized file creation. PHP injection is a variant of code injection attacks in which PHP script may be exploited to execute remote commands. The contribution of this paper is twofold: First, it presents a unifying view of PHP injection vulnerability, which causes alteration in the 'hosts file'; Second, It introduces an investigation process against alteration in 'hosts file' through PHP injection. This attack has been introduced as a type of DNS pharming. In this investigation process a chain of evidence has been created and an algebraic signature has been developed to detect explained attack.

  12. Human bombing - a religious act

    OpenAIRE

    Mohammed Ilyas

    2014-01-01

    The issue of human bombing, which is popularly known as suicide bombing has become important in the Western world since the 9/11 and 7/7 attacks. Since then the issue of human bombing has become important to academia, the media, and security experts. This interest has resulted in much literature attempting to explain why human bombings take place and what motivates the bombers; for instance, the works of Gambetta (2006); Pape (2006); Merari (2010); Hafez (2006, 2007); Wright (2007); Bloom (20...

  13. Investigating bomb radiocarbon transport in the southern Pacific Ocean with otolith radiocarbon

    Science.gov (United States)

    Grammer, G. L.; Fallon, S. J.; Izzo, C.; Wood, R.; Gillanders, B. M.

    2015-08-01

    To explore the transport of carbon into water masses from the surface ocean to depths of ∼ 1000 m in the southwest Pacific Ocean, we generated time series of radiocarbon (Δ14C) from fish otoliths. Otoliths (carbonate earstones) from long-lived fish provide an indirect method to examine the "bomb pulse" of radiocarbon that originated in the 1950s and 1960s, allowing identification of changes to distributions of 14C that has entered and mixed within the ocean. We micro-sampled ocean perch (Helicolenus barathri) otoliths, collected at ∼ 400- 500 m in the Tasman Sea, to obtain measurements of Δ14C for those depths. We compared our ocean perch Δ14C series to published otolith-based marine surface water Δ14C values (Australasian snapper (Chrysophrys auratus) and nannygai (Centroberyx affinis)) and to published deep-water values (800-1000 m; orange roughy (Hoplostethus atlanticus)) from the southwest Pacific to establish a mid-water Δ14C series. The otolith bomb 14C results from these different depths were consistent with previous water mass results in the upper 1500 m of the southwest Pacific Ocean (e.g. World Ocean Circulation Experiment and Geochemical Ocean Sections Study). A comparison between the initial Δ14C bomb pulse rise at 400-500 m suggested a ventilation lag of 5 to 10 yr, whereas a comparison of the surface and depths of 800-1000 m detailed a 10 to 20 yr lag in the time history of radiocarbon invasion at this depth. Pre-bomb reservoir ages derived from otolith 14C located in Tasman Sea thermocline waters were ∼ 530 yr, while reservoir ages estimated for Tasman Antarctic intermediate water were ∼ 730 yr.

  14. Investigation of cardio-vascular reflex in atomic bomb survivors, (2)

    International Nuclear Information System (INIS)

    Electrographic R-R interval variation was examined in a total of 915 A-bomb survivors exposed at ≤2,000 m from the hypocenter (the ≤ 2,000 m group) and a total of 1,162 A-bomb survivors exposed at >3,000 m or entered the city after the A-bombing (the >3,000 m group). Coefficient of variation (CV) for R-R interval variation on ECG tended to be decreased with advancing age in the >3,000 m group, irrespective of sex. Especially for men in this group, CV values were significantly lower for the age group of 45 to 54 years than the groups of 65 to 74 years and 75 to 84 years. Similar tendency was observed for CV values at deep breath. Decreased CV values tended to be associated with a decrease in glucose tolerance in both men and women of the >3,000 m group. In comparing the aforementioned CV values with those in the ≤2,000 m group, there was no significant difference between the groups. R-R interval variation on ECG was found independent of exposure condition, although it was influenced by sex, age, and glucose tolerance. (N.K.)

  15. Investigation of the Livengood-Wu integral for modelling autoignition in a high-pressure bomb

    Science.gov (United States)

    Hu, Zhixin; Somers, Bart L. M. T.; Cracknell, Roger F.; Bradley, Derek

    2016-01-01

    The reaction progress variable, which is widely used in premixed and diffusion combustion studies, comprises a set of pre-selected intermediate species to denote reaction progress. Progress towards autoignition can also be traced by the Livengood-Wu (LW) integral. Autoignition occurs when the LW integral attains a value of unity. This concept is further explored by applying it to an inhomogeneous mixture scenario, to determine the time and place of autoignition occurrence. A semidetailed mechanism (137 species and 633 reactions) for n-heptane/iso-octane/toluene is used in this study. Two numerical schemes based on the LW integral are proposed and incorporated into a computational fluid dynamics platform, to model autoignition in a 3D configuration, when a spray is injected into a constant volume bomb under diesel engine conditions. Tabulated chemistry, a traditional method of modelling autoignition using information from pre-calculated igniting diffusion flames, is also used for comparison purposes. The associated predicted pressure profiles are compared with experimental measurements.

  16. Britain's bomb

    Science.gov (United States)

    Corfield, Richard

    2012-10-01

    On the 60th anniversary of Britain's first nuclear test, Richard Corfield explores how Operation Hurricane - the British effort to develop the atomic bomb in the 1940s and 1950s - compares with states such as Iran that today wish to have such devices.

  17. Are IRIS Bombs Connected to Ellerman Bombs?

    Science.gov (United States)

    Tian, Hui; Xu, Zhi; He, Jiansen; Madsen, Chad

    2016-06-01

    Recent observations by the Interface Region Imaging Spectrograph (IRIS) have revealed pockets of hot gas (∼2–8 × 104 K) potentially resulting from magnetic reconnection in the partially ionized lower solar atmosphere (IRIS bombs; IBs). Using joint observations between IRIS and the Chinese New Vacuum Solar Telescope, we have identified 10 IBs. We find that 3 are unambiguously and 3 others are possibly connected to Ellerman bombs (EBs), which show intense brightening of the extended {{{H}}}α wings without leaving an obvious signature in the {{{H}}}α core. These bombs generally reveal the following distinct properties: (1) the O iv 1401.156 Å and 1399.774 Å lines are absent or very weak; (2) the Mn i 2795.640 Å line manifests as an absorption feature superimposed on the greatly enhanced Mg ii k line wing; (3) the Mg ii k and h lines show intense brightening in the wings and no dramatic enhancement in the cores; (4) chromospheric absorption lines such as Ni ii 1393.330 Å and 1335.203 Å are very strong; and (5) the 1700 Å images obtained with the Atmospheric Imaging Assembly on board the Solar Dynamics Observatory reveal intense and compact brightenings. These properties support the formation of these bombs in the photosphere, demonstrating that EBs can be heated much more efficiently than previously thought. We also demonstrate that the Mg ii k and h lines can be used to investigate EBs similarly to {{{H}}}α , which opens a promising new window for EB studies. The remaining four IBs obviously have no connection to EBs and they do not have the properties mentioned above, suggesting a higher formation layer, possibly in the chromosphere.

  18. INVESTIGATION ON PROPERTIES OF CONCRETE CONTAINING NATURAL POZZOLAN VOLCANIC ORIGIN DUE TO SULFATE ATTACK

    OpenAIRE

    MERIDA AHCENE; KHARCHI FATTOUM

    2013-01-01

    Sulfate attack and its effects are important from both scientific and industrial viewpoints. It is perceived that concretes containing pozzolan have better performance in sulfate solutions, since the pozzolanic reactions reduce the quantity of calcium hydroxide and increase calcium silicate hydrate. This paper investigates thecontribution of natural pozzolan volcanic origin on the physico - mechanical and physico-chemical characteristics of the concretes. When it is coupled to a water reducin...

  19. Bomb-Pulse Chlorine-36 At The Proposed Yucca Mountain Repository Horizon: An Investigation Of Previous Conflicting Results And Collection Of New Data

    International Nuclear Information System (INIS)

    Previous studies by scientists at Los Alamos National Laboratory (LANL) found elevated ratios of chlorine-36 to total chloride (36Cl/Cl) in samples of rock collected from the Exploratory Studies Facility (ESF) and the Enhanced Characterization of the Repository Block (ECRB) at Yucca Mountain as the tunnels were excavated. The data were interpreted as an indication that fluids containing 'bomb-pulse' 36Cl reached the repository horizon in the ∼50 years since the peak period of above-ground nuclear testing. Moreover, the data support the concept that so-called fast pathways for infiltration not only exist but are active, possibly through a combination of porous media, faults and/or other geologic features. Due to the significance of 36Cl data to conceptual models of unsaturated zone flow and transport, the United States Geological Survey (USGS) was requested by the Department of Energy (DOE) to design and implement a study to validate the LANL findings. The USGS chose to drill new boreholes at select locations across zones where bomb-pulse ratios had previously been identified. The drill cores were analyzed at Lawrence Livermore National Laboratory (LLNL) for 36Cl/Cl using both active and passive leaches, with the USGS/LLNL concluding that the active leach extracted too much rock-Cl and the passive leach did not show bomb-pulse ratios. Because consensus was not reached between the USGS/LLNL and LANL on several fundamental points, including the conceptual strategy for sampling, interpretation and use of tritium (3H) data, and the importance and interpretation of blanks, in addition to the presence or absence of bomb-pulse 36Cl, an evaluation by an independent entity, the University of Nevada, Las Vegas (UNLV), using new samples was initiated. This report is the result of that study. The overall objectives of the UNLV study were to investigate the source or sources of the conflicting results from the previous validation study, and to obtain additional data to

  20. Bomb-Pulse Chlorine-36 At The Proposed Yucca Mountain Repository Horizon: An Investigation Of Previous Conflicting Results And Collection Of New Data

    Energy Technology Data Exchange (ETDEWEB)

    J. Cizdziel

    2006-07-28

    Previous studies by scientists at Los Alamos National Laboratory (LANL) found elevated ratios of chlorine-36 to total chloride ({sup 36}Cl/Cl) in samples of rock collected from the Exploratory Studies Facility (ESF) and the Enhanced Characterization of the Repository Block (ECRB) at Yucca Mountain as the tunnels were excavated. The data were interpreted as an indication that fluids containing 'bomb-pulse' {sup 36}Cl reached the repository horizon in the {approx}50 years since the peak period of above-ground nuclear testing. Moreover, the data support the concept that so-called fast pathways for infiltration not only exist but are active, possibly through a combination of porous media, faults and/or other geologic features. Due to the significance of {sup 36}Cl data to conceptual models of unsaturated zone flow and transport, the United States Geological Survey (USGS) was requested by the Department of Energy (DOE) to design and implement a study to validate the LANL findings. The USGS chose to drill new boreholes at select locations across zones where bomb-pulse ratios had previously been identified. The drill cores were analyzed at Lawrence Livermore National Laboratory (LLNL) for {sup 36}Cl/Cl using both active and passive leaches, with the USGS/LLNL concluding that the active leach extracted too much rock-Cl and the passive leach did not show bomb-pulse ratios. Because consensus was not reached between the USGS/LLNL and LANL on several fundamental points, including the conceptual strategy for sampling, interpretation and use of tritium ({sup 3}H) data, and the importance and interpretation of blanks, in addition to the presence or absence of bomb-pulse {sup 36}Cl, an evaluation by an independent entity, the University of Nevada, Las Vegas (UNLV), using new samples was initiated. This report is the result of that study. The overall objectives of the UNLV study were to investigate the source or sources of the conflicting results from the previous

  1. Bomb-Pulse Chlorine-36 at the Proposed Yucca Mountain Repository Horizon: An Investigation of Previous Conflicting Results and Collection of New Data

    Energy Technology Data Exchange (ETDEWEB)

    Cizdziel, James

    2006-07-31

    Previous studies Los Alamos National Laboratory (LANL) found elevated ratios of chlorine-36 to total chloride (36Cl/Cl) in samples of rock collected from the Exploratory Studies Facility (ESF) at Yucca Mountain (YM). The data were interpreted as an indication that fluids containing “bomb-pulse” 36Cl reached the repository horizon in the ~50 years since the peak period of above-ground nuclear testing. Due to the significance of 36Cl data to conceptual models of unsaturated zone flow, the United States Geological Survey (USGS) implemented a study to validate the LANL findings. The USGS drilled new boreholes at select locations across zones where bomb-pulse ratios had previously been identified. The drill cores were analyzed at Lawrence Livermore National Laboratory (LLNL). Because consensus was not reached between the USGS/LLNL and LANL on several fundamental points including the presence or absence of bomb-pulse 36Cl, an evaluation by the University of Nevada, Las Vegas (UNLV), was initiated. The overall objectives of the UNLV study were to investigate the source of the validation study’s conflicting results, and to obtain additional data on bomb-pulse isotopes at the repository horizon. UNLV engaged in discussions with previous investigators, reviewed reports, and analyzed archived samples. UNLV also collected new samples of rock from the ESF, soil profiles from the surface of YM, and samples of seep water from inside the ESF. Samples were analyzed for 36Cl/Cl ratios, and 99Tc and 129I in select samples. A column experiment was conducted mimicking the passage of bomb-pulse 36Cl through YM tuff. The work faced several obstacles including an extended shutdown of the tunnel. Only one sample yielded a background corrected 36Cl/Cl ratio that was higher than the accepted bomb-pulse threshold (1250 x 10-15). Specimen 01034214 obtained from the Drill Hole Wash fault (19+33) had a ratio of 1590 ± 80 (1σ) x10-15, whereas the other separate sample from this fault zone

  2. Bomb tests attack the food chain

    Energy Technology Data Exchange (ETDEWEB)

    Ruff, T. (Monash Medical School, Melbourne (Australia))

    1990-03-01

    Ciguatera poisoning, the most common type of fish poisoning in the world, has become a major public health problem in some parts of the South Pacific. This area has always been the site of periodic outbreaks, especially after severe storms or natural disasters that damage core reefs. But since World War II it has become evident that military activities and major construction projects that wreak havoc on corals also lead to ciguatera outbreaks. Extraordinarily high rates of ciguatera poisoning have occurred on the small Pacific islands that have been used for nuclear tests and on the islands that host the military infrastructures and activities that accompany the tests. This is true for both the Marshall Islands near Bikini and Eniwetok, where U.S. tests took place, and in French Polynesia, in the area around Moruroa Atoll where the French government continues to test. Ciguatera poisoning has a disastrous effect on people who depend on fishing as a way of life and on fish as the major source of protein. 10 refs.

  3. PCF INVESTIGATION TO IMPROVE THE PERFORMANCE OF TORA – BASED MANET AGAINST JAMMING ATTACKS

    Directory of Open Access Journals (Sweden)

    Sabbar Insaif Jasim

    2014-10-01

    Full Text Available Security in Mobile Ad Hoc Network became very important due to the nature of wireless communication between the nodes and the rapid movement of node which make Mobile Ad hoc Network vulnerable to Attackers. Jamming is a DoS attack’s special category used in wireless networks. The attacker disrespects the medium access control (MAC protocol and transmits on the shared channel; either periodically or continuously to target all or some communication, respectively. Distributed coordination function (DCF and Point coordination function (PCF are the two different media access control (MAC mechanisms which are specified by the IEEE 802.11standard. PCF can achieve higher throughput than DCF due to the nature of contention-free, therefore, this paper investigate the impact of PCF when integrated into the TORA – Based MANET and how it can improve the performance of the network. OPNET – Based simulation scenarios were created and the simulation was run and the results were collected which investigate that PCF provided a good functionality to improve deficiency caused by the Jammers this by increasing the throughput and decreasing the delay which is affected by the Jammers. PCF was a good improvement with different levels of Jammers’ transmission power.

  4. Worry, worry attacks, and PTSD among Cambodian refugees: a path analysis investigation.

    Science.gov (United States)

    Hinton, Devon E; Nickerson, Angela; Bryant, Richard A

    2011-06-01

    Among traumatized Cambodian refugees, this article investigates worry (e.g., the types of current life concerns) and how worry worsens posttraumatic stress disorder (PTSD). To explore how worry worsens PTSD, we examine a path model of worry to see whether certain key variables (e.g., worry-induced somatic arousal and worry-induced trauma recall) mediate the relationship between worry and PTSD. Survey data were collected from March 2010 until May 2010 in a convenience sample of 201 adult Cambodian refugees attending a psychiatric clinic in Massachusetts, USA. We found that worry was common in this group (65%), that worry was often about current life concerns (e.g., lacking financial resources, children not attending school, health concerns, concerns about relatives in Cambodia), and that worry often induced panic attacks: in the entire sample, 41% (83/201) of the patients had "worry attacks" (i.e., worry episodes that resulted in a panic episode) in the last month. "Worry attacks" were highly associated with PTSD presence. In the entire sample, generalized anxiety disorder was also very prevalent, and was also highly associated with PTSD. Path analysis revealed that the effect of worry on PTSD severity was mediated by worry-induced somatic arousal, worry-induced catastrophic cognitions, worry-induced trauma recall, inability to stop worry, and irritability. The final model accounted for 75% of the variance in PTSD severity among patients with worry. The public health and treatment implications of the study's findings that worry may have a potent impact on PTSD severity in severely traumatized populations are discussed: worry and daily concerns are key areas of intervention for these worry-hypersensitive (and hence daily-stressor-hypersensitive) populations. PMID:21663803

  5. Karachi Commander Escapes Attack, 10 Dead

    Institute of Scientific and Technical Information of China (English)

    潘志强

    2004-01-01

    KARACHI: The army commander in the Pakistani city of Karachi narrowly① escaped assassination② yesterday when gunmen attacked his convoy③ with gunfire and a bomb, killing at least 10 and wounding his driver, officials said.

  6. INVESTIGATION ON PROPERTIES OF CONCRETE CONTAINING NATURAL POZZOLAN VOLCANIC ORIGIN DUE TO SULFATE ATTACK

    Directory of Open Access Journals (Sweden)

    MERIDA AHCENE

    2013-05-01

    Full Text Available Sulfate attack and its effects are important from both scientific and industrial viewpoints. It is perceived that concretes containing pozzolan have better performance in sulfate solutions, since the pozzolanic reactions reduce the quantity of calcium hydroxide and increase calcium silicate hydrate. This paper investigates thecontribution of natural pozzolan volcanic origin on the physico - mechanical and physico-chemical characteristics of the concretes. When it is coupled to a water reducing superplasticizer by a correct adjustment of the composition, it greatly improves the concrete properties. The analysis of the experimental results on pozzolan concrete at 5% content and sharpness of 9600cm2/g, in a sulphated environment, showed that it contributes positively to the improvement of its mechanical characteristics and its durability with respect towater absorption, and to the permeability to the chlorine ions as well as to the resistance to the sulphates.

  7. Integrated approach for investigating the durability of self-consolidating concrete to sulfate attack

    Science.gov (United States)

    Bassuoni, Mohamed Tamer F.

    The growing use of self-consolidating concrete (SCC) in various infrastructure applications exposed to sulfate-rich environments necessitates conducting comprehensive research to evaluate its durability to external sulfate attack. Since the reliability and adequacy of standard sulfate immersion tests have been questioned, the current thesis introduced an integrated testing approach for assessing the durability of a wide scope of SCC mixtures to external sulfate attack. This testing approach involved progressive levels of complexity from single to multiple damage processes. A new series of sulfate attack tests involving multiple field-like parameters and combined damage mechanisms (various cations, controlled pH, wetting-drying, partial immersion, freezing-thawing, and cyclic cold-hot conditions with or without sustained flexural loading) were designed to evaluate the performance (suitability) of the SCC mixtures under various sulfate attack exposure scenarios. The main mixture design variables of SCC included the type of binder (single, binary, ternary and quaternary), air-entrainment, sand-to-aggregate mass ratio and hybrid fibre reinforcement. The comprehensive database and knowledge obtained from this research were used to develop smart models (fuzzy and neuro-fuzzy inference systems) based on artificial-intelligence to evaluate and predict the performance of the SCC mixtures under various sulfate attack exposure regimes implemented in this study. In full immersion tests involving high concentration sodium and magnesium sulfate solutions with controlled pH, the low penetrability of SCC was responsible for the high durability of specimens. Ternary and quaternary cementitious systems with or without limestone materials provided a passivating layer, with or without acid neutralization capacity, which protected SCC from severe damage in the aggressive sulfuric acid and ammonium sulfate solutions. In contrast to conclusions drawn from the sodium sulfate immersion

  8. Korean atomic bomb victims.

    Science.gov (United States)

    Sasamoto, Yukuo

    2009-01-01

    After colonizing Korea, Japan invaded China, and subsequently initiated the Pacific War against the United States, Britain, and their allies. Towards the end of the war, U.S. warplanes dropped atomic bombs on Hiroshima and Nagasaki, which resulted in a large number of Koreans who lived in Hiroshima and Nagasaki suffering from the effects of the bombs. The objective of this paper is to examine the history of Korea atomic bomb victims who were caught in between the U.S., Japan, the Republic of Korea (South Korea) and the Democratic People's Republic of Korea (North Korea). PMID:20521424

  9. Numerical investigation on properties of attack angle for an opposing jet thermal protection system

    Institute of Scientific and Technical Information of China (English)

    Lu Hai-Bo; Liu Wei-Qiang

    2012-01-01

    The three-dimensional Navier Stokes equation and the k- ε viscous model are used to simulate the attack angle characteristics of a hemisphere nose-tip with an opposing jet thermal protection system in supersonic flow conditions.The numerical method is validated by the relevant experiment.The flow field parameters,aerodynamic forces,and surface heat flux distributions for attack angles of 0°,2°,5°,7°,and 10° are obtained.The detailed numerical results show that the cruise attack angle has a great inflnence on the flow field parameters,aerodynamic force,and surface heat flux distribution of the supersonic vehicle nose-tip with an opposing jet thermal protection system.When the attack angle reaches 10°,the heat flux on the windward generatrix is close to the maximal heat flux on the wall surface of the nose-tip without thermal protection system,thus the thermal protection has failed.

  10. Cluster bomb ocular injuries

    Directory of Open Access Journals (Sweden)

    Ahmad M Mansour

    2012-01-01

    Full Text Available Purpose: To present the visual outcomes and ocular sequelae of victims of cluster bombs. Materials and Methods: This retrospective, multicenter case series of ocular injury due to cluster bombs was conducted for 3 years after the war in South Lebanon (July 2006. Data were gathered from the reports to the Information Management System for Mine Action. Results: There were 308 victims of clusters bombs; 36 individuals were killed, of which 2 received ocular lacerations and; 272 individuals were injured with 18 receiving ocular injury. These 18 surviving individuals were assessed by the authors. Ocular injury occurred in 6.5% (20/308 of cluster bomb victims. Trauma to multiple organs occurred in 12 of 18 cases (67% with ocular injury. Ocular findings included corneal or scleral lacerations (16 eyes, corneal foreign bodies (9 eyes, corneal decompensation (2 eyes, ruptured cataract (6 eyes, and intravitreal foreign bodies (10 eyes. The corneas of one patient had extreme attenuation of the endothelium. Conclusions: Ocular injury occurred in 6.5% of cluster bomb victims and 67% of the patients with ocular injury sustained trauma to multiple organs. Visual morbidity in civilians is an additional reason for a global ban on the use of cluster bombs.

  11. Atomic bombs and the long-run effect on trust: Experiences in Hiroshima and Nagasaki.

    OpenAIRE

    YAMAMURA, Eiji

    2012-01-01

    Hiroshima and Nagasaki in Japan are the only cities in the world that have experienced an atomic bomb attack. This paper explores how this devastating experience affected victims’ tendency to trust others. Individual-level data were used to examine the long-term influence of experiencing an atomic bomb on individuals’ trust. After controlling for individual characteristics, I obtained the following key findings. Individuals who experienced the attack were more likely to trust others. Furtherm...

  12. Are IRIS bombs connected to Ellerman bombs?

    CERN Document Server

    Tian, Hui; He, Jiansen; Madsen, Chad

    2016-01-01

    Recent observations by the Interface Region Imaging Spectrograph (IRIS) have revealed pockets of hot gas ($\\sim$2--8$\\times$10$^{4}$ K) potentially resulting from magnetic reconnection in the partially ionized lower solar atmosphere (IRIS bombs; IBs). Using joint observations between IRIS and the Chinese New Vacuum Solar Telescope, we have identified ten IBs. We find that three are unambiguously and three others are possibly connected to Ellerman bombs (EBs), which show intense brightening of the extended H$_{\\alpha}$ wings without leaving an obvious signature in the H$_{\\alpha}$ core. These bombs generally reveal the following distinct properties: (1) The O~{\\sc{iv}}~1401.156\\AA{} and 1399.774\\AA{} lines are absent or very weak; (2) The Mn~{\\sc{i}}~2795.640\\AA{} line manifests as an absorption feature superimposed on the greatly enhanced Mg~{\\sc{ii}}~k line wing; (3) The Mg~{\\sc{ii}}~k and h lines show intense brightening in the wings and no dramatic enhancement in the cores; (4) Chromospheric absorption lin...

  13. Bomb pulse biology

    Energy Technology Data Exchange (ETDEWEB)

    Falso, Miranda J. Sarachine [Center for Accelerator Mass Spectrometry, Mail Stop L-397, Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, CA 94551 (United States); Buchholz, Bruce A., E-mail: buchholz2@llnl.gov [Center for Accelerator Mass Spectrometry, Mail Stop L-397, Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, CA 94551 (United States)

    2013-01-15

    The past decade has seen an explosion in use of the {sup 14}C bomb pulse to do fundamental cell biology. Studies in the 1960s used decay counting to measure tissue turnover when the atmospheric {sup 14}C/C concentration was changing rapidly. Today bulk tissue measurements are of marginal interest since most of the carbon in the tissue resides in proteins, lipids and carbohydrates that turn over rapidly. Specific cell types with specialized functions are the focus of cell turnover investigations. Tissue samples need to be fresh or frozen. Fixed or preserved samples contain petroleum-derived carbon that has not been successfully removed. Cell or nuclear surface markers are used to sort specific cell types, typically by fluorescence-activated cell sorting (FACS). Specific biomolecules need to be isolated with high purity and accelerator mass spectrometry (AMS) measurements must accommodate samples that generally contain less than 40 {mu}g of carbon. Furthermore, all separations must not add carbon to the sample. Independent means such as UV absorbance must be used to confirm molecule purity. Approaches for separating specific proteins and DNA and combating contamination of undesired molecules are described.

  14. Experimental investigation of separated shear layer from a leading edge subjected to various angles of attack with tail flap deflections

    Indian Academy of Sciences (India)

    K Anand; S Sarkar

    2015-05-01

    Shear layer development over a thick flat plate with a semi-circular leading edge is investigated for a range of angles of attack under different pressure gradients for a Reynolds number of 2.44×105 (based on chord and free-stream velocity). The characteristics of the separated shear layer are very well documented through a combination of surface pressure measurement and smoke flow visualization. The instability of the separated layer occurs because of enhanced receptivity of perturbations leading to the development of significant unsteadiness and three-dimensional motions in the second-half of the bubble. The onset of separation, transition and the point of reattachment are identified for varying angles of attack and pressure gradients imposed by tail flap deflections. The data concerning bubble length, laminar portion and reattachment points agree well with the literature.

  15. Analysis of Al-Qaeda Terrorist Attacks to Investigate Rational Action

    Directory of Open Access Journals (Sweden)

    Daniel P. Hepworth

    2013-04-01

    Full Text Available Many studies have been conducted to demonstrate the collective rationality of traditional terrorist groups; this study seeks to expand this and apply collective rationality to Islamic terrorist groups. A series of statistical analyses were conducted on terrorist attacks carried out by Al-Qaeda and affiliated terrorist organization; these were then compared to two more conventional terrorist groups: the Euskadi Ta Askatasuna (ETA and the Liberation Tigers of Tamil Eelam (LTTE. When viewed through the context of the groups’ various motivations and objectives, the results of these analyses demonstrates collective rationality for those terrorist groups examined. 

  16. Panic Attack or Heart Attack?

    Science.gov (United States)

    Panic Attack or Heart Attack? Diagnosing heart disease in women A Healthy Hearts Guide ® Heart disease in women is often mistaken for panic attack with shortness of breath, anxiety, palpitations and indigestion. ...

  17. The effects of using Cesium-137 teletherapy sources as a radiological weapon (dirty bomb)

    CERN Document Server

    Liolios, Theodore

    2009-01-01

    While radioactive sources used in medical diagnosis do not pose a great security risk due to their low level of radioactivity, therapeutic sources are extremely radioactive and can presumably be used as a radiological weapon. Cobalt-60 and Cesium-137 sources are the most common ones used in radiotherapy with over 10,000 of such sources currently in use worldwide, especially in the developing world, which cannot afford modern accelerators. The present study uses computer simulations to investigate the effects of using Cesium-137 sources from teletherapy devices as a radiological weapon. Assuming a worst-case terrorist attack scenario, we estimate the ensuing cancer mortality, land contamination, evacuation area, as well as the relevant evacuation, decontamination, and health costs in the framework of the linear risk model. The results indicate that an attack with a Cesium-137 dirty bomb in a large metropolitan city (especially one that would involve several teletherapy sources) although would not cause any sta...

  18. Investigation on circular asymmetry of geographical distribution in cancer mortality of Hiroshima atomic bomb survivors based on risk maps: analysis of spatial survival data.

    Science.gov (United States)

    Tonda, Tetsuji; Satoh, Kenichi; Otani, Keiko; Sato, Yuya; Maruyama, Hirofumi; Kawakami, Hideshi; Tashiro, Satoshi; Hoshi, Masaharu; Ohtaki, Megu

    2012-05-01

    While there is a considerable number of studies on the relationship between the risk of disease or death and direct exposure from the atomic bomb in Hiroshima, the risk for indirect exposure caused by residual radioactivity has not yet been fully evaluated. One of the reasons is that risk assessments have utilized estimated radiation doses, but that it is difficult to estimate indirect exposure. To evaluate risks for other causes, including indirect radiation exposure, as well as direct exposure, a statistical method is described here that evaluates risk with respect to individual location at the time of atomic bomb exposure instead of radiation dose. In addition, it is also considered to split the risks into separate risks due to direct exposure and other causes using radiation dose. The proposed method is applied to a cohort study of Hiroshima atomic bomb survivors. The resultant contour map suggests that the region west to the hypocenter has a higher risk compared to other areas. This in turn suggests that there exists an impact on risk that cannot be explained by direct exposure. PMID:22302183

  19. Glaucoma in atomic bomb survivors.

    Science.gov (United States)

    Kiuchi, Yoshiaki; Yokoyama, Tomoko; Takamatsu, Michiya; Tsuiki, Eiko; Uematsu, Masafumi; Kinoshita, Hirofumi; Kumagami, Takeshi; Kitaoka, Takashi; Minamoto, Atsushi; Neriishi, Kazuo; Nakashima, Eiji; Khattree, Ravindra; Hida, Ayumi; Fujiwara, Saeko; Akahoshi, Masazumi

    2013-10-01

    Radiation has been associated with increases in noncancerous diseases. An effect of low-dose radiation on the prevalence of clinically detected glaucoma has not been previously reported. We therefore investigated the prevalence of glaucoma in A-bomb survivors and its possible association with radiation dose. A total of 1,589 people who participated in the clinical examination program for A-bomb survivors at the Radiation Effects Research Foundation (RERF) between October 2006 and September 2008 and who had reconstructed radiation doses, were recruited into this cross-sectional screening study. The prevalence of glaucoma and its dose-response relationship to A-bomb radiation were measured. Each subject underwent an initial screening consisting of an interview and ophthalmological examination. Questionable cases with any indication of ocular disease, including glaucoma, were referred to local hospitals for more comprehensive evaluation. A diagnosis of glaucoma was made based on specific optic disc appearance, perimetric results and other ocular findings. Of 1,589 eligible people, we detected 284 (17.9%) cases of glaucoma overall, including 36 (2.3%) cases of primary open-angle glaucoma with intraocular pressure levels greater than 21 mmHg, 226 (14.2%) cases of normal-tension glaucoma and 25 (1.6%) cases of primary angle-closure glaucoma. Seven glaucoma risk factors were examined as potential confounders but only two needed to be included in the final model. Binary regression using a generalized estimating equation method, with adjustment for gender, age, city, cataract surgery or diabetes mellitus, revealed an odds ratio at 1 Gy of 1.31 (95% confidence interval 1.11-1.53, P = 0.001) in the case of normal-tension glaucoma, but no association for other types of glaucoma. The prevalence of normal-tension glaucoma may increase with A-bomb radiation dose, but uncertainties associated with nonparticipation (59% participation) suggest caution in the interpretation of these

  20. TIGER -- A technology to improve the delivery capability of nuclear bombs and the survivability of the delivery aircraft

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1980-12-31

    The TIGER (Terminal guided and Extended-Range) Program was initiated in 1972 to study improved delivery capabilities for stockpiled tactical nuclear bombs. The Southeast Asia conflict fostered the development of air-delivered standoff conventional weapons utilizing terminal guidance systems. SNL initiated the TIGER program to determine if current nuclear bombs could be provided with a similarly accurate standoff capabilities. These conventional weapon delivery techniques, while allowing highly accurate attack, generally require entering the target area at high altitude to establish line of sight to the target. In parallel with the TIGER program, system studies analyzed this concept and showed marked improvement in aircraft and weapon survivability with moderate standoff (10--20 km) if low level deliveries (60 m) could be accomplished. As a result of this work, the TIGER program was redirected in early 1974 to demonstrate a standoff bomb with good accuracy (90 m CEP) when delivered from low flying aircraft. This program redirection resulted in the selection of an inertial guidance system to replace the earlier terminal guidance systems. This program was called the Extended-Range Bomb (ERB). In May 1974, a joint Air Force/DOE study identified the desirability of having a single tactical weapon which could be employed against either fixed, preselected targets, or mobile battlefield targets. Studies conducted on the ERB system showed that the inertially guided weapon could fly not only the standoff mission but also a return-to-target mission against the mobile battlefield targets whose locations are not known accurately enough to use a standoff delivery. The ERB program evolved from these initial investigations into an exploratory program to develop the hardware and demonstrate the technology required to fly standoff and return-to-target trajectories. The application of this technology in the form of field retrofit kits to the B61 bomb is called TIGER II.

  1. Ellerman bombs: fallacies, fads, usage

    CERN Document Server

    Rutten, Robert J; van der Voort, Luc H M Rouppe; Sütterlin, Peter; Vitas, Nikola

    2013-01-01

    Ellerman bombs are short-lived brightenings of the outer wings of Halpha that occur in active regions with much flux emergence. We point out fads and fallacies in the extensive Ellerman bomb literature, discuss their appearance in various spectral diagnostics, and advocate their use as indicators of field reconfiguration in active-region topography using AIA 1700 A images.

  2. Leukemia among a-bomb survivors living in Hiroshima city, 1971-1978

    International Nuclear Information System (INIS)

    The death from leukemia among Hiroshima citizens from 1971 to 1978 was investigated. The total number of dead citizens was 241, and 64 of them were a-bomb survivors. Thirty-seven of a-bomb survivors were exposed to a-bomb within 2 km from hypocenter. Seventy-seven of remaining 177 citizens were born after the explosion of a-bomb, but they were not children of a-bomb survivors exposed directly to a-bomb. The mortality of a-bomb survivors exposed near the hypocenter was 1.67 (within 2 km) - 2.51 (within 1.5 km) times that of those exposed far from the hypocenter. The mortality of a-bomb survivors exposed within 1.5 km was significantly high. The death risk from leukemia was significantly high in women. The estimated exposure dose was over 1 rad in 25 of abovementioned 37 a-bomb survivors, and it was over 10 rad in 21 and over 100 rad in 10 of 25. Seven of 10 a-bomb survivors exposed over 100 rad were women. The age at the exposure was under 10 years in 1, teens in 1, twenties in 2, and over thirty in 6. The type of leukemia was acute in 8 and chronic in 2. Both types were myelogenous leukemia. Five of these 10 a-bomb survivors died after 1976. (Tsunoda, M.)

  3. Dirty Bombs: A Discouraging Second Look

    Science.gov (United States)

    Loeb, Cheryl A.

    2004-05-01

    Dirty bombs, terrorist devices to spread intensely radioactive material with the intent to kill, sicken, or inflict economic damage, have been overestimated by some in the government and underestimated by many physicists. It is unlikely that a radiological dispersion device (RDD) will contaminate an area to such a level that brief exposures are lethal or even incapacitating. However, careful examination of the consequences of the accident in Goiânia, Brazil shows that it is highly likely that people in the contaminated region will inhale or ingest dusty or liquid radioactive material in sufficient quantities to cause acute radiation sickness, and in some cases enough to kill. Some forms of radiological attack could kill tens or hundreds of people and sicken hundreds or thousands. This paper provides a general overview of the nature and use of RDDs and examines readily available sources of large quantities of radioactive material, material which requires significantly greater protection than it is afforded today. Under many circumstances an RDD containing only a few curies of cesium-137, strontium-90, cobalt-60 or other industrial isotopes could force the razing of more buildings and inflict greater economic losses than did the September 11, 2002 attacks on the World Trade Center and the Pentagon. The National Defense University study proposes new policies for the federal government which would decrease the chances of an attack and reduce the cost in lives and money to the United States should one, nevertheless, occur.

  4. Investigation of the pathophysiological mechanisms of migraine attacks induced by pituitary adenylate cyclase-activating polypeptide-38

    DEFF Research Database (Denmark)

    Amin, Faisal Mohammad; Hougaard, Anders; Schytz, Henrik W;

    2014-01-01

    samples (plasma PACAP38 and vasoactive intestinal polypeptide and serum tryptase), and vital signs (blood pressure, heart rate, respiratory frequency, and end-tidal pressure of CO2) was recorded before and up to 5 h after infusion. Twenty-two patients [mean age 24 years (range 19-36)] completed the study...... on both days. Sixteen patients (73%) reported migraine-like attacks after PACAP38 and four after vasoactive intestinal polypeptide (18%) infusion (P = 0.002). Three of four patients, who reported migraine-like attacks after vasoactive intestinal polypeptide, also reported attacks after PACAP38. Both...... the start of PACAP38 infusion only in those patients who later reported migraine attacks. Blood levels of vasoactive intestinal polypeptide and tryptase were unchanged after PACAP38 infusion. In conclusion, PACAP38-induced migraine was associated with sustained dilatation of extracranial arteries...

  5. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  6. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  7. Long-term follow-up of atomic bomb survivors.

    Science.gov (United States)

    Sakata, Ritsu; Grant, Eric J; Ozasa, Kotaro

    2012-06-01

    The Life Span Study (LSS) is a follow-up study of atomic bomb (A-bomb) survivors to investigate the radiation effects on human health and has collected data for over 60 years. The LSS cohort consists of 93,741 A-bomb survivors and another 26,580 age and sex-matched subjects who were not in either city at the time of the bombing. Radiation doses have been computed based on individual location and shielding status at the time of the bombings. Age at death and cause of death are gathered through the Japanese national family registry system and cancer incidence data have been collected through the Hiroshima and Nagasaki cancer registries. Noncancer disease incidence and health information are collected through biannual medical examinations among a subset of the LSS. Radiation significantly increases the risks of death (22% at 1 Gy), cancer incidence (47% at 1 Gy), death due to leukemia (310% at 1 Gy), as well as the incidence of several noncancer diseases (e.g. thyroid nodules, chronic liver disease and cirrhosis, uterine myoma, and hypertension). Significant effects on maturity (e.g. growth reduction and early menopause) were also observed. Long-term follow-up studies of the A-bomb survivors have provided reliable information on health risks for the survivors and form the basis for radiation protection standards for workers and the public. PMID:22440534

  8. Investigation of Load Prediction on the Mexico Rotor Using the Technique of Determination of the Angle of Attack

    DEFF Research Database (Denmark)

    Yang, Hua; Shen, Wen Zhong; Sørensen, Jens Nørkær;

    2012-01-01

    ). The extracted airfoil data are put into a BEM code, and the calculated axial and tangential forces are compared to both computations using BEM with Glauert's and SHEN's tip loss correction models and experimental data. The comparisons show that the present method of determination of angle of attack is correct......Blade element moment (BEM) is a widely used technique for prediction of wind turbine aerodynamics performance, the reliability of airfoil data is an important factor to improve the prediction accuracy of aerodynamic loads and power using a BEM code. The method of determination of angle of attack...

  9. Heart Attack

    Science.gov (United States)

    ... having another heart attack. These medicines include: aspirin, beta blockers, statins, ACE inhibitors and fish oil. Your doctor ... have had a stent placed in your heart. Beta blockers are a group of drugs that lower the ...

  10. Panic Attack

    OpenAIRE

    Scantamburlo, Gabrielle; Ansseau, Marc

    2004-01-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. Peer reviewed

  11. [Panic attack].

    Science.gov (United States)

    Scantamburlo, G; Ansseau, M

    2004-05-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. PMID:15264579

  12. Dynamic Finite Element Investigation of Wave Attack on Sea Dikes: A Coupled Approach using Plate and Volume Elements

    NARCIS (Netherlands)

    Tan, S.

    2016-01-01

    Approximately 400 kilometres of Dutch sea dikes are protected by bituminous concrete revetments to prevent damage from erosion and repeated wave attacks during storms. The numerical analysis of sea dikes subjected to cyclic wave loading needs to consider the behaviour of the bituminous concrete reve

  13. Degradation of self-compacting concrete (SCC) due to sulfuric acid attack: Experiment investigation on the effect of high volume fly ash content

    Science.gov (United States)

    Kristiawan, S. A.; Sunarmasto; Tyas, G. P.

    2016-02-01

    Concrete is susceptible to a variety of chemical attacks. In the sulfuric acid environment, concrete is subjected to a combination of sulfuric and acid attack. This research is aimed to investigate the degradation of self-compacting concrete (SCC) due to sulfuric acid attack based on measurement of compressive strength loss and diameter change. Since the proportion of SCC contains higher cement than that of normal concrete, the vulnerability of this concrete to sulfuric acid attack could be reduced by partial replacement of cement with fly ash at high volume level. The effect of high volume fly ash at 50-70% cement replacement levels on the extent of degradation owing to sulfuric acid will be assessed in this study. It can be shown that an increase in the utilization of fly ash to partially replace cement tends to reduce the degradation as confirmed by less compressive strength loss and diameter change. The effect of fly ash to reduce the degradation of SCC is more pronounced at a later age.

  14. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  15. Confronting the bomber: coping at the site of previous terror attacks.

    Science.gov (United States)

    Strous, Rael D; Mishaeli, Nurit; Ranen, Yaniv; Benatov, Joy; Green, Dovid; Zivotofsky, Ari Z

    2007-03-01

    Terror exposure has become commonplace in Israel, with civilians needing to develop appropriate coping mechanisms. This study investigated coping mechanisms of those who are able to return to leisure activity at sites of previous terror attacks. A specially designed questionnaire, exploring knowledge of the terror event, previous terror exposure, coping mechanisms, state of anxiety, and mood, was administered to 93 restaurant attendees at sites of well-known recent terror attacks (2001-2005). Most respondents were aware of the previous terror attack (92.3%) and most reported no fear at revisiting (70.3%), with 20.9% reporting some anxiety and 5.5% reporting moderate or severe anxiety. Sixty percent reported that they have no fear that a terror attack will reoccur at the same place. Some (27.7%) reported change in practices or decrease in one or more activity, especially use of public transport (18%). The most helpful reported resource for facilitating stress coping following a suicide bombing was to "call or be in touch with friends or relatives," and least helpful was "medicines." Over half of respondents (53%) reported that the current security climate affected their mood. Older individuals and females were more affected by terror events. Study observations confirm that resilience develops in the general population in response to ongoing terror attacks. Response to terror is heterogeneous with a range of coping mechanisms expressed.

  16. Mars attacks.

    Science.gov (United States)

    Cohain, Judy Slome

    2008-01-01

    "Mars Attacks" is a new term coined to describe unjustified violation of women by care providers at the time of birth, as well as the purposeful abandonment of the peer review system by major obstetric journals and the abandonment of the use of research evidence by ACOG in their latest protocols, in order to justify continued use of this form of violence against women. PMID:19244777

  17. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  18. What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response.

    Directory of Open Access Journals (Sweden)

    Jeannette Sutton

    Full Text Available Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials' Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events.

  19. Allometric relationships of the dentition of the great White Shark, Carcharodon carcharias, in forensic investigations of shark attacks.

    Science.gov (United States)

    Nambiar, P; Bridges, T E; Brown, K A

    1991-06-01

    As a result of a systematic morphometric study of shark dentitions, a system of notation for describing the location of shark teeth has been developed and is proposed as a standard to be adopted for use in similar studies in the future. The macroscopic morphology of White Shark teeth has been characterised in order to gain quantitative data which might assist in identification of these sharks from bite marks on victims or objects or from shark carcasses. Using these data, a nomogram has been developed which can be used to estimate the body length of a White Shark from measurements of tooth or bite mark morphology. An example of the forensic application of such allometric data is provided as it applied to a recent fatal attack on a diver by a White Shark. PMID:1814935

  20. Allometric relationships of the dentition of the great White Shark, Carcharodon carcharias, in forensic investigations of shark attacks.

    Science.gov (United States)

    Nambiar, P; Bridges, T E; Brown, K A

    1991-06-01

    As a result of a systematic morphometric study of shark dentitions, a system of notation for describing the location of shark teeth has been developed and is proposed as a standard to be adopted for use in similar studies in the future. The macroscopic morphology of White Shark teeth has been characterised in order to gain quantitative data which might assist in identification of these sharks from bite marks on victims or objects or from shark carcasses. Using these data, a nomogram has been developed which can be used to estimate the body length of a White Shark from measurements of tooth or bite mark morphology. An example of the forensic application of such allometric data is provided as it applied to a recent fatal attack on a diver by a White Shark.

  1. The Research of Session Attack and Investigation Method%Session欺骗攻击技术及调查方法研究

    Institute of Scientific and Technical Information of China (English)

    徐国天

    2014-01-01

    Session certiifcation is a common identity recognition mechanism of dynamic website. Most websites use this mechanism to prevent unauthorized access. If the user is not authenticated, then browse to a restricted access page, the site can't read legitimate session_id from the HTTP packet, illegal visitors will be redirected to the login page. Hacker use Session attack to capture the victim's session id, and login to the site by this value. Finally, he can get the victim's identity. If victim is an administrator, then hacker can modify the website data, even plant Trojan, leading to greater harm. It is a serious threat to the security of information network. The research of session attack and investigation method is important to forensic. The key to the successful implementation of session attack is to obtain session_id of legitimate users. Research group found no relevant research results about clue survey area of session spooifng attack.In this paper, three methods to capture session_id are studied such as switch MAC address table "aging" phenomenon, MAC-PORT attack and XSS attack. Investigation method of session attack is also studied.%Session认证是目前动态网站常用的一种身份识别机制,目前大多数网站利用session认证机制防止非授权访问。如果用户没有通过身份认证,就请求浏览某个限制访问的页面,网站不能从HTTP请求报文中读出合法的session_id,通常就会将非法访问者重定向到登录页面。session欺骗是指攻击者截获受害者的session_id,使用该值登录站点,进而获得合法用户的身份。如果他获得的是管理员身份,那么他就可以修改网站数据,甚至在主页中植入木马,造成更大的危害。这种攻击方式对信息网络安全构成严重威胁,研究session攻击技术及线索调查方法对公安机关的调查、取证工作有重要意义。session欺骗攻击成功实施的关键在于获得合法用户的session_id值

  2. Uranium content in soil after bombing FRY

    International Nuclear Information System (INIS)

    Depleted uranium (DU) is a byproduct of uranium enrichment process and its use is very dangerous and harmful. NATO has used DU ammunition in Yugoslav conflict during its air campaign against the tanks and bunkers. The estimated number of about 3,000-10,000 of 30 mm DU rounds as armor-piercing shells were fired from cannons fitted to A-10 aircraft and probably a usage in some of 1,500 launched Tomahawk Cruise missiles. We measured uranium content in the surface soil (0-5 cm depth) from bomb craters during NATO attack. Selected locations were Belgrade, Smederevo, Nis, Bor, Prahovo, Kadinjaca, Jadovnik, Raska, Sjenica, and Cape Arza. Total uranium concentration and isotopic ratio were determined using γ-spectrometry and inductively coupled plasma method. Obtained results were in the range 21 - 762.000 Bq/kg dry soil. They were at the all locations except Cape Arza comparable to the uranium content found in off-side locations of soils. (author)

  3. Heart Attack Risk Assessment

    Science.gov (United States)

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  4. Pure Nuclear Fusion Bomb Propulsion

    OpenAIRE

    Winterberg, F.

    2008-01-01

    Recent progress towards the non-fission ignition of thermonuclear micro-explosions raises the prospect for a revival of the nuclear bomb propulsion idea, both for the fast transport of large payloads within the solar system and the launch into earth orbit without the release of fission products into the atmosphere. To reach this goal three areas of research are of importance: 1)Compact thermonuclear ignition drivers. 2)Fast ignition and deuterium burn. 3)Space-craft architecture involving mag...

  5. Investigation of psychiatric nurses suffering from patientsˊ attacks%精神科护士遭受患者攻击的调查

    Institute of Scientific and Technical Information of China (English)

    吕纪珍

    2016-01-01

    Objective:To investigate psychiatric nurses suffering from patientsˊ attack. Methods:POPAS(perception of the prevalence of aggression scale)was be used to investigate 140 psychiatric nurses of Taian City,and the perception of factors were ana-lyzed. Results:The 140 subjects perceived the highest frequency of five attacks occurred:the plain language attack(shouting,cur-sing),minor physical violence(shoving,kicking),passive-aggressive behavior(irritability,resistance),insulting attack behavior (abuse),and the patientˊs own mild violence(head against the wall,etc. )The total variance of gender,job title,work experience, and the combined effects on perception of aggressive behaviors was 28% . Conclusions:The male nurses have more perception of ag-gressive behavior than female nurses,and the nurses with high titles and more than five yearsˊ work experience can perceive more ag-gressive behavior.%目的:了解精神科护士遭受患者攻击的现状。方法:采用攻击行为发生情况感知量表(POPAS)对本市140名精神科护士进行调查,并分析影响其感知的因素。结果:140名研究对象感知发生频率最高的5种攻击行为:普通语言攻击(喊叫,咒骂)、身体轻微暴力(推搡,踢打)、被动攻击(易激怒,抵抗)、侮辱性攻击(辱骂)、患者自身轻微暴力(头撞墙等)。性别、职称、工作年限,共同影响对攻击行为感知情况总变异为28%。结论:男护士在感知攻击行为多于女护士,而高职称及超过5年工作年限的护士能更易感知攻击行为。

  6. Sociological and socio-psycho-historical problems of A-bomb exposed twin

    International Nuclear Information System (INIS)

    The atomic bombing of Hiroshima brought many casualities on human society, and collapsed human communities. The purpose of this study is to make mainly on pairs of monozygotic twins one of whom was exposed and the other was not, or both of whom were exposed, a general socio-psycho-historical investigations through a twin control study to find whether the bombing, which can be considered to cause major environmental changes, has had any psychological effects on the individuals. Due to the limited sample of atomic bomb exposed twins, in numbers available for study, it is necessary to have an understanding for their condions of the living and identity they have developed from the numerous mental stress they suffered, and rapid socio-cultural changes they experienced, including for changes in life from birth until the atomic bombing and aftermath of the disaster. As the result of this study, by depth interview, projective psychological research and research on socio-psycho-history of exposed twin and the nonexposed before the A-bomb and aftermath of disaster, the following were obtained: a) Although at the age of four and eight they exposed, they still keep it in clear memory of the damage and suffering in the minds. b) The damage and suffereng of the family who belonged were relatively small, the effects of their psychological sufferings continued even after these thirtyseven years. c) In the aftermath of the A-bomb disaster, the psychological bond showed strengthen through crises and following social distress. d) During the long period since the bombing, those who did not experienced A-bombing, have shown high degree of support and co-operation on their familial and social role to their counterpart. e) Even though their social or medical effects of A-bombing are relatively limited, if their spouse or close relative suffer psychological stress caused by A-bomb, they too suffer from their similar experiences. (J.P.N.)

  7. Anatomy of the Lockerbie bombing: Libya’s role and reactions to al-Megrahi’s release.

    Directory of Open Access Journals (Sweden)

    K. J. Ani

    2015-04-01

    Full Text Available Despite its long historical antecedents, terrorism is amongst the growing realities of the national history of contemporary sovereign states. With this emergence, destabilizing influence, and internationalization, terrorism has made the associated security challenge a major diplomatic headache for all key international actors and diplomats. This paper, which adopts a theoretical approach, assesses claims that Ghadafi’s Libya championed state-sponsored terrorism. It reviews the Lockerbie bombing and the conviction of al-Megrahi by the court in Netherland as well as his release from Scottish prison on compassionate grounds. It examines Libya’s use of available diplomatic tools and channels not only to prevent Abdelbaset Ali Mohammed al-Megrahi from facing justice but also to attain Ghadafi’s political and economic interests. This article documents the political communication that followed his release and calls for increased diplomatic investigations of the Lockerbie terrorist attack. Finally, the paper beckons on Libya’s new leaders and the leaderships of USA and Scotland to engage in a progressive multilateral strategic cooperation to unravel further facts on the Lockerbie bombing while promoting the current international “war” against terrorism

  8. Modelling vapour transport in Surtseyan bombs

    Science.gov (United States)

    McGuinness, Mark J.; Greenbank, Emma; Schipper, C. Ian

    2016-05-01

    We address questions that arise if a slurry containing liquid water is enclosed in a ball of hot viscous vesicular magma ejected as a bomb in the context of a Surtseyan eruption. We derive a mathematical model for transient changes in temperature and pressure due to flashing of liquid water to vapour inside the bomb. The magnitude of the transient pressure changes that are typically generated are calculated together with their dependence on material properties. A single criterion to determine whether the bomb will fragment as a result of the pressure changes is derived. Timescales for ejection of water vapour from a bomb that remains intact are also revealed.

  9. An experimental investigation of thrust vectoring two-dimensional convergent-divergent nozzles installed in a twin-engine fighter model at high angles of attack

    Science.gov (United States)

    Capone, Francis J.; Mason, Mary L.; Leavitt, Laurence D.

    1990-01-01

    An investigation was conducted in the Langley 16-Foot Transonic Tunnel to determine thrust vectoring capability of subscale 2-D convergent-divergent exhaust nozzles installed on a twin engine general research fighter model. Pitch thrust vectoring was accomplished by downward rotation of nozzle upper and lower flaps. The effects of nozzle sidewall cutback were studied for both unvectored and pitch vectored nozzles. A single cutback sidewall was employed for yaw thrust vectoring. This investigation was conducted at Mach numbers ranging from 0 to 1.20 and at angles of attack from -2 to 35 deg. High pressure air was used to simulate jet exhaust and provide values of nozzle pressure ratio up to 9.

  10. Radiative characteristics of depleted uranium bomb and it is protection

    International Nuclear Information System (INIS)

    Based on the developing process of depleted uranium bombs described in the first part, the radiative characteristics and mechanism of depleted uranium bombs are analyzed emphatically. The deeper discussion on protection of depleted uranium bombs is proceeded

  11. Outline on populations of Nagasaki A-bomb survivors and sex ratio in their children

    International Nuclear Information System (INIS)

    On the basis of file delivered together with A-bomb surrivor's health Cards in Nagasaki, statistical management was performed on a mass of A-bomb survivors. The number of A-bomb survivors in a mass was 97,032. A family investigation by census registration was performed on 2,547 of A-bomb survivor group (the distance from the center of explosion recorded on cards was within 1.5 km) and 2,791 of its control group. As to 2,547 of A-bomb survivor group, each exposure place was determined, the distance from the center of explosion was measured again, and exposure dose was presumed. The mean exposure dose of A-bomb survivor group was 577 rad in male, and 681 rad in female. By adding A-bomb survivor group to the control group, 4,452 pairs of marriage were confirmed by census registration, and the number of their children was 10,073. With respect to changes of sex ratio, in case of exposed mother, it was expected theoretically that the number of male would decrease together with an decrease of dose, but an opposite change was recognized in a result of the investigation. A result in case of exposed father showed an increase of the male number although not significantly and a change towards the expected direction. (Tsunoda, M.)

  12. Heisenberg's war. The secret history of the German bomb

    International Nuclear Information System (INIS)

    The history of Second World War Germany's 'Uranium Project', which often is referred to as the 'myth of the German atomic bomb', has been attracting the mind's of secret service men, futurologists, historians and journalists since after the end of the war it has become possible to lift the veil of secrecy. Powers book adds another one to the many investigations published since them. His approach to the piece of history starts with Heisenberg's visit to the U.S.A. in summer 1939, describes the plans of the German Heereswaffenamt pursued with the Uranium Project, and their counterpart on the side of the Allied Forces where German scientists, as immigrants in England and in the U.S.A., were doing their best to launch research for the development of an atomic bomb. The end of this 'competition' is marked by the internment of the ten German scientists and bomb specialists in Fall Hall. The leading story of the book centers on the small group of scientists around Heisenberg, who cleverly 'torpedoed' the development of the German atomic bomb in the years from 1939 until 1944. (HP)

  13. The grave is wide: the Hibakusha of Hiroshima and Nagasaki and the legacy of the Atomic Bomb Casualty Commission and the Radiation Effects Research Foundation.

    Science.gov (United States)

    O'Malley, Gerald F

    2016-07-01

    Following the atomic bomb attacks on Japan in 1945, scientists from the United States and Japan joined together to study the Hibakusha - the bomb affected people in what was advertised as a bipartisan and cooperative effort. In reality, despite the best efforts of some very dedicated and earnest scientists, the early years of the collaboration were characterized by political friction, censorship, controversy, tension, hostility, and racism. The 70-year history, scientific output and cultural impact of the Atomic Bomb Casualty Commission and the Radiation Effects Research Foundation are described in the context of the development of Occupied Japan. PMID:27158765

  14. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  15. Pure Nuclear Fusion Bomb Propulsion

    CERN Document Server

    Winterberg, F

    2008-01-01

    Recent progress towards the non-fission ignition of thermonuclear micro-explosions raises the prospect for a revival of the nuclear bomb propulsion idea, both for the fast transport of large payloads within the solar system and the launch into earth orbit without the release of fission products into the atmosphere. To reach this goal three areas of research are of importance: 1)Compact thermonuclear ignition drivers. 2)Fast ignition and deuterium burn. 3)Space-craft architecture involving magnetic insulation and GeV electrostatic potentials

  16. Jets and Bombs: Characterizing IRIS Spectra

    Science.gov (United States)

    Schmit, Donald; Innes, Davina

    2014-06-01

    For almost two decades, SUMER has provided an unique perspective on explosive events in the lower solar atmosphere. One of the hallmark observations during this tenure is the identification of quiet sun bi-directional jets in the lower transition region. We investigate these events through two distinct avenues of study: a MHD model for reconnection and the new datasets of the Interface Region Imaging Spectrograph (IRIS). Based on forward modeling optically thin spectral profiles, we find the spectral signatures of reconnection can vary dramatically based on viewing angle and altitude. We look to the IRIS data to provide a more complete context of the chromospheric and coronal environment during these dynamic events. During a joint IRIS-SUMER observing campaign, we observed spectra of multiple jets, a small C flare, and an Ellerman bomb event. We discuss the questions that arise from the inspection of these new data.

  17. Hiroshima: Perspectives on the Atomic Bombing.

    Science.gov (United States)

    Cheng, Amy

    In this curriculum module students analyze both U.S. and Japanese perspectives of the atomic bombing of Hiroshima. The activities integrate Howard Gardner's work on multiple intelligences. The module is recommended as a supplement to textbook coverage of the war in the Pacific and of the atomic bombing of Hiroshima. It can be used to support both…

  18. A man, a plan, a bomb

    Science.gov (United States)

    Harris, Margaret

    2015-03-01

    Was the atomic bombing of Hiroshima and Nagasaki justified? Was it necessary? Were there other - better - options available, either to the scientists who built the bombs or the generals who ordered them dropped? Nearly 70 years later, there are still no settled answers to these questions, and Tom Morton-Smith's new play Oppenheimer wisely avoids dwelling on the "what ifs" of atomic history.

  19. High incidence of meningioma among Hiroshima atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Shintani, Takahiro; Hayakawa, Norihiko; Hoshi, Masaharu [Hiroshima Univ. (Japan). Research Inst. for Radiation Biology and Medicine] [and others

    1999-03-01

    Since the atomic bomb explosions in Hiroshima and Nagasaki, high incidences of leukemia, thyroid cancer and other tumors have been reported as atomic bomb-induced tumors. We investigated the incidence of meningioma among Hiroshima atomic bomb survivors. Sixty-eight patients surgically treated for meningioma who had been within 2.0 km of the hypocenter of the explosion were identified. Six hundred and seven non-exposed patients with meningioma were also studied. Treatment dates were from 1975 to 1992. The incidences of meningioma among 68 subjects within 2.0 km and 607 non-exposed patients were 8.7 and 3.0 cases per 10{sup 5} persons per year, respectively. The incidences of meningioma among the survivors of Hiroshima in 5-year intervals since 1975 were 5.3, 7.4, 10.1, and 14.9, respectively. The incidences of meningioma classified by distances from the hypocenter of 1.5-2.0 km, 1.0-1.5 km and less than 1.0 km were 6.3, 7.6 and 20.0, respectively. The incidences of meningioma classified by doses to the brain of 0-0.099 Sv, 0.1-0.99 Sv and more than 1.0 Sv were 7.7, 9.2 and 18.2, respectively. The incidence of meningioma among Hiroshima atomic bomb survivors has increased since 1975. There was a significant correlation between the incidence and the dose of radiation to the brain. The present findings strongly suggest that meningioma is one of the tumors induced by atomic bombing in Hiroshima. (author)

  20. High incidence of meningioma among Hiroshima atomic bomb survivors.

    Science.gov (United States)

    Shintani, T; Hayakawa, N; Hoshi, M; Sumida, M; Kurisu, K; Oki, S; Kodama, Y; Kajikawa, H; Inai, K; Kamada, N

    1999-03-01

    Since the atomic bomb explosions in Hiroshima and Nagasaki, high incidences of leukemia, thyroid cancer and other tumors have been reported as atomic bomb-induced tumors. We investigated the incidence of meningioma among Hiroshima atomic bomb survivors. Sixty-eight patients surgically treated for meningioma who had been within 2.0 km of the hypocenter of the explosion were identified. Six hundred and seven non-exposed patients with meningioma were also studied. Treatment dates were from 1975 to 1992. The incidences of meningioma among 68 subjects within 2.0 km and 607 non-exposed patients were 8.7 and 3.0 cases per 10(5) persons per year, respectively. The incidences of meningioma among the survivors of Hiroshima in 5-year intervals since 1975 were 5.3, 7.4, 10.1, and 14.9, respectively. The incidences of meningioma classified by distances from the hypocenter of 1.5-2.0 km, 1.0-1.5 km and less than 1.0 km were 6.3, 7.6 and 20.0, respectively. The incidences of meningioma classified by doses to the brain of 0-0.099 Sv, 0.1-0.99 Sv and more than 1.0 Sv were 7.7, 9.2 and 18.2, respectively. The incidence of meningioma among Hiroshima atomic bomb survivors has increased since 1975. There was a significant correlation between the incidence and the dose of radiation to the brain. The present findings strongly suggest that meningioma is one of the tumors induced by atomic bombing in Hiroshima. PMID:10408177

  1. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  2. Surveys right after the atomic bombing and a relief squad

    International Nuclear Information System (INIS)

    An outline of four survey reports right after the atomic bombing in Nagasaki and Hiroshima is introduced. The report of Manhattan District Atomic Bomb Investigating Groups: The subjects of this survey were 900 inpatients in Nagasaki (for 16 days from September 20) and Hiroshima (for 5 days from October 3). Two hundreds and forty-nine patients (16%) died. In cases died without injury, the severe symptoms were alopecia, purpura, hemorrhage, oral cavity and pharynx lesion, vomiting, diarrhea and fever. The residual radioactivity measured at six weeks later was 6-25 roentgen in Hiroshima and 30-110 roentgen in Nagasaki (Nishiyama riverhead area). These values were lower than the predicted value from the clinical consequence. The report of Joint Commission for the Investigation of the Atomic Bomb: Following the above survey, about 6500 subjects were investigated both in Nagasaki and Hiroshima. Incidence of alopecia was investigated by shielded situation at a spot of 2.1 to 2.5 km from a blast center. It was 7.2% of outdoors (shielded: 7.3%, non-shielded: 17.4%) and 2.9% of indoors. The report of the Special Committee for Atomic Bomb Casualty Investigation and Research of the Scientific Research Council of Japan: General part of the report consists of medical part and physical part, and reports from each university were classified and listed in the supplement. Survey of Nagasaki Medical College (not in public): About 8000 subjects were investigated from October to December. Data were gathered up about lethality, time of death, injury and radiation sickness, etc. There was also autograph of a relief squad of the Nagasaki Medical College. (K.H.)

  3. Surveys right after the atomic bombing and a relief squad

    Energy Technology Data Exchange (ETDEWEB)

    Mine, Mariko [Nagasaki Univ. (Japan). School of Medicine

    1998-12-01

    An outline of four survey reports right after the atomic bombing in Nagasaki and Hiroshima is introduced. The report of Manhattan District Atomic Bomb Investigating Groups: The subjects of this survey were 900 inpatients in Nagasaki (for 16 days from September 20) and Hiroshima (for 5 days from October 3). Two hundreds and forty-nine patients (16%) died. In cases died without injury, the severe symptoms were alopecia, purpura, hemorrhage, oral cavity and pharynx lesion, vomiting, diarrhea and fever. The residual radioactivity measured at six weeks later was 6-25 roentgen in Hiroshima and 30-110 roentgen in Nagasaki (Nishiyama riverhead area). These values were lower than the predicted value from the clinical consequence. The report of Joint Commission for the Investigation of the Atomic Bomb: Following the above survey, about 6500 subjects were investigated both in Nagasaki and Hiroshima. Incidence of alopecia was investigated by shielded situation at a spot of 2.1 to 2.5 km from a blast center. It was 7.2% of outdoors (shielded: 7.3%, non-shielded: 17.4%) and 2.9% of indoors. The report of the Special Committee for Atomic Bomb Casualty Investigation and Research of the Scientific Research Council of Japan: General part of the report consists of medical part and physical part, and reports from each university were classified and listed in the supplement. Survey of Nagasaki Medical College (not in public): About 8000 subjects were investigated from October to December. Data were gathered up about lethality, time of death, injury and radiation sickness, etc. There was also autograph of a relief squad of the Nagasaki Medical College. (K.H.)

  4. Uranium tetrafluoride reduction closed bomb. Part I: Reduction process general conditions

    International Nuclear Information System (INIS)

    General conditions about the metallo thermic reduction in small bombs (250 and 800 gr. of uranium) has been investigated. Factors such as kind and granulometry of the magnesium used, magnesium excess and preheating temperature, which affect yields and metal quality have been considered. magnesium excess increased yields in a 15% in the small bomb, about the preheating temperature, there is a range between which yields and metal quality does not change. All tests have been made with graphite linings. (Author) 18 refs

  5. Pros and cons on ''Hitlers' bomb''. Studies on nuclear research in Germany; Fuer und Wider ''Hitlers Bombe''. Studien zur Atomforschung in Deutschland

    Energy Technology Data Exchange (ETDEWEB)

    Karlsch, R.; Petermann, H. (eds.)

    2007-07-01

    This book reveals a sensation: Under supervision of the SS German scientists tested 1944/45 nuclear bombs on Ruegen and in Thuringia. During this period several hundred prisoners of war and prisoners died. Besides proofs for nuclear weapon testing the author also found a draft for a patent on plutonium bombs and discovered the first functioning German atom reactor in the environs of Berlin. The succeeding book titled above enlarges the spectra of contributions from Saenger PLan to attack New York, researches on minimization of critical mass, the attempt to calculate TNT-equivalence as the presentation of important acteurs occuring during the researches. (GL)

  6. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  7. Outline of developing projects of atomic bomb in Japan and USA

    International Nuclear Information System (INIS)

    The content of the title connecting with the World War II is described hoping that younger researchers of nuclear physics could know some of the facts that scientists and the military of Japan and USA, respectively, had have developing projects of atomic bomb by fission reaction, although there are no official documents of those in Japan, even if there are some unofficial documents that are uncertain partly in Japan. Described are a chronological table, the content of research and development of atomic bombs, Japan's experiments by Kikuchi Laboratory of Osaka Imperial University and Nishina Laboratory of RIKEN, as well as the USA's action such as production of fissile nuclide, Pu-239 and U-235, selection of the site to fabricate atomic bomb, investigation the state of research and development of atomic bombs in Germany, Italy and Japan. (S.Y.)

  8. Radiation exposure and disease questionnaires of early entrants after the Hiroshima bombing.

    Science.gov (United States)

    Imanaka, Tetsuji; Endo, Satoru; Kawano, Noriyuki; Tanaka, Kenichi

    2012-03-01

    It is popularly known that people who entered into the ground-zero area shortly after the atomic bombings in Hiroshima and Nagasaki suffered from various syndromes similar to acute radiation effects. External exposures from neutron-induced radionuclides in soil have recently been reassessed based on DS02 calculations as functions of both distance from the hypocentres and elapsed time after the explosions. Significant exposure due to induced radiation can be determined for those who entered the area within 1000 m from the hypocentres shortly after the bombing. Although it was impossible to track the action of each of the survivors over the days or weeks following the bombings in order to make reliable dose estimates for their exposures to soil activation or fallout, four individuals among those early entrants were investigated here to describe useful information of what happened shortly after the bombing. PMID:21914640

  9. Yale and the Atomic Bomb Casualty Commission.

    OpenAIRE

    Bowers, J. Z.

    1983-01-01

    This is a description, based largely on personal discussions, of the contributions of men from the Yale University School of Medicine to the saga of the immediate and long-term studies on the medical effects of the atomic bombs at Hiroshima and Nagasaki. They played key roles in the immediate studies of bomb effects, in the creation of long-term studies of delayed effects, and in elevating the Atomic Bomb Casualty Commission after 1955 to a position of excellence in its studies and relations ...

  10. Radiation therapy among atomic bomb survivors, Hiroshima and Nagasaki

    International Nuclear Information System (INIS)

    In the continuing evaluations of atomic bomb survivors for late radiation effects, not only doses from the A-bombs but those from other radiation sources must be considered, for the latter may be concomitantly acting factors causing bias among these investigations. In the present study, among 73 Hiroshima and 22 Nagasaki Adult Health Study (AHS) subjects who reported receiving radiation therapy, from 1970 through 1979, the medical records of 72 and 20, respectively, were reviewed, and 41 Hiroshima and 14 Nagasaki subjects were confirmed to have received radiation therapy. The data obtained in the present study were pooled with those of the previous investigation on radiation therapy exposures of AHS subjects prior to 1970. A total of 190 subjects have been documented as receiving radiation therapy and their doses were estimated. Energies used in treatments and diseases treated are discussed. Malignancies developed subsequent to radiation therapy in seven cases; five after treatment for malignancies and two after treatment for benign diseases. Neoplasms of 12 AHS subjects may have been induced by earlier radiation therapy; 5 in the earlier study and 7 in the present one. These investigations underscore the need for continued documentation of exposures to ionizing radiation for medical reasons, especially from sources incurring relatively high doses. Bias in assessments of late radiation effects among A-bomb survivors can thus be avoided. (author)

  11. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  12. Neuropsychiatric and psychologic effects of A-bomb radiation

    International Nuclear Information System (INIS)

    Few studies have assessed the influences of A-bombing from both psychiatric and psychologic points of view. This chapter deals with the knowledge of neuropsychiatric and psychologic influences of A-bombing. Many A-bomb survivors were exposed not only to radiation but also to rapid environmental alterations, such as death of family members and destruction of living. In addition, they suffered from sequelae and anxiety. Naturally, these were considered to cause psychological disturbance including autonomic imbalance and neurosis. Psychological survey, made immediately after A-bombing, is presented, with special attention to behavioral patterns in 54 A-bomb survivors by dividing them into 5 stimulation groups. Radiation syndrome occurring early after exposure and leukemia or cancer occurring later were referred to as 'Genbaku-sho' (A-bomb disease). A-bomb survivors' physically eventful conditions tended to induce mental anxiety or the contrary. Depression and phobia seemed to have correlated with physical conditions. In addition to 'A-bomb disease', mass media, dealing with 'A-bomb neurosis,' 'marriage in A-bomb survivors,' 'suicide in A-bomb survivors,' 'A-bomb survivors orphan,' and 'lonely old A-bomb survivors,' had a great impact on A-bomb survivors. For in uterus exposed and infantile A-bomb survivors, there was no significant difference between the exposed and non-exposed groups, although the incidence of eye tremor and sleeping disorder is found to be higher in the in uterus exposed group than the control group. (N.K.)

  13. UV spectra, bombs, and the solar atmosphere

    CERN Document Server

    Judge, Philip G

    2015-01-01

    A recent analysis of UV data from the Interface Region Imaging Spectrograph {\\em IRIS} reports plasma "bombs" with temperatures near \\hot{} within the solar photosphere. This is a curious result, firstly because most bomb plasma pressures $p$ (the largest reported case exceeds $10^3$ dyn~cm$^{-2}$) fall well below photospheric pressures ($> 7\\times10^3$), and secondly, UV radiation cannot easily escape from the photosphere. In the present paper the {\\em IRIS} data is independently analyzed. I find that the bombs arise from plasma originally at pressures between $\\lta80$ and 800 dyne~cm$^{-2}$ before explosion, i.e. between $\\lta850$ and 550 km above $\\tau_{500}=1$. This places the phenomenon's origin in the low-mid chromosphere or above. I suggest that bomb spectra are more compatible with Alfv\\'enic turbulence than with bi-directional reconnection jets.

  14. Yale and the Atomic Bomb Casualty Commission

    International Nuclear Information System (INIS)

    This is a description, based largely on personal discussions, of the contributions of men from the Yale University School of Medicine to the saga of the immediate and long-term studies on the medical effects of the atomic bombs at Hiroshima and Nagasaki. They played key roles in the immediate studies of bomb effects, in the creation of long-term studies of delayed effects, and in elevating the Atomic Bomb Casualty Commission after 1955 to a position of excellence in its studies and relations with the Japanese. The accumulation of the information presented in this paper derives from research for the preparation of the history of the Atomic Bomb Casualty Commission. In 1975, the commission was passed to Japanese leadership as the Radiation Effects Research Foundation

  15. The Atomic Bomb Casualty Commission in retrospect

    OpenAIRE

    Putnam, Frank W.

    1998-01-01

    For 50 years, the Atomic Bomb Casualty Commission (ABCC) and its successor, the Radiation Effects Research Foundation (RERF), have conducted epidemiological and genetic studies of the survivors of the atomic bombs and of their children. This research program has provided the primary basis for radiation health standards. Both ABCC (1947–1975) and RERF (1975 to date) have been a joint enterprise of the United States (through the National Academy of Sciences) and of J...

  16. Atomic Bomb and Leukemia : II. BIOLOGICAL EFFECTS

    OpenAIRE

    Ichimaru, Michito; Tomonaga, Masao; Amenomori, Tatsuhiko; Matsuo, Tatsuki

    1991-01-01

    Characteristic features of leukemia among atomic bomb survivors were studied. The ratio of a single leukemia type to all leukemias was highest for CML in Hiroshima, and the occurrence of CML was thought to be most characteristic for atomic bomb radiation induced leukemia. In the distribution of AML subtypes of FAR classification, there was no M3 cases in 1Gy or more group, although several atypical AML cases of survivors were observed. Chromosome study was conducted using colony forming cells...

  17. Investigation of resistance against intergranular attack on welded high alloyed steels using the electrochemical potentiodynamic reactivation (EPR-test). Final report

    International Nuclear Information System (INIS)

    There is a lack of methods for detecting intergranular attack (IGA) of wear and corrosion resistant claddings from FeCrNiSiMn-type alloys. The EPR-test (electrochemical potentio-dynamic reactivation) detects IGA caused by M23C6 precipitates and Cr-depleted zones, but the method standardized for rolled austenitic steels doesn't fit welds. A suitable EPR-variante has been developed for testing claddings of the electrode types EB9/300rc and Tube S 17.8 Si, measuring the charge quotient of reactivation and passivation in 0,5 M H2SO4+0,01 M KSCN at 30 C using optimated parameters. The relations between thermal treatment, structur and IGA has been investigated using microanalytical (REM/EDX) methods. Results: The development method fits well claddings up to 30% δ-ferrite. In the as-welded state all claddings are resistant. After thermal treatment sensitization by carbide precipitations and by decomposition of δ-Ferrit may occure. The electrodes show rising resistance in the ranking order EB9-Tube S o.a. The method can be used as a proof for IGA resistance required by nuclear power plants and for assessment and development of welding electrodes mostly realised by small firms. (orig.)

  18. Bombs, flyin' high. In-flight dynamics of volcanic bombs from Strombolian to Vulcanian eruptions.

    Science.gov (United States)

    Taddeucci, Jacopo; Alatorre, Miguel; Cruz Vázquez, Omar; Del Bello, Elisabetta; Ricci, Tullio; Scarlato, Piergiorgio; Palladino, Danilo

    2016-04-01

    Bomb-sized (larger than 64 mm) pyroclasts are a common product of explosive eruptions and a considerable source of hazard, both from directly impacting on people and properties and from wildfires associated with their landing in vegetated areas. The dispersal of bombs is mostly modeled as purely ballistic trajectories controlled by gravity and drag forces associated with still air, and only recently other effects, such as the influence of eruption dynamics, the gas expansion, and in-flight collisions, are starting to be quantified both numerically and observationally. By using high-speed imaging of explosive volcanic eruptions here we attempt to calculate the drag coefficient of free-flying volcanic bombs during an eruption and at the same time we document a wide range of in-flight processes affecting bomb trajectories and introducing deviations from purely ballistic emplacement. High-speed (500 frames per second) videos of explosions at Stromboli and Etna (Italy), Fuego (Gatemala), Sakurajima (Japan), Yasur (Vanuatu), and Batu Tara (Indonesia) volcanoes provide a large assortment of free-flying bombs spanning Strombolian to Vulcanian source eruptions, basaltic to andesitic composition, centimeters to meters in size, and 10 to 300 m/s in fly velocity. By tracking the bombs during their flying trajectories we were able to: 1) measure their size, shape, and vertical component of velocity and related changes over time; and 2) measure the different interactions with the atmosphere and with other bombs. Quantitatively, these data allow us to provide the first direct measurement of the aerodynamic behavior and drag coefficient of volcanic bombs while settling, also including the effect of bomb rotation and changes in bomb shape and frontal section. We also show how our observations have the potential to parameterize a number of previously hypothesized and /or described but yet unquantified processes, including in-flight rotation, deformation, fragmentation, agglutination

  19. Boosting Belligerence: How the July 7, 2005, London Bombings Affected Liberals' Moral Foundations and Prejudice.

    Science.gov (United States)

    Van de Vyver, Julie; Houston, Diane M; Abrams, Dominic; Vasiljevic, Milica

    2016-02-01

    Major terrorist events, such as the recent attacks in Ankara, Sinai, and Paris, can have profound effects on a nation's values, attitudes, and prejudices. Yet psychological evidence testing the impact of such events via data collected immediately before and after an attack is understandably rare. In the present research, we tested the independent and joint effects of threat (the July 7, 2005, London bombings) and political ideology on endorsement of moral foundations and prejudices among two nationally representative samples (combined N = 2,031) about 6 weeks before and 1 month after the London bombings. After the bombings, there was greater endorsement of the in-group foundation, lower endorsement of the fairness-reciprocity foundation, and stronger prejudices toward Muslims and immigrants. The differences in both the endorsement of the foundations and the prejudices were larger among people with a liberal orientation than among those with a conservative orientation. Furthermore, the changes in endorsement of moral foundations among liberals explained their increases in prejudice. The results highlight the value of psychological theory and research for understanding societal changes in attitudes and prejudices after major terrorist events. PMID:26674127

  20. Investigations into Outbreaks of Black Fly Attacks and Subsequent Avian Haemosporidians in Backyard-Type Poultry and Other Exposed Avian Species.

    Science.gov (United States)

    Jones, Kelli; Johnson, Nora; Yang, Sharon; Stokes, John; Smith, Whitney; Wills, Robert; Goddard, Jerome; Varela-Stokes, Andrea

    2015-03-01

    In late spring of 2009 and 2010, there were reports of severe black fly (Simulium spp., shown in Fig. 1) outbreaks in various counties in Mississippi, especially those in and around the Mississippi River Delta. Complaints were of black flies attacking multiple species of backyard poultry and causing high morbidity and mortality in affected flocks. At several affected locations, black flies were readily observed swarming around and feeding on birds. A large number of these parasites were easily trapped on fly strips (Fig. 2). Multifocal to coalescing cutaneous hemorrhagic lesions, consistent with fly bites, were seen on the birds. Upon necropsy examination, a large number of black flies were also observed in the digestive tract (Fig. 3). Although black flies may cause disease directly, such as cardiopulmonary collapse and anaphylactoid reactions, detection of Leucocytozoon in blood smears (Fig. 4) of affected birds prompted further investigations of this protozoan as a cause of disease. Leucocytozoon spp. are known to be transmitted by black flies and may be associated with morbidity and mortality in birds such as poultry. From June 2009 through July 2012, the investigation included a total collection of 1068 individual blood samples, representing 371 individual premises in 89 counties/parishes across Mississippi (59), Alabama (10), Louisiana (4), and Tennessee (16). Of the 371 premises where blood samples were collected, 96 (26%) were either positive or highly suspected to be positive for Leucocytozoon spp. by blood smear analysis, and 5 (1.2%) were positive for Haemoproteus spp. by blood smear analysis. Attempts to diagnose Leucocytozoon spp. by PCR analysis and sequencing were complicated by coinfections with two closely related haemosporidians (Haemoproteus spp. and Plasmodium spp.). A novel technique involving flow cytometry was also explored. This study discusses the black fly field outbreak, the involvement of haemosporidians, molecular methods for detection

  1. Chromosome survey for children of A-bomb survivors

    International Nuclear Information System (INIS)

    To investigate chromosomes from children of A-bomb survivors, cytogenetic survey has been started in 1967 by the ABCC and completed in 1985 by the succeeding RERF. This paper is designed to overview the cytogenetic survey and to discuss the cytogenetic effects of A-bomb radiation. A cohort of 16,298 children of A-bomb survivors, which were collected from mortality survey population in 1974, was enrolled in this survey and was divided into two groups: the proximally exposed group (n=8,322, whose parents exposed to estimated doses of 0.01 Gy or more within 2,000 m from the hypocenter) and the distally exposed group (n=7,976, those exposed to 0.005 Gy or less far from 2,500 m or not in the city). Three chromosomal aberrations were identified: sex chromosome aberrations consisting mainly of XYY, XXY, and mosaic; structural abnormality of autosomes consisting mainly of translocation and inversion; and trisomy of autosomes. Overall, the incidence of chromosomal aberrations was higher in the distally exposed group (6.39%) than the proximally exposed group (5.17%). According to the type of chromosomal aberrations, the incidences of both sex chromosomes and structural abnormality of autosomes were slightly higher in the distally exposed group (0.30% and 0.34%) than the proximally exposed group (0.23% and 0.28%). Trisomy of autosomes was identified in only one child in the proximally exposed group. These findings failed to demonstrate the rationale for the cytogenetic effects of A-bomb radiation; however, cytogenetic risk of radiation has not been denied completely. (N.K.)

  2. Dating human DNA with the 14C bomb peak

    Energy Technology Data Exchange (ETDEWEB)

    Kutschera, Walter; Liebl, Jakob; Steier, Peter [VERA Laboratory, University of Vienna, Vienna (Austria)

    2013-07-01

    In 1963 the limited nuclear test ban treaty stopped nuclear weapons testing in the atmosphere. By then the addition from bomb-produced {sup 14}C had doubled the {sup 14}C content of the atmosphere. Through the CO{sub 2} cycle this excess exchanged with the hydrosphere and biosphere leading to a rapidly decreasing {sup 14}C level in the atmosphere. Today we are almost back to the pre-nuclear level. As a consequence all people on Earth who lived during the second half of the 20th century were exposed to this rapidly changing {sup 14}C signal. A few years ago, a group at the Department of Cell and Molecular Biology of the Karolinska Institute in Stockholm started to use the {sup 14}C bomb peak signal in DNA to determine retrospectively the age of cells from various parts of the human body (brain, heart, fat). In a collaboration with this group, we have studied the age of olfactory bulb neurons in the human brain. For this investigation, {sup 14}C AMS measurements were developed at VERA for very small carbon samples in the range from 2 to 4 micrograms. In the presentation the general concept of {sup 14}C bomb peak dating of human DNA and several applications are discussed.

  3. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio......-technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  4. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  5. The story of an A-bomb by Oppenheimer

    Energy Technology Data Exchange (ETDEWEB)

    Song, Eun Yeong

    2005-06-15

    This book concentrates on an A-bomb by Oppenheimer. It is divided into eleven class, which are exile of excellent scientists, uranium atomic fission, situation the U.S. and Germany I, situation the U.S. and Germany II, air strike in pearl Harbor, plan for development of an A-bomb, military action to blow up heavy water plant, select on spot to drop an A-bomb, surrender and drop for an A-bomb and science of an A-bomb. This book is written to explain an A-bomb with form of storytelling.

  6. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  7. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  8. Breast cancer in atomic bomb survivors

    International Nuclear Information System (INIS)

    Thirty eight years after the atomic bombings, studies of the Radiation Effects Research Foundation (RERF) on the extended Life Span Study (LSS) sample have continued to provide important information on radiation carcinogenesis. The third breast cancer survey among this sample revealed 564 cases during the period 1950-80, of which 412 were reviewed microscopically. The following statements reflect the conclusions from the current investigation; 1) the relationship between radiation dose and breast cancer incidence was consistent with linearity and did not differ markedly between the Hiroshima and Nagasaki survivors, 2) a dose-related breast cancer risk was observed among women who were in their first decade of life at the time of exposure, 3) the relative risk of radiationinduced breast cancer decreased with increasing age at exposure, 4) the pattern over time of age-specific breast cancer incidence is similar for exposed and control women (that is, exposed women have more breast cancer than control women but the excess risk closely follows normal risk as expressed by age-specific population rates), and 5) radiation-induced breast cancer appears to be morphologically similar to other breast cancer

  9. Magnetic Flux Cancellation in Ellerman Bombs

    CERN Document Server

    Reid, A; Doyle, J G; Scullion, E; Henriques, V; Nelson, C; Ray, T

    2016-01-01

    Ellerman Bombs (EBs) are often found co-spatial with bipolar photospheric magnetic fields. We use H$\\alpha$ imaging spectroscopy along with Fe I 6302.5 \\AA\\ spectro-polarimetry from the Swedish 1-m Solar Telescope (SST), combined with data from the Solar Dynamic Observatory (SDO) to study EBs and the evolution of the local magnetic fields at EB locations. The EBs are found via an EB detection and tracking algorithm. We find, using NICOLE inversions of the spectro-polarimetric data, that on average (3.43 $\\pm$ 0.49) x 10$^{24}$ ergs of stored magnetic energy disappears from the bipolar region during the EBs burning. The inversions also show flux cancellation rates of 10$^{14}$ - 10$^{15}$ Mx s$^{-1}$, and temperature enhancements of 200 K at the detection footpoints. We investigate near-simultaneous flaring of EBs due to co-temporal flux emergence from a sunspot, which shows a decrease in transverse velocity when interacting with an existing, stationary area of opposite polarity magnetic flux and the EBs are f...

  10. Health effects of atomic-bomb radiation

    International Nuclear Information System (INIS)

    This review described carcinogenic and genetic effects of A-bomb radiation. Effects have been investigated on 120,000 exposed people for their life span, 20,000 for health examinations, 3,000 people exposed in the womb and 80,000 second-generations of the exposed people. Epidemiological data revealed the presence of carcinogenic effects: Cancer death amounted to 9% from 1950 to 1990. However, carcinogenic mechanism is unknown yet. Genetic effects have been studied from the points of lesion at birth, sex ratio, chromosome aberration, biochemical test and mortality rate of children of exposed people and, although the effects have been experimentally shown in animals, are not observed in those children. This may be derived from the fact that there are few people who were exposed to such a high dose as used experimentally (0.2 Sv exposure to people within 2.5 km diameter-area from the explosion point vs >3 Sv in animals). Data are presented in Research Foundation home page. (K.H.)

  11. Colorectal cancer among atomic bomb survivors

    International Nuclear Information System (INIS)

    Studies on autopsied and surgical cases of colorectal cancer in Hiroshima and Nagasaki atomic bomb (A-bomb) survivors have not shown a relationship to radiation. In a recent epidemiologic study made on a fixed population at the Radiation Effects Research Foundation (RERF), the risk of colon cancer was found to increase significantly with increasing radiation dose in both Hiroshima and Nagasaki, and also in both males and females. The dose effect for the cities and sexes combined was especially pronounced for cancer of the sigmoid colon. The effect of radiation was found to vary by age at the time of the bomb (ATB) and the effect was remarkable among those under age 20 ATB. The risk of rectal cancer was not found to increase significantly with radiation and the distribution of histological types for cancer of either the colon or rectum was unrelated to radiation dose. The effect of A-bomb exposure on the postoperative survival rate for colorectal cancer patients was studied. No difference by radiation dose could be demonstrated. In Japan, the incidence of colorectal cancer, and of colon cancer in particular, has been increasing. Therefore, close attention should be paid to changes occuring in A-bomb survivors

  12. Media's role in broadcasting acute stress following the Boston Marathon bombings.

    Science.gov (United States)

    Holman, E Alison; Garfin, Dana Rose; Silver, Roxane Cohen

    2014-01-01

    We compared the impact of media vs. direct exposure on acute stress response to collective trauma. We conducted an Internet-based survey following the Boston Marathon bombings between April 29 and May 13, 2013, with representative samples of residents from Boston (n = 846), New York City (n = 941), and the remainder of the United States (n = 2,888). Acute stress symptom scores were comparable in Boston and New York [regression coefficient (b) = 0.43; SE = 1.42; 95% confidence interval (CI), -2.36, 3.23], but lower nationwide when compared with Boston (b = -2.21; SE = 1.07; 95% CI, -4.31, -0.12). Adjusting for prebombing mental health (collected prospectively), demographics, and prior collective stress exposure, six or more daily hours of bombing-related media exposure in the week after the bombings was associated with higher acute stress than direct exposure to the bombings (continuous acute stress symptom total: media exposure b = 15.61 vs. direct exposure b = 5.69). Controlling for prospectively collected prebombing television-watching habits did not change the findings. In adjusted models, direct exposure to the 9/11 terrorist attacks and the Sandy Hook School shootings were both significantly associated with bombing-related acute stress; Superstorm Sandy exposure wasn't. Prior exposure to similar and/or violent events may render some individuals vulnerable to the negative effects of collective traumas. Repeatedly engaging with trauma-related media content for several hours daily shortly after collective trauma may prolong acute stress experiences and promote substantial stress-related symptomatology. Mass media may become a conduit that spreads negative consequences of community trauma beyond directly affected communities. PMID:24324161

  13. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    Science.gov (United States)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  14. AFSC/REFM: Bomb-produced age validation study

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Fish age validation with bomb-produced radiocarbon (14C) requires a known-age Delta14C reference chronology spanning the era of a marine increase in bomb-produced...

  15. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  16. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  17. What Is a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  18. What Causes a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Causes a Heart Attack? Coronary Heart Disease A heart attack happens if ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  19. Life After a Heart Attack

    Science.gov (United States)

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  20. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  1. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  2. A Field Investigation of Bacillus anthracis Contamination of U.S. Department of Agriculture and Other Washington, D.C., Buildings during the Anthrax Attack of October 2001

    OpenAIRE

    Higgins, James A.; Cooper, Mary; Schroeder-Tucker, Linda; Black, Scott; Miller, David; Karns, Jeffrey S.; Manthey, Erlynn; Breeze, Roger; Perdue, Michael L

    2003-01-01

    In response to a bioterrorism attack in the Washington, D.C., area in October 2001, a mobile laboratory (ML) was set up in the city to conduct rapid molecular tests on environmental samples for the presence of Bacillus anthracis spores and to route samples for further culture analysis. The ML contained class I laminar-flow hoods, a portable autoclave, two portable real-time PCR devices (Ruggedized Advanced Pathogen Identification Device [RAPID]), and miscellaneous supplies and equipment to pr...

  3. Experimental investigation of effect of flow attack angle on thermohydraulic performance of air flow in a rectangular channel with discrete V-pattern baffle on the heated plate

    Directory of Open Access Journals (Sweden)

    Raj Kumar

    2016-05-01

    Full Text Available In this work, the effect of angle of attack ( α a of the discrete V-pattern baffle on thermohydraulic performance of rectangular channel has been studied experimentally. The baffle wall was constantly heated and the other three walls of the channel were kept insulated. The experimentations were conducted to collect the data on Nusselt number ( N u b and friction factor ( f b by varying the Reynolds number (Re = 3000–21,000 and angle of attack ( α a from 30° to 70°, for the kept values of relative baffle height ( H b / H = 0 . 50 , relative pitch ratio ( P b / H = 1 . 0 , relative discrete width ( g w / H b = 1 . 5 and relative discrete distance ( D d / L v = 0 . 67 . As compared to the smooth wall, the V-pattern baffle roughened channel enhances the Nusselt number ( N u b and friction factor ( f b by 4.2 and 5.9 times, respectively. The present discrete V-pattern baffle shapes with angle of attack ( α a of 60° equivalent to flow Reynolds number of 3000 yields the greatest thermohydraulic performance. Discrete V-pattern baffle has improved thermal performance as compared to other baffle shapes’ rectangular channel.

  4. Health risks of atomic bomb survivors

    International Nuclear Information System (INIS)

    At the Atomic Bomb Casualty Commission and its successor organization, the Radiation Effects Research Foundation, mortality and morbidity surveys have been continually carried out on about 1,800 persons exposed in utero to the atomic bombings of Hiroshima and Nagasaki. Although the effect of radiation exposure was marked enough to permit observation of a dose-response relationship in the 30 known cases of severe mental retardation among the in utero-exposed, the association between in utero exposure and cancer risk is still uncertain. Based on data for all cancers from 1950 through 1984 for the in utero-exposed, the excess risk per 10,000 person-year-Gy was 6.57 and the relative risk at 1 Gy was 3.77. For the recent years 1985-89, there was no evident excess of cancer risk. During the remaining lifetime, it seems unlikely that any great excess of leukemia will appear. As for the risk of solid tumors, further follow up is in progress. The 1950-89 findings for cancer risk among the in utero-exposed will be compared with cancer risk among A-bomb survivors who were less than 10 years old at the time of the bombings. (author)

  5. Terror, tortur og den tikkende bombe

    DEFF Research Database (Denmark)

    Dige, Morten

    2012-01-01

    a catastrophe? I criticize arguments based on ticking bomb scenarios in two steps. First, I show that exceptional resort to torture will not be possible in the situations where it is most needed. Second, I state several pragmatic as well as principled objections against a state sanctioned or tolerated practice...

  6. Hurricane Ike versus an Atomic Bomb

    Science.gov (United States)

    Pearson, Earl F.

    2013-01-01

    The destructive potential of one of nature's most destructive forces, the hurricane, is compared to one of human's most destructive devices, an atomic bomb. Both can create near absolute devastation at "ground zero". However, how do they really compare in terms of destructive energy? This discussion compares the energy, the…

  7. Bomb apologetics: Farm Hall, August 1945

    Energy Technology Data Exchange (ETDEWEB)

    Bernstein, J. [Professor of Physics at Stevens Institute of Technology in Hoboken New Jersey (United States); Cassidy, D. [Professor at Hofstra University, in Hempstead, New York (United States)

    1995-08-01

    On hearing the news from Hiroshima, the incredulous internees came up with a self-serving story to explain their failures in nucleus research: To keep Hitler from winning, they had deliberately not developed the atomic bomb. {copyright} 1995 {ital American} {ital Institute} {ital of} {ital Physics}.

  8. Building Computer Network Attacks

    CERN Document Server

    Futoransky, Ariel; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities of his network.

  9. Building Computer Network Attacks

    OpenAIRE

    Futoransky, Ariel; Notarfrancesco, Luciano; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities o...

  10. The 'secureplan' bomb utility: A PC-based analytic tool for bomb defense

    International Nuclear Information System (INIS)

    This paper illustrates a recently developed, PC-based software system for simulating the effects of an infinite variety of hypothetical bomb blasts on structures and personnel in the immediate vicinity of such blasts. The system incorporates two basic rectangular geometries in which blast assessments can be made - an external configuration (highly vented) and an internal configuration (vented and unvented). A variety of explosives can be used - each is translated to an equivalent TNT weight. Provisions in the program account for bomb cases (person, satchel, case and vehicle), mixes of explosives and shrapnel aggregates and detonation altitudes. The software permits architects, engineers, security personnel and facility managers, without specific knowledge of explosives, to incorporate realistic construction hardening, screening programs, barriers and stand-off provisions in the design and/or operation of diverse facilities. System outputs - generally represented as peak incident or reflected overpressure or impulses - are both graphic and analytic and integrate damage threshold data for common construction materials including window glazing. The effects of bomb blasts on humans is estimated in terms of temporary and permanent hearing damage, lung damage (lethality) and whole body translation injury. The software system has been used in the field in providing bomb defense services to a number of commercial clients since July of 1986. In addition to the design of siting, screening and hardening components of bomb defense programs, the software has proven very useful in post-incident analysis and repair scenarios and as a teaching tool for bomb defense training

  11. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  12. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  13. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  14. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    Science.gov (United States)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  15. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.;

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  16. Radiation exposure and circulatory disease risk: Hiroshima and Nagasaki atomic bomb survivor data, 1950-2003

    OpenAIRE

    Shimizu, Yukiko; Kodama, Kazunori; Nishi, Nobuo; Kasagi, Fumiyoshi; Suyama, Akihiko; Soda, Midori; Grant, Eric J; Sugiyama, Hiromi; Sakata, Ritsu; Moriwaki, Hiroko; Hayashi, Mikiko; Konda, Manami; Shore, Roy E.

    2010-01-01

    Objective To investigate the degree to which ionising radiation confers risk of mortality from heart disease and stroke. Design Prospective cohort study with more than 50 years of follow-up. Setting Atomic bomb survivors in Hiroshima and Nagasaki, Japan. Participants 86 611 Life Span Study cohort members with individually estimated radiation doses from 0 to >3 Gy (86% received

  17. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  18. Epidemiological research on radiation-induced cancer in atomic bomb survivors

    Science.gov (United States)

    Ozasa, Kotaro

    2016-01-01

    The late effects of exposure to atomic bomb radiation on cancer occurrence have been evaluated by epidemiological studies on three cohorts: a cohort of atomic bomb survivors (Life Span Study; LSS), survivors exposed in utero, and children of atomic bomb survivors (F1). The risk of leukemia among the survivors increased remarkably in the early period after the bombings, especially among children. Increased risks of solid cancers have been evident since around 10 years after the bombings and are still present today. The LSS has clarified the dose–response relationships of radiation exposure and risk of various cancers, taking into account important risk modifiers such as sex, age at exposure, and attained age. Confounding by conventional risk factors including lifestyle differences is not considered substantial because people were non-selectively exposed to the atomic bomb radiation. Uncertainty in risk estimates at low-dose levels is thought to be derived from various sources, including different estimates of risk at background levels, uncertainty in dose estimates, residual confounding and interaction, strong risk factors, and exposure to residual radiation and/or medical radiation. The risk of cancer in subjects exposed in utero is similar to that in LSS subjects who were exposed in childhood. Regarding hereditary effects of radiation exposure, no increased risk of cancers associated with parental exposure to radiation have been observed in the F1 cohort to date. In addition to biological and pathogenetic interpretations of the present results, epidemiological investigations using advanced technology should be used to further analyze these cohorts. PMID:26976124

  19. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  20. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  1. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  2. Mortality of atomic bomb survivors in Nagasaki

    International Nuclear Information System (INIS)

    We analyzed the risk in 2,743 atomic bomb survivors by using a new dosimetry system. From the database, we selected 2,743 exposed persons and a total of three times 2,743 age-matched controls who were living far from the center of the A-bomb radiation in Nagasaki at the time of the explosion and who were still alive in 1971. The mortalities from all causes for male subjects exposed were slightly lower than, or almost equal to, those of unexposed persons. Death from cancer, however, increased in both sexes after all levels of irradiation except in males exposed to 0.01-0.49 Gy. In males, the risk was showed significant reduction in death from all diseases other than cancer classified according to 0.31-0.40 Gy. (author)

  3. Mortality of atomic bomb survivors in Nagasaki

    Energy Technology Data Exchange (ETDEWEB)

    Mine, Mariko; Honda, Sumihisa; Kondo, Hisayoshi; Yokota, Kenichi; Tomonaga, Masao; Okumura, Yutaka [Atomic Bomb Disease Institute, Nagasaki Univ. School of Medicine, Nagasaki (Japan)

    1999-09-01

    We analyzed the risk in 2,743 atomic bomb survivors by using a new dosimetry system. From the database, we selected 2,743 exposed persons and a total of three times 2,743 age-matched controls who were living far from the center of the A-bomb radiation in Nagasaki at the time of the explosion and who were still alive in 1971. The mortalities from all causes for male subjects exposed were slightly lower than, or almost equal to, those of unexposed persons. Death from cancer, however, increased in both sexes after all levels of irradiation except in males exposed to 0.01-0.49 Gy. In males, the risk was showed significant reduction in death from all diseases other than cancer classified according to 0.31-0.40 Gy. (author)

  4. Risk of cancer among atomic bomb survivors.

    Science.gov (United States)

    Shimizu, Y; Kato, H; Schull, W J

    1991-12-01

    This report describes the risk of cancer and in particular cancers other than leukemia among the survivors of the atomic bombing of Hiroshima and Nagasaki. Attention focuses primarily on the risk of death from cancer among individuals in the Life Span Study sample of the Radiation Effect Research Foundation in the period 1950-1985 based on the recently revised dosimetry, termed the DS86 doses. Mortality from malignant tumors is increased among A-bomb survivors as a late effect of A-bomb radiation. Besides the well-known increase of leukemia, there also has been demonstrated increase of cancer of the lung, breast, esophagus, stomach, colon, ovary, urinary bladder, thyroid, and of multiple myeloma, but no increase has yet been observed in mortality from cancer of the rectum, gallbladder, pancreas, prostate and uterus, and of malignant lymphoma. The pattern of appearance over time of radiation-induced cancer other than leukemia differs from that of leukemia. In general, radiation-induced solid cancer begins to appear after attaining the age at which the cancer is normally prone to develop (so-called cancer age), and continues to increase proportionately with the increase in mortality of the control group as it ages. Sensitivity to radiation, in terms of cancer induction, is higher for persons who were young at the time of the bomb (ATB) in general than for those who were older ATB. Furthermore, susceptibility to radiation-induced cancer tends to be higher in pre- than in post-natally exposed survivors (at least those exposed as adults). Other radiation effect modifiers and the shape of the dose response curve will also be discussed. PMID:1823367

  5. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  6. Breast cancer among atomic bomb survivors

    International Nuclear Information System (INIS)

    Three hundred and sixty cases of breast cancer were collected from among the 63,000 female members of the RERF extended Life Span Study sample which includes atomic bomb exposed women and controls of Hiroshima and Nagasaki. The relationship of these breast cancer cases to A-bomb radiation was sought, and in studying 5-year survival, the following conclusions were obtained concerning its relationship to histopathological findings: 1) The prognosis of the 50+ rad high dose group is the best, followed by the nonexposed group and the low dose group; 2) The apparently better survival may be due, at least in part, to the fact that this group is heavily weighted in favor of those who were younger at the time of the bomb; 3) There is no specificity of the histologic type of breast cancer in the survivors by dose; 4) Nor, is any significant difference observed in the distribution of tumor size and histological grade; 5) Cellular reaction is significantly marked at the stroma of carcinoma tissue in the high dose group; 6) Immune reaction is considered to be strong at the affected site of breast cancer in the high dose group and this can be regarded as a finding suggestive of good prognosis; 7) Further extended studies are therefore warranted. (author)

  7. New dosimetry of atomic bomb radiations.

    Science.gov (United States)

    Fry, R J; Sinclair, W K

    1987-10-10

    The reassessment of the radiation dosimetry from the Hiroshima and Nagasaki atomic bombs is almost complete. Since atomic bomb survivors provide a major source of data for estimates of risk of cancer induction by radiation the impact of the new dosimetry on risk estimates and radiation protection standards is important. The changes include an increase of about 20% in the estimated yield of the Hiroshima bomb and a reduction in the estimated doses from neutrons in both cities. The estimated neutron dose for Hiroshima is about 10% of the previous estimate. The neutron doses are now so small that direct estimates of neutron relative biological effectiveness may be precluded or be much more difficult. There is little change in most of the gamma ray organ doses because various changes in the new estimates tend to cancel each other out. The new estimate of the attenuation of the free-in-air kerma by the walls of the homes is about twice that used in the previous dosimetry. But the transmission of gamma radiation to the deep organs such as bone marrow is significantly greater than earlier estimates. Probably future risk estimates for radiogenic cancer will be somewhat higher because of both the new dosimetry and the new cancer mortality data. New risk estimates should be available in 1988. PMID:2889042

  8. Signs of a Heart Attack

    Science.gov (United States)

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  9. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    OpenAIRE

    Honglong Chen; Wei Lou; Xice Sun; Zhi Wang

    2010-01-01

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against worm...

  10. Migraineurs with exercise-triggered attacks have a distinct migraine

    OpenAIRE

    Koppen, Hille; van Veldhoven, Peter LJ

    2013-01-01

    Background Sport as a migraine trigger has been reported, but extensive information on these triggered attacks and the patients experiencing these attacks is lacking. Goal of this study was to investigate the lifetime prevalence of exercise triggered migraine attacks in migraine patients and if patients with exercise triggered attacks experience specific prodromal or ictal migraine symptoms. Methods 103 consecutive migraine patients seen during their first visit at a Dutch headache clinic wer...

  11. Why the USA dropped atomic bombs on Japanese cities

    International Nuclear Information System (INIS)

    Why did the USA use atomic bombs on Japanese cities? Because, by summer 1945, the earlier morality that said you should not kill non-combatants had been chipped away, then eroded, and ultimately destroyed by World War II. After Hitler's viciousness, after the Japanese rape of Nanjing, after the killings in Manila, after the savagery through Asia, after Dresden, after Hamburg, after Tokyo, Osaka, Kobe, Nagoya - over sixty Japanese cities had been bombed before Hiroshima, Hiroshima was inevitable, easy, comfortable, virtually automatic. The transformation was not the use of bomb, but the bombing of non-combatants - massively, intentionally. There was probably a desire to revenge, as well. In addition, there was an expectation that the bombs used on japan would also intimidate the Soviet Union but that was not crucial. Any nation that had the capacity would have used the bomb in righteousness and comfort, self-conceived dignity, amid popular applause from its electorate people

  12. Influence on social life of atomic bomb, chapter 3

    International Nuclear Information System (INIS)

    Atomic bombs, for the first time in human history, were dropped on Hiroshima in August 6, and on Nagasaki on August 9, 1945. Though the powers of these bombs were far small as compared with those of present day nuclear weapons, the atomic bombs claimed many lives instantaneously, damaged human bodies, and destroyed all objects, annihilating the urban areas. Even today, the dreadful consequences of the bombings still remain in both body and mind of the victims. Meanwhile, the experiences of atomic bomb disasters are fading constantly. In order to maintain the vivid information, in Part 3 ''Influence on social life'', the following matters are described: relations of the atomic bombings to society; destroyed societies such as disruption of regional societies and loss of wealth; life of the sufferers such as occupation, marriage, hardships of life, orphans, livelihood variation, and suffering of foreigners; and mental process of the sufferers. (J.P.N.)

  13. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  14. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  15. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for...

  16. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  17. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  18. Mortality of Atomic Bomb Survivors in Nagasaki 1

    OpenAIRE

    Mine, Mariko; Okumura, Yutaka; Kishikawa, Masao

    1991-01-01

    In 1945, an atomic bomb was exploded on Nagasaki. The Scientific Data Center for the Atomic Bomb Disaster was founded in Nagasaki University to analyse radiation effects on atomic bomb survivors. There were about 110,000 victims registered living in Nagasaki as of 1968. Since then, data of 2,000,000 items of health examination has been stored in the computer in the Scientific Data Center. The analysed results of the mortality, the survival and the risk estimation were presented.

  19. Optimal Gliding Guidance of Vertical Plane for Standoff Released Guided Bomb Unit

    Institute of Scientific and Technical Information of China (English)

    HOU Ming-shan

    2008-01-01

    Optimal gliding guidance for a guided bomb unit in the vertical plane is studied based on nonlinear dynamics and kinematics. The guidance law is designed under minimum energy loss index. To avoid the complexity in solving two-point-boundary-value problems, the steady-state solutions of the adjoint states in regular equations are suggested to be used. With these considerations, a quasi-closed, optimal gliding guidance law is obtained. The guidance law is described by the angle of attack in a simple nonlinear equation. An iterative computation method can be easily used to get the optimal angle of attack. The further simplified direct computation algorithm for the optimal angle of attack is also given. The guidance properties are compared with those of maximum lift-to-drag angle of attack control. The simulation results demonstrate that the quasi-closed, optimal gliding guidance law can improve the gliding phase terminal performance with significant increase in the altitude and much little decrease in the speed.

  20. 36Cl bomb peak: comparison of modeled and measured data

    Directory of Open Access Journals (Sweden)

    A. Eichler

    2009-06-01

    Full Text Available The extensive nuclear bomb testing of the fifties and sixties and the final tests in the seventies caused a strong 36Cl peak that has been observed in ice cores world-wide. The measured 36Cl deposition fluxes in eight ice cores (Dye3, Fiescherhorn, Grenzgletscher, Guliya, Huascarán, North GRIP, Inylchek (Tien Shan and Berkner Island were compared with an ECHAM5-HAM general circulation model simulation (1952–1972. We find a good agreement between the measured and the modeled 36Cl fluxes assuming that the bomb test produced global 36Cl input was ~80 kg. The model simulation indicates that the fallout of the bomb test produced 36Cl is largest in the subtropics and mid-latitudes due to the strong stratosphere-troposphere exchange. In Greenland the 36Cl bomb signal is quite large due to the relatively high precipitation rate. In Antarctica the 36Cl bomb peak is small but is visible even in the driest areas. The model suggests that the large bomb tests in the Northern Hemisphere are visible around the globe but the later (end of sixties and early seventies smaller tests in the Southern Hemisphere are much less visible in the Northern Hemisphere. The question of how rapidly and to what extent the bomb produced 36Cl is mixed between the hemispheres depends on the season of the bomb test. The model results give an estimate of the amplitude of the bomb peak around the globe.

  1. 36Cl bomb peak: comparison of modeled and measured data

    Directory of Open Access Journals (Sweden)

    A. Eichler

    2009-01-01

    Full Text Available The extensive nuclear bomb testing of the fifties and sixties and the final tests in the seventies caused a strong 36Cl peak that has been observed in ice cores world-wide. The measured 36Cl deposition fluxes in eight ice cores (Dye3, Fiescherhorn, Grenzgletscher, Guliya, Huascarán, North GRIP, Inylchek (Tien Shan and Berkner Island were compared with an ECHAM5-HAM general circulation model simulation (1952–1972. We find a good agreement between the measured and the modeled 36Cl fluxes assuming that the bomb test produced global 36Cl input was ~80 kg. The model simulation indicates that the fallout of the bomb test produced 36Cl is largest in the subtropics and mid-latitudes due to the strong stratosphere-troposphere exchange. In Greenland the 36Cl bomb signal is quite large due to the relatively high precipitation rate. In Antarctica the 36Cl bomb peak is small but is visible even in the driest areas. The model suggests that the large bomb tests in the Northern Hemisphere are visible around the globe but the later (end of sixties and early seventies smaller tests in the Southern Hemisphere are much less visible in the Northern Hemisphere. The question of how rapidly and to what extent the bomb produced 36Cl is mixed between the hemispheres depends on the season of the bomb test. The model results give an estimate of the amplitude of the bomb peak around the globe.

  2. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  3. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  4. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  5. The Japanese aerial attack on Hanford Engineer Works

    Science.gov (United States)

    Clark, Charles W.

    The day before the Pearl Harbor attack, December 6, 1941, the University of Chicago Metallurgical Laboratory was given four goals: design a plutonium (Pu) bomb; produce Pu by irradiation of uranium (U); extract Pu from the irradiated U; complete this in time to be militarily significant. A year later the first controlled nuclear chain reaction was attained in Chicago Pile 1 (CP-1). In January 1943, Hanford, WA was chosen as the site of the Pu factory. Neutron irradiation of 238U was to be used to make 239Pu. This was done by a larger version of CP-1, Hanford Reactor B, which went critical in September 1944. By July 1945 it had made enough Pu for two bombs: one used at the Trinity test in July; the other at Nagasaki, Japan in August. I focus on an ironic sidelight to this story: disruption of hydroelectric power to Reactor B by a Japanese fire balloon attack on March 10, 1945. This activated the costly coal-fired emergency backup plant to keep the reactor coolant water flowing, thwarting disaster and vindicating the conservative design of Hanford Engineer Works. Management of the Hanford Engineer Works in World War II, H. Thayer (ASCE Press 1996).

  6. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    OpenAIRE

    Yi-Hsun Wang; Ching-Hao Mao; Hahn-Ming Lee

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of...

  7. Relationship between epidemiological factors and mortality among atomic bomb survivors, Hiroshima and Nagasaki

    International Nuclear Information System (INIS)

    In 1965, mail survey on environmental and individual factors was performed for 11,724 male a-bomb survivors, with the age of 40 to 69, selected from the group subjected to joint JNIH-ABCC investigation of life span in a-bomb survivors. During 10 years after the mail survey, 2,834 died. The aim of this mail survey was to clarify the relationship between the mortality and specific environmental, social, and economic factors. There was a relationship between high mortality and low social and economical condition for all causes of death combined, cerebral vascular diseases, all malignant neoplasms, and gastric cancer. Smoking was a significant risk factor to all causes of death combined, ischemic heart diseases, all malignant neoplasms, gastric, tracheal, bronchial, and lung cancers. The mortality due to cardiovascular diseases was significantly higher in a-bomb survivors with heavy weight. The mortality due to all causes of death combined, all malignant neoplasms, lung, and gastric cancer tended to become higher in a-bomb survivors who got married early. (Tsunoda, M.)

  8. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  9. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  10. Some investigations on the pitting attack of magnesium and its alloys; Contribution a l'etude de la corrosion par piqures du magnesium et de ses alliages

    Energy Technology Data Exchange (ETDEWEB)

    Blanchet, J. [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1964-03-01

    The pitting attack of magnesium and its alloys has been studied by means of potentio-kinetic polarisation curves; the following parameters have been considered: structural state and composition of the metal, chloride concentration and pH of the medium. The electrochemical data obtained demonstrate that when pH = 12, a localized corrosion might appear as soon as a 10{sup -3} M NaCl concentration is reached; on the other hand, when pH = 13, a much higher concentration (five times) has no effect. In the same conditions, the coupling of magnesium with various noble materials (graphite, platinum, 18/10 stainless steel) also dramatically increases its susceptibility to pitting, but only when chloride ions are present in the solution. Usual corrosion tests have confirmed these electrochemical results. A micrographic study of the pits has shown that their morphology is connected with the metallurgical state of the specimens. (author) [French] La corrosion par piqures du magnesium est etudiee a l'aide des courbes de polarisation potentiocinetiques en fonction des parametres suivants etat structural et composition du metal, concentration en chlorure et pH de la solution. De ces mesures electrochimiques on deduit qu'a pH 12, des la concentration 10{sup -3} M en NaCl, il existe un risque de corrosion localisee, tandis qu'a pH 13 une concentration cinq fois plus forte doit etre sans effet. Dans les memes conditions on montre que le couplage du magnesium avec differents elements nobles (graphite, platine, acier inoxydable 18/10) accroit fortement sa susceptibilite a l'attaque par piqures, excepte dans les solutions exemptes d'ions chlorures. Des essais classiques de corrosion dans les differentes solutions envisagees precedemment confirment les resultats de cette etude electrochimique. L'examen micrographique des piqures montre que leur morphologie est liee a l'etat metallurgique des echantillons. (auteur)

  11. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  12. The Manhattan Project: Making the atomic bomb

    Energy Technology Data Exchange (ETDEWEB)

    Gosling, F.G.

    1994-09-01

    This article is a short history of the origins and development of the American atomic bomb program during World War II. Beginning with the scientific developments of the pre-war years, the monograph details the role of US government in conducting a secret, nationwide enterprise that took science from the laboratory and into combat with an entirely new type of weapon. The monograph concludes with a discussion of the immediate postwar period, the debate over the Atomic Energy Act of 1946, and the founding of the Atomic Energy Commission.

  13. CALCULATION OF PER PARCEL PROBABILITY FOR DUD BOMBS IN GERMANY

    Directory of Open Access Journals (Sweden)

    S. M. Tavakkoli Sabour

    2014-10-01

    Full Text Available Unexploded aerial Bombs, also known as duds or unfused bombs, of the bombardments in the past wars remain explosive for decades after the war under the earth’s surface threatening the civil activities especially if dredging works are involved. Interpretation of the aerial photos taken shortly after bombardments has been proven to be useful for finding the duds. Unfortunately, the reliability of this method is limited by some factors. The chance of finding a dud on an aerial photo depends strongly on the photography system, the size of the bomb and the landcover. On the other hand, exploded bombs are considerably better detectable on aerial photos and confidently represent the extent and density of a bombardment. Considering an empirical quota of unfused bombs, the expected number of duds can be calculated by the number of exploded bombs. This can help to have a better calculation of cost-risk ratio and to classify the areas for clearance. This article is about a method for calculation of a per parcel probability of dud bombs according to the distribution and density of exploded bombs. No similar work has been reported in this field by other authors.

  14. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  15. Symptoms of Depression in Israeli Adolescents Following a Suicide Bombing: The Role of Gender

    Science.gov (United States)

    Barile, John P.; Grogan, Kathryn E.; Henrich, Christopher C.; Brookmeyer, Kathryn A.; Shahar, Golan

    2012-01-01

    This report investigated the potential role of gender in moderating the effects of terror attack exposure on depression symptoms in middle school students from Dimona, Israel (N = 90). Specifically, the effects of three aspects of terror attacks were investigated: physical exposure, relational exposure, and media exposure. Ninety early adolescents…

  16. H-alpha features with hot onsets. I. Ellerman bombs

    CERN Document Server

    Rutten, R J

    2016-01-01

    Ellerman bombs are transient brightenings of the wings of the Balmer lines that uniquely mark reconnection in the solar photosphere. They are also bright in strong Ca II and ultraviolet lines and in ultraviolet continua, but they are not visible in the optical continuum and the Na I D and Mg I b lines. These discordant visibilities invalidate all published Ellerman bomb modeling. I argue that the assumption of Saha-Boltzmann lower-level populations is informative to estimate bomb-onset opacities for these diverse diagnostics, even and especially for H-alpha, and employ such estimates to gauge the visibilities of Ellerman bomb onsets in all of them. They constrain Ellerman bomb formation to temperatures 10,000 - 20,000 K and hydrogen densities around 10^15 cm^-3. Similar arguments likely hold for H-alpha visibility in other transient phenomena with hot and dense onsets.

  17. Recovery of infrastructure networks after localised attacks

    Science.gov (United States)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  18. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  19. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  20. A-bomb and skin injury

    International Nuclear Information System (INIS)

    Injury and influence in the skin given by A-bomb are reviewed from the dermatological aspect. As an acute injury, primary and secondary thermal burns, flash and flame, respectively, are generally caused by high-energy heat. More than 90% people present within 1 km diameter area of the hypocenter died in a week and about 30% of whom did due to burns. Alopecia appeared in those who had been exposed to A-bomb radiation within 2.5 km diameter region of the hypocenter in Hiroshima and Nagasaki, and purpura, an important measure of radiation injury, occurred maximally 20-30 days after explosion in most of those people above. Late injury involves keloid and malignant skin tumor. The former, hypertrophic scar, was seen mainly in the curing process of the burns in 60-80% and was of somewhat different morphology after flash and flame injuries. In 1987, the correlation between the incidence of skin cancer and exposed dose was recognized in 20,348 survivors in Nagasaki. In the period from 1958 to 1987, the incidence of basal cell carcinoma was found increased in the comparative studies of about 90,000 people consisting of survivors and non-exposed control. Skin examination is pointed out from the aspect to be important in those people exposed to the higher radiation dose than general population, like workers in the nuclear power plant and medical field as well as in those enrolled in a nuclear accident. (R.T.)

  1. The genetic effects of the atomic bombs

    International Nuclear Information System (INIS)

    Studies on the genetic effects of the atomic bombs detonated over Hiroshima and Nagasaki have been in progress since 1946. The indicators of potential genetic damage in the children of exposees which have been employed are: (1) untoward pregnancy outcomes (major congenital defect and/or stillbirth and/or neonatal death), (2) death of liveborn infants prior to average age 28.8 years, (3) cancer of onset prior to age 20, (4) sex chromosome aneuploidy, (5) mutations affecting protein electrophoretic mobility and/or activity, (6) chromosomal reciprocal translocations, (7) sex-ratio in the children of exposed mothers, and (8) physical development at birth, at 9-months, and at school age. There is no statistically significant effect of parental exposure to the bombs on any of these indicators. The net regression of indicator(s) on dose is, however, positive. On the basis of these regressions and assumptions concerning the contribution of spontaneous mutation to the indicator values in the controls, the gametic doubling dose of acute ionizing radiation under these circumstances is estimated to be 2 Sv. With a dose rate factor of 2, which seems appropriate to these circumstances, the doubling dose for chronic radiation is placed at 4 Sv. This is a substantially higher estimate than previous extrapolations to man from murine experiments

  2. Impact on the Japanese atomic bomb survivors of radiation received from the bombs.

    Science.gov (United States)

    Cullings, Harry M

    2014-02-01

    The Radiation Effects Research Foundation (RERF) studies various cohorts of Japanese atomic bomb survivors, the largest being the Life Span Study (LSS), which includes 93,741 persons who were in Hiroshima or Nagasaki at the times of the bombings; there are also cohorts of persons who were exposed in utero and survivors' children. This presentation attempts to summarize the total impact of the radiation from the bombs on the survivors from both an individual perspective (both age-specific and integrated lifetime risk, along with a measure of life expectancy that describes how the risk affects the individual given age at exposure) and a group perspective (estimated numbers of excess occurrences in the cohort), including both early and late effects. As survivors' doses ranged well into the acutely lethal range at closer distances, some of them experienced acute signs and symptoms of radiation exposure in addition to being at risk of late effects. Although cancer has always been a primary concern among late effects, estimated numbers of excess cancers and hematopoietic malignancies in the LSS are a small fraction of the total due to the highly skewed dose distribution, with most survivors receiving small doses. For example, in the latest report on cancer incidence, 853 of 17,448 incident solid cancers were estimated to be attributable to radiation from the bombs. RERF research indicates that risk of radiation-associated cancer varies among sites and that some benign tumors such as uterine myoma are also associated with radiation. Noncancer late effects appear to be in excess in proportion to radiation dose but with an excess relative risk about one-third that of solid cancer and a correspondingly small overall fraction of cases attributable to radiation. Specific risks were found for some subcategories, particularly circulatory disease, including stroke and precedent conditions such as hypertension. Radiation-related cataract in the atomic bomb survivors is well known

  3. Longitudinal trends of total white blood cell and differential white blood cell counts of atomic bomb survivors.

    Science.gov (United States)

    Hsu, Wan-Ling; Tatsukawa, Yoshimi; Neriishi, Kazuo; Yamada, Michiko; Cologne, John; Fujiwara, Saeko

    2010-01-01

    In studying the late health effects of atomic-bomb (A-bomb) survivors, earlier findings were that white blood cell (WBC) count increased with radiation dose in cross-sectional studies. However, a persistent effect of radiation on WBC count and other risk factors has yet to be confirmed. The objectives of the present study were 1) to examine the longitudinal relationship between A-bomb radiation dose and WBC and differential WBC counts among A-bomb survivors and 2) to investigate the potential confounding risk factors (such as age at exposure and smoking status) as well as modification of the radiation dose-response. A total of 7,562 A-bomb survivors in Hiroshima and Nagasaki were included in this study from 1964-2004. A linear mixed model was applied using the repeated WBC measurements. During the study period, a secular downward trend of WBC count was observed. Radiation exposure was a significant risk factor for elevated WBC and differential WBC counts over time. A significant increase of WBC counts among survivors with high radiation dose (> 2 Gy) was detected in men exposed below the age of 20 and in women regardless of age at exposure. Effects on WBC of low dose radiation remain unclear, however. Cigarette smoking produced the most pronounced effect on WBC counts and its impact was much larger than that of radiation exposure. PMID:20543527

  4. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  5. Cardiovascular disease mortality of A-bomb survivors and the healthy survivor selection effect.

    Science.gov (United States)

    Schöllnberger, H; Ozasa, K; Neff, F; Kaiser, J C

    2015-09-01

    The latest A-bomb survivor data for cardiovascular diseases are analysed to investigate whether in the first years after the bombings the baseline rates of proximal survivors were markedly different compared with those of the distal survivors. This phenomenon relates to a healthy survivor selection effect. This question is important for the decision whether to include or exclude the early years of follow-up when analysing the biological effects from acute low and high dose exposures following the nuclear weapons explosions in Hiroshima and Nagasaki. The present study shows that for cerebrovascular diseases and heart diseases the baseline rates are not significantly different in the first two decades of follow-up. Thus, for these two detrimental health outcomes, there is no need to exclude distal survivors and the first decades of follow-up time when investigating the shapes of the related dose-responses. PMID:25948837

  6. Neutron and gamma ray calculation for Hiroshima-type atomic bomb

    Energy Technology Data Exchange (ETDEWEB)

    Hoshi, Masaharu; Endo, Satoru; Takada, Jun [Hiroshima Univ. (Japan). Research Inst. for Radiation Biology and Medicine; Iwatani, Kazuo; Oka, Takamitsu; Shizuma, Kiyoshi; Fujita, Shoichiro; Hasai, Hiromi

    1998-03-01

    We looked at the radiation dose of Hiroshima and Nagasaki atomic bomb again in 1986. We gave it the name of ``Dosimetry System 1986`` (DS86). We and other groups have measured the expose dose since 1986. Now, the difference between data of {sup 152}Eu and the calculation result on the basis of DS86 was found. To investigate the reason, we carried out the calculations of neutron transport and neutron absorption gamma ray for Hiroshima atomic bomb by MCNP3A and MCNP4A code. The problems caused by fast neutron {sup 32}P from sulfur in insulator of pole. To correct the difference, we investigated many models and found agreement of all data within 1 km. (S.Y.)

  7. Foreign bodies radiographically-demonstrated in atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Tamura, S.; Onitsuka, H.; Lee, K.; Shimizu, Y.; Russell, W.J.

    1978-08-25

    The prevalence of roentgenologically-detected foreign bodies among atomic bomb (A-bomb) survivors was studied as an indicator of the A-bomb blast effects. Acupuncture was studied as an indicator of A-bomb-related abnormalities for which it was administered. All Adult Health Study subjects' roentgenograms demonstrating foreign bodies were reviewed. The frequency of glass and metal, and acupuncture needles were analyzed by distance from hypocenters, sex, age, body sites involved; and the subjects' shielding at the times of the A-bombs. The presence of glass fragments correlated closely with distance from hypocenter, heavy shielding from the A-bombs, and with adulthood, and they were more frequent in the chest than hand and wrist. Metal foreign bodies were more frequent in the hand and wrist than in the chest, and not associated with distance from hypocenter or heavy shielding. The prevalence of acupuncture needles increased with age, but did not correlate with A-bomb dose.

  8. ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

    Directory of Open Access Journals (Sweden)

    A.MADHURI,

    2010-09-01

    Full Text Available In this paper, we discuss the methods for detecting and preventing the DDoS Attacks and Replay Attacks, which have been posing the problems for the Internet. We explained a scheme AMFDR (AttackPatterns for Marking Filtering DoS and Replay attacks that identifies the attack packets from the packets that are sent by legitimate users and filters the attack packets. A Denial of service attack is generally launched to make a service unavailable even to an unauthorized user. If this attack uses many computers across the world, it is called Distributed Denial of service attack. Replay attack is retransmission of a data transmission which used to gain authentication in a fraudulent manner. These replayed packets or attack packets are identified. This scheme is less expensive and the implementation of this scheme needs minimal interaction with routers. The scheme is like firewall system, so that the occurrence of an attack is recognized quickly and a punitive action is taken without any loss genuine packets.

  9. Radiation and smoking effects on lung cancer incidence among atomic-bomb survivors

    OpenAIRE

    Furukawa, Kyoji; Preston, Dale; Lönn, Stefan; Funamoto, Sachiyo; Yonehara, Shuji; Matsuo, Takeshi; Egawa, Hiromi; Tokuoka, Shoji; Ozasa, Kotaro; Kasagi, Fumiyoshi; Kodama, Kazunori; Mabuchi, Kiyohiko

    2010-01-01

    While radiation increases the risk of lung cancer among members of the Life Span Study (LSS) cohort of atomic-bomb survivors, there are still important questions about the nature of its interaction with smoking, the predominant cause of lung cancer. Among 105,404 LSS subjects, 1,803 primary lung cancer incident cases were identified for the period 1958–1999. Individual smoking history information and the latest radiation dose estimates were utilized to investigate the joint effects of radiati...

  10. Chain reaction. History of the atomic bomb

    International Nuclear Information System (INIS)

    Henri becquerel tracked down in 1896 a strange radiation, which was called radioactivity by Marie Curie. In the following centuries German scientists Max Planck, Albert Einstein and Werner Heisenberg presented fundamental contributions to understand processes in the atomic nucleus. At Goettingen, center of the international nuclear physics community, the American student J. Robert Oppenheimer admit to this physical research. In the beginning of 1939 the message of Otto Hahns' nuclear fission electrified researchers. The first step, unleashing atomic energy, was done. A half year later the Second World War begun. And suddenly being friend with and busily communicating physicians were devided into hostile power blocs as bearers of official secrets. The author tells in this exciting book the story of the first atomic bomb as a chain reaction of ideas, discoveries and visions, of friendships, jealousy and intrigues of scientists, adventurers and genius. (orig./GL)

  11. Radioepidemiology of the A-bomb survivors.

    Science.gov (United States)

    Schull, W J

    1996-06-01

    Estimation of the risk of cancer and other health effects following exposure to the atomic bombing of Hiroshima and Nagasaki remains largely empirical, and the models used to adduce risk incorporate few, if any, of the advances in molecular biology of the past decade or so. These facts compromise the estimation of risk where the epidemiologic data are weakest, namely, at low doses and dose rates. Although the risk estimates may be sufficient for regulatory purposes, without a better understanding of the molecular and cellular events ionizing radiation initiates or promotes, it seems unlikely that the estimates will be as intellectually satisfying as they might be. Nor will the situation improve further without attention to the identification and estimation of the effects of those host and environmental factors that enhance or diminish risk of cancer or the effects on the developing brain. PMID:8635903

  12. Aging studies in atomic bomb survivors

    International Nuclear Information System (INIS)

    Although the studies of the effect of ionizing radiation on atomic bomb survivors have not produced any evidence of radiation-induced aging, there have been studies on experimental animals and man which suggest accelerated aging after exposure to ionizing radiation. To determine if certain physiologic functions could be related to exposure to ionizing radiation, a battery of age-related tests was given at the time of the physical examinations at ABCC. Some 11,351 persons were given these non-invasive age-related tests. The results were essentially negative. Until a satisfactory operational definition of biologic or physiologic age is developed, the administration of functional tests as a measure of aging does not seem justified. (author)

  13. Simultaneous Attacks by Terrorist Organisations

    Directory of Open Access Journals (Sweden)

    Kathleen Deloughery

    2013-12-01

    Full Text Available While terror attacks that are a part of a coordinated effort receive attention in the popular media, they have not received much attention in the academic literature. The decision to carry out simultaneous attacks should be examined as one of the choices a terrorist organisation makes about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single attack can explain why groups would use this method. Up to one quarter of all attacks coded in two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical analysis shows simultaneous attacks are more likely to be successful and cause more fatalities, though not in a one-to-one fashion. These results underline the importance of considering simultaneous attacks in empirical analysis.

  14. CD14 and IL18 gene polymorphisms associated with colorectal cancer subsite risks among atomic bomb survivors

    OpenAIRE

    Hu, Yiqun; Yoshida, Kengo; Cologne, John B.; Maki, Mayumi; Morishita, Yukari; Sasaki, Keiko; Hayashi, Ikue; Ohishi, Waka; Hida, Ayumi; Kyoizumi, Seishi; Kusunoki, Yoichiro; Tokunaga, Katsushi; Nakachi, Kei; Hayashi, Tomonori

    2015-01-01

    Colorectal cancer (CRC) is a common malignancy worldwide, and chronic inflammation is a risk factor for CRC. In this study, we carried out a cohort study among the Japanese atomic bomb (A-bomb) survivor population to investigate any association between immune- and inflammation-related gene polymorphisms and CRC. We examined the effects of six single-nucleotide polymorphisms of CD14 and IL18 on relative risks (RRs) of CRC. Results showed that RRs of CRC, overall and by anatomic subsite, signif...

  15. LITERATURE SURVEY ON WORMHOLE ATTACK

    OpenAIRE

    Avinash S. Bundela

    2015-01-01

    Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been identified & corresponding solutions have been proposed. These attacks are caused by the malicious node hence ad hoc wireless network is unprotected from the attacks of the malicious node. Between all these attacks the wormhole att ...

  16. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  17. Radiological preparedness in the case of a terrorist attack or an accident

    International Nuclear Information System (INIS)

    During the Cold War, every information about weapons of mass destruction was treated as top secret, regardless of whether the information concerned friend or foe. The most serious threat in our post Cold War era are terrorist radiological dispersal devices. Dirty nukes are what you may choose to build if you're unable to create a real nuclear bomb, i.e. one whose explosion is based on a nuclear reaction. A dirty bomb is a conventional explosive salted with radioactive isotopes in order to spew out that nuclear material and contaminate a wide area. The military usefulness of such devices have always been in dispute. In fact, the TNT in such a bomb may still be more dangerous than the nuclear material. Its destructive power would really depend on the size of the conventional bomb, and the volume and nature of nuclear material. This paper addresses the possibilities of decontamination and preparedness in the case of a terrorist attack or accident.(author)

  18. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  19. Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks

    OpenAIRE

    Maynard, Peter; McLaughlin, Kieran; Haberler, Berthold

    2014-01-01

    This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity dis...

  20. Attack on a classical analogue of the Dunjko, Wallden, Kent and Andersson quantum digital signature protocol

    OpenAIRE

    Newton, Derrick

    2015-01-01

    A quantum digital signature (QDS) protocol is investigated in respect of an attacker who can impersonate other communicating principals in the style of Lowe's attack on the Needham-Schroeder public-key authentication protocol. A man-in-the-middle attack is identified in respect of a classical variant of the protocol and it is suggested that a similar attack would be effective against the QDS protocol. The attack has been confirmed through initial protocol modelling using a automated theorem p...

  1. Clinical survey of blood dyscrasias among Hiroshima A-bomb survivors by periodical health examination, (6)

    International Nuclear Information System (INIS)

    Serum ferritin was determined in A-bomb survivors, and its significance was evaluated. A low-ferritin group included many of the females under the age of 50, who mostly had iron deficient anemia. A high-ferritin group included many older-aged A-bomb survivors who had secondary anemia due to hemochromatosis, paroxismal nocturnal hemoglobinuria (PNH), and multiple myeloma. Secondary anemia due to hemochromatosis, PNH, leukemia, and sideroblastic anemia was detected in those who were old and had underlying moderate or severe anemia with a high ferritin level. As the results of this investigation, blood examination combined with serum ferritin determination is valuable for diagnosis of anemia and detection of underlying diseases. (Ueda, J.)

  2. Circular asymmetry of cancer mortality in Hiroshima and Nagasaki atomic bomb survivors

    International Nuclear Information System (INIS)

    Data on Hiroshima and Nagasaki atomic bomb survivors are used to investigate, for each city, possible circular asymmetry of cancer mortality around the hypocenter. Using the Cox regression method, and controlling for age at the time of the bomb, sex, follow-up year, distance from hypocenter, and type of shielding, it is found that cancer mortality in Hiroshima was significantly higher in the westerly direction from the hypocenter. Mortality from stomach cancer, leukemia, and colon cancer was higher in the westerly direction. In Nagasaki also cancer mortality, notably lung cancer mortality, was significantly higher in the westerly direction. Discussed are possible sources of the asymmetry, particularly the possibilities of asymmetry of epidemiologic variables and of radiation exposure, and indications for future work. (author)

  3. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  4. Perfection and the Bomb: Nuclear Weapons, Teleology, and Motives.

    Science.gov (United States)

    Brummett, Barry

    1989-01-01

    Uses Kenneth Burke's theory of perfection to explore the vocabularies of nuclear weapons in United States public discourse and how "the Bomb" as a God term has gained imbalanced ascendancy in centers of power. (MS)

  5. Teaching and Learning Multiple Perspectives: The Atomic Bomb.

    Science.gov (United States)

    Doppen, Frans H.

    2000-01-01

    Explores how historical empathy can give students a richer understanding of the past, focusing on the development of the students' historical understanding through an analysis of 18 documents on President Truman's decision to use the atomic bomb against Japan. (CMK)

  6. Lung cancer incidence among A-bomb survivors in Hiroshima and Nagasaki, 1950 - 80

    International Nuclear Information System (INIS)

    The incidence of lung cancer during 1950 - 80 in a cohort of Japanese atomic bomb survivors and controls was investigated. A total of 1,057 cases were identified; 608 of these diagnoses were based on some form of histopathologic examination, and 442 were confirmed by the present investigators. The distributions of histological types varied significantly between the sexes (p < .001), with adenocarcinoma more frequent among women and epidermoid and small cell carcinoma more frequent among men. The distributions of primary sites did not differ significantly between the sexes. The relative risk (RR) of lung cancer increased significantly with A-bomb radiation dose (p < .0001); based on tentative 1965 dose estimates as revised in 1978 (T65DR) and a linear RR model, the estimated RR at 100 rad (± SE) is 1.41 ± 0.09. Among Hiroshima survivors the women experienced radiation-related excess RR nearly twice as great as men (p = .06). RR increased with decreasing age at the time of bombing (p = .07), and after allowing for this effect, there was no significant evidence that RR varied systematically with attained age. Small cell carcinoma displayed somewhat greater sensitivity to radiation than did adenocarcinoma or epidermoid carcinoma; however the variation between the histology-specific RR functions was not statistically significant (p = .44). (author)

  7. Details of Nazis' A-Bomb program surface

    CERN Multimedia

    Glanz, J

    2002-01-01

    Werner Heisenberg, leader of the Nazi atomic bomb program, revealed the projects existence to Niels Bohr in a meeting in Copenhagen in 1941. But contrary to several historical accounts of the meeting, Heisenberg never expressed moral qualms about building a bomb for Hitler nor hinted that he might be willing to sabotage the project, according to secret documents cited in a London newspaper yesterday (2 pages).

  8. Monitoring exposure to atomic bomb radiation by somatic mutation.

    OpenAIRE

    Akiyama, M.; Kyoizumi, S; Kusunoki, Y; Hirai, Y; Tanabe, K; Cologne, J B

    1996-01-01

    Atomic bomb survivors are a population suitable for studying the relationship between somatic mutation and cancer risk because their exposure doses are relatively well known and their dose responses in terms of cancer risk have also been thoroughly studied. An analysis has been made of erythrocyte glycophorin A (GPA) gene mutations in 1,226 atomic bomb survivors in Hiroshima and Nagasaki. The GPA mutation frequency (Mf) increased slightly but significantly with age at the time of measurement ...

  9. Trash can bomb can fall into the hands of terrorists

    CERN Multimedia

    2001-01-01

    Leading scientists from CERN described how if terrorists were able to get their hands on plutonium or uranium, they would be able to manufacture a 'trash can' nuclear bomb simply by inserting the radioactive material into a normal bomb. Once detonated a large area could be contaminated leading to the immediate deaths of many with many more future casualties due to cancers caused by the radiation.

  10. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  11. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  12. Foreign bodies radiographically demonstrated in atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Tamura, S.; Onitsuka, H.; Lee, K.K.; Shimizu, Y.; Russell, W.J.

    1978-02-01

    The prevalence of roentgenologically-detected foregin bodies among atomic bomb survivors was studied as an indicator of the A-bomb blast effects. Acupuncture was studied as an indicator of possible A-bomb-related abnormalities for which it was administered. All available roentgenograms of Adult Health Study (AHS) subjects which demonstrated foreign bodies were reviewed. The frequency of glass and metal foreign bodies and of acupuncture needles was analyzed in detail. Analyses were made by distance from the hypocenter, sex, age, body sites involved, and shielding at the time of the A-bomb (ATB). The presence of glass fragments correlated closely with distance from the hypocenter, with heavy shielding from the A-bombs, and with adulthood, and they were more frequent in the chest than in the hand and wrist. On the contrary, metal foreign bodies were more frequent in the hand and wrist than in the chest, and were not associated with distance from hypocenter or heavy shielding. The prevalence of acupuncture needles increased with age, but did not correlate with A-bomb dose.

  13. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  14. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  15. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  16. Association of Acute Radiation Syndrome and Rain after the Bombings in Atomic Bomb Survivors.

    Science.gov (United States)

    Ozasa, K; Sakata, R; Cullings, H M; Grant, E J

    2016-06-01

    Acute radiation-induced symptoms reported in survivors after the atomic bombings in Hiroshima and Nagasaki have been suspected to be associated with rain that fell after the explosions, but this association has not been evaluated in an epidemiological study that considers the effects of the direct dose from the atomic bombs and other factors. The aim of this study was to evaluate this association using information from a fixed cohort, comprised of 93,741 members of the Life Span Study who were in the city at the time of the bombing. Information on acute symptoms and exposure to rain was collected in surveys conducted by interviewers, primarily in the 1950s. The proportion of survivors developing severe epilation was around 60% at levels of direct radiation doses of 3 Gy or higher and less than 0.2% at levels <0.005 Gy regardless of reported rain exposure status. The low prevalence of acute symptoms at low direct doses indicates that the reported fallout rain was not homogeneously radioactive at a level sufficient to cause a substantial probability of acute symptoms. We observed that the proportion of reported acute symptoms was slightly higher among those who reported rain exposure in some subgroups, however, suggestions that rain was the cause of these reported symptoms are not supported by analyses specific to the known areas of radioactive fallout. Misclassification of exposure and outcome, including symptoms due to other causes and recall bias, appears to be a more plausible explanation. However, the insufficient and retrospective nature of the available data limited our ability to quantify the attribution to those possible causes. PMID:27223827

  17. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Honglong Chen

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  18. Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures

    CERN Document Server

    Xing, Xinyu; Han, Richard; Liu, Xue; Mishra, Shivakant

    2010-01-01

    Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-on-one via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper presents one of the first investigations of the privacy threats found in such video chat systems, identifying three such threats, namely de-anonymization attacks, phishing attacks, and man-in-the-middle attacks. The paper further describes countermeasures against each of these attacks.

  19. Biomarkers of Radiosensitivity in A-Bomb Survivors Pregnant at the Time of Bombings in Hiroshima and Nagasaki

    OpenAIRE

    Masazumi Akahoshi; Saeko Fujiwara; Kei Nakachi; Yoichiro Kusonoki; Thomas Seed; Yoshiaki Kodama; Eiji Nakashima; Naoko Kamada; Sachiyo Funamoto; Yoshimi Tatsukawa; Miles, Edward F.; Kazuo Neriishi

    2011-01-01

    Purpose. There is evidence in the literature of increased maternal radiosensitivity during pregnancy. Materials and Methods. We tested this hypothesis using information from the atomic-bomb survivor cohort, that is, the Adult Health Study database at the Radiation Effects Research Foundation, which contains data from a cohort of women who were pregnant at the time of the bombings of Hiroshima and Nagasaki. Previous evaluation has demonstrated long-term radiation dose-response effects. Results...

  20. Detecting and Localizing Wireless Network Attacks Techniques

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  1. The diagnosis of transient ischemic attacks

    NARCIS (Netherlands)

    P.J. Koudstaal (Peter Jan)

    1989-01-01

    textabstractThe diagnosis of transient ischemic attack (TIA) is fraught with difficulty, since the diagnosis rests entirely upon the history of the patient's symptoms and the neurologist's skill in questioning the patient. The aim of this thesis is to investigate various measures to improve the reli

  2. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  3. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    , localisation services and many others. These technologies can be classified under the name of ubiquitous systems. The term Ubiquitous System dates back to 1991 when Mark Weiser at Xerox PARC Lab first referred to it in writing. He envisioned a future where computing technologies would have been melted...... in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  4. Epidemiological studies among the offspring (F1) of atomic bomb survivors

    International Nuclear Information System (INIS)

    On the basis of results of surveys for the frequency of malignant tumors during the period 1946-1982 and mortality during the period 1946-1985 among the offspring of A-bomb survivors, genetic effects of A-bombing were retrospectively investigated. Among 67,574 children born to parents whose gonad doses could be estimated, 83 in the age group of 20 years or younger were found to develop cancer. Of these, only 18 were considered to have genetic cancers, such as retinoblastoma, Wilms tumor, neuroblastoma, osteosarcoma, and embryonal carcinoma. The other 31 and 34 patients had leukemia and other cancers, respectively. No significantly increased incidence of cancer was associated with radiation doses received in their parents. Genetic effects of A-bombing were considered responsible for 3% to 5% of spontaneously induced malignant tumors. Among 67,586 children born to parents whose gonad doses could be estimated, 3852 (5.7%) were dead during the period 1946-1985. Of these, 76% had died before the age of 4. Survey for mortality has also showed that there is no significant correlation between gonad doses in parents and cancer risk for their offspring. (N.K.)

  5. Why 159°?: a story about the dropping of the Hiroshima atom bomb

    Science.gov (United States)

    Prunty, Sean L.

    2015-04-01

    This paper presents an analysis of the evasive manoeuvre undertaken by the pilot of the Enola Gay aircraft following the dropping of the first uranium bomb. The pilot was instructed to make a 159° turn following the bomb’s release in order to acquire the greatest distance from the point at which the bomb explodes. Accordingly, the objective here is to investigate why the angle should be exactly 159°. The optimum flight-path to maximize the distance from the detonation point is analysed by considering the escape or exit angle taken by the aircraft following a turning-manoeuvre that points it directly away from the detonation site. A range of escape angles are predicted based on the requirement to exit the turning radius prior to detonation. By using information that appeared in a historical account of the event regarding the manoeuvre undertaken by the pilot following the release of the bomb, an estimate is made of the escape angle. Despite the fact that the result shows reasonable agreement with the value of 159°, some uncertainty is expressed as to the close coincidence obtained. In addition, the location of the aircraft and the time of arrival of the shock wave following detonation are also briefly discussed.

  6. An epidemiological study in Nagasaki City of malignant lymphoma and the atomic bomb exposure

    Energy Technology Data Exchange (ETDEWEB)

    Higami, Yoshiichi; Shimokawa, Isao; Iwasaki, Keisuke; Matsuo, Takeshi; Ikeda, Takayoshi (Nagasaki Univ. (Japan). School of Medicine); Mine, Mariko

    1993-05-01

    The incidence of primary site and histological type of malignant lymphoma and the relationship to the atomic bomb exposure in Nagasaki City were investigated in a population of age over 30 years during 1973 to 1982. Of 365 cases (male 207, female 158) of malignant lymphoma reported, 142 (male 66, female 76) had the atomic bomb exposure. No significant difference in incidence of malignant lymphoma was found between the exposed and non-exposed groups. Primary sites of non-Hodgkin lymphoma were: lymph nodes; male exposed, 66; non-exposed, 67%; female exposed, 50%; non-exposed, 69%, gastrointestinal (G.I.) tract, male exposed, 14%; non-exposed, 11%; female exposed, 21%; non-exposed, 17%. histological reexamination of 232 cases according to the National Cancer Institute (USA) criteria yielded: diffuse large cell type, 27.2%; large cell immunoblastic type, 28.0%. No significant difference in these items was found between the exposed and the non-exposed groups. A comparison to the Hiroshma data revealed that an atomic bomb survivor does not show higher incidence in Nagasaki but in Hiroshima. (author).

  7. Dose estimation for atomic bomb survivor studies: its evolution and present status.

    Science.gov (United States)

    Cullings, Harry M; Fujita, Shoichiro; Funamoto, Sachiyo; Grant, Eric J; Kerr, George D; Preston, Dale L

    2006-07-01

    In the decade after the bombings of Hiroshima and Nagasaki, several large cohorts of survivors were organized for studies of radiation health effects. The U.S. Atomic Bomb Casualty Commission (ABCC) and its U.S./Japan successor, the Radiation Effects Research Foundation (RERF), have performed continuous studies since then, with extensive efforts to collect data on survivor locations and shielding and to create systems to estimate individual doses from the bombs' neutrons and gamma rays. Several successive systems have been developed by extramural working groups and collaboratively implemented by ABCC and RERF investigators. We describe the cohorts and the history and evolution of dose estimation from early efforts through the newest system, DS02, emphasizing the technical development and use of DS02. We describe procedures and data developed at RERF to implement successive systems, including revised rosters of survivors, development of methods to calculate doses for some classes of persons not fitting criteria of the basic systems, and methods to correct for bias arising from errors in calculated doses. We summarize calculated doses and illustrate their change and elaboration through the various systems for a hypothetical example case in each city. We conclude with a description of current efforts and plans for further improvements. PMID:16808610

  8. Multiple myeloma among atomic bomb survivors

    International Nuclear Information System (INIS)

    The relationship between multiple myeloma in Hiroshima and Nagasaki and the estimated exposure dose is discussed. From October 1950 to December 1976 multiple myeloma was observed in 22 of 72,802 a-bomb survivors (54,116 in Hiroshima; 18,686 in Nagasaki) who were examined periodically in a life span survey by the Radiation Effects Research Foundation. The incidence per 1,000 was roughly 0.97 in a group exposed to over 100 rad, 0.30 in a group exposed to 1 to 99 rad, and 0.21 in a group exposed to less than 1 rad. There was a statistical difference (p<0.05) in relative risk which standardized city, sex, and age according to the controls exposed to less than 1 rad. An increase in risk in a group exposed to a large dose was marked in survivors aged 20 to 59 at the time of exposure. Multiple myeloma was not observed in those under 20 or over 60 years. An increase in risk in the group exposed to a large dose became marked 15 years after exposure. It is believed that the age factor, in addition to radiation, specifically influenced the occurrence of disease. (Tsunoda, M.)

  9. Simulating an Exploding Fission-Bomb Core

    Science.gov (United States)

    Reed, Cameron

    2016-03-01

    A time-dependent desktop-computer simulation of the core of an exploding fission bomb (nuclear weapon) has been developed. The simulation models a core comprising a mixture of two isotopes: a fissile one (such as U-235) and an inert one (such as U-238) that captures neutrons and removes them from circulation. The user sets the enrichment percentage and scattering and fission cross-sections of the fissile isotope, the capture cross-section of the inert isotope, the number of neutrons liberated per fission, the number of ``initiator'' neutrons, the radius of the core, and the neutron-reflection efficiency of a surrounding tamper. The simulation, which is predicated on ordinary kinematics, follows the three-dimensional motions and fates of neutrons as they travel through the core. Limitations of time and computer memory render it impossible to model a real-life core, but results of numerous runs clearly demonstrate the existence of a critical mass for a given set of parameters and the dramatic effects of enrichment and tamper efficiency on the growth (or decay) of the neutron population. The logic of the simulation will be described and results of typical runs will be presented and discussed.

  10. Nuclear policies: fuel without the bomb

    International Nuclear Information System (INIS)

    The essays, developed from studies conducted by the California seminar on arms control and foreign policy, address technical, political, and economic aspects of nonproliferation. How to halt nuclear proliferation commands worldwide attention today. The search for new energy resources by industrial as well as nonindustral nations has led to the spread of nuclear technology and the production of weapons grade fuel materials such as plutonium and enriched uranium in the name of energy independence. The background and consequences of this growing danger and possible solutions to it are the substance of the essays. Conceding the desirability (if not necessity) of developing nuclear power as an energy source, the writers focus on the different reactor technologies; an historical perspective of proliferation through the example of India; the rationales for stringent international monitoring; and finally, the link between proliferation and the spread of nuclear weapons. The chapters are: Nuclear technology: essential elements for decisionmakers, Robert Gillette; Must we decide now for worldwide commerce in plutonium fuel, Albert Wohlstetter; US peaceful aid and the Indian bomb, Roberta Wohlstetter; International discipline over the uses of nuclear energy, Victor Gilinsky; and Nuclear energy and the proliferation of nuclear weapons, Victor Gilinsky

  11. Ellerman Bombs with Jets: Cause and Effect

    CERN Document Server

    Reid, A; Scullion, E; Doyle, J G; Shelyag, S; Gallagher, P

    2015-01-01

    Ellerman Bombs (EBs) are thought to arise as a result of photospheric magnetic reconnection. We use data from the Swedish 1-m Solar Telescope (SST), to study EB events on the solar disk and at the limb. Both datasets show that EBs are connected to the foot-points of forming chromospheric jets. The limb observations show that a bright structure in the H$\\alpha$ blue wing connects to the EB initially fuelling it, leading to the ejection of material upwards. The material moves along a loop structure where a newly formed jet is subsequently observed in the red wing of H$\\alpha$. In the disk dataset, an EB initiates a jet which propagates away from the apparent reconnection site within the EB flame. The EB then splits into two, with associated brightenings in the inter-granular lanes (IGLs). Micro-jets are then observed, extending to 500 km with a lifetime of a few minutes. Observed velocities of the micro-jets are approximately 5-10 km s$^{-1}$, while their chromospheric counterparts range from 50-80 km s$^{-1}$....

  12. Observations and NLTE modeling of Ellerman bombs

    CERN Document Server

    Berlicki, Arkadiusz

    2014-01-01

    Ellerman bombs (EBs) are short-lived and compact structures that are observed well in the wings of the hydrogen H-alpha line. EBs are also observed in the chromospheric CaII lines and in UV continua. H-alpha line profiles of EBs show a deep absorption at the line center and enhanced emission in the line wings. Similar shapes of the line profiles are observed for the CaII IR line at 8542 ang. It is generally accepted that EBs may be considered as compact microflares located in lower solar atmosphere. However, it is still not clear where exactly the emission of EBs is formed in the solar atmosphere. High-resolution spectrophotometric observations of EBs were used for determining of their physical parameters and construction of semi-empirical models. In our analysis we used observations of EBs obtained in the H-alpha and CaII H lines. We also used NLTE numerical codes for the construction of grids of 243 semi-empirical models simulating EBs structures. In this way, the observed emission could be compared with th...

  13. Ellerman Bombs with Jets: Cause and Effect

    Science.gov (United States)

    Reid, A.; Mathioudakis, M.; Scullion, E.; Doyle, J. G.; Shelyag, S.; Gallagher, P.

    2015-05-01

    Ellerman Bombs (EBs) are thought to arise as a result of photospheric magnetic reconnection. We use data from the Swedish 1 m Solar Telescope to study EB events on the solar disk and at the limb. Both data sets show that EBs are connected to the foot points of forming chromospheric jets. The limb observations show that a bright structure in the Hα blue wing connects to the EB initially fueling it, leading to the ejection of material upwards. The material moves along a loop structure where a newly formed jet is subsequently observed in the red wing of Hα. In the disk data set, an EB initiates a jet which propagates away from the apparent reconnection site within the EB flame. The EB then splits into two, with associated brightenings in the inter-granular lanes. Micro-jets are then observed, extending to 500 km with a lifetime of a few minutes. Observed velocities of the micro-jets are approximately 5-10 km s-1, while their chromospheric counterparts range from 50 to 80 km s-1. MURaM simulations of quiet Sun reconnection show that micro-jets with properties similar to those of the observations follow the line of reconnection in the photosphere, with associated Hα brightening at the location of increased temperature.

  14. Atomic bomb survivor data: utilization and analysis

    International Nuclear Information System (INIS)

    There were several motivations for organizing the SIMS Conference reported in this monograph. Risk assessment and its methods have been subjects of several SIMS Conferences in the recent past, and focusing these newer, more powerful methods on the largest human experience of exposure to ionizing radiation seemed an appropriate sequel. There was also the conviction that the data resources of the Radiation Effects Research Foundation (RERF), generated through the mortality and medical follow-up of large samples of the survivors of the atomic bombs dropped on Hiroshima and Nagasaki, were being under utilized, and that a conference and its proceedings would create interest in exploiting this resource. The time seemed ripe for gathering a small group of current RERF scientists, veteran US statisticians and epidemiologists, and others with more recent entry into the field of radiation biology to consider long range plans for maximizing the output of information not only on the long term effects of ionizing radiation on man but on new knowledge of the determinants of health and disease that can be learned by study of the records of this cohort. This seemed particularly appropriate at this time while intensive joint Japanese-US efforts are underway to provide a new, more accurate dosimetry for use in these studies. Finally, there was a hope that an ad hoc forum of this type would provide not only a summary of current statistical and epidemiologic activities at RERF, but a useful critique of their scope and quality

  15. Pattern association--a key to recognition of shark attacks.

    Science.gov (United States)

    Cirillo, G; James, H

    2004-12-01

    Investigation of a number of shark attacks in South Australian waters has lead to recognition of pattern similarities on equipment recovered from the scene of such attacks. Six cases are presented in which a common pattern of striations has been noted.

  16. An operated case with post-traumatic epilepsy following atomic bombing injury

    Energy Technology Data Exchange (ETDEWEB)

    Morioka, Takato; Nishio Shunji; Muraishi; Mitsuteru; Hisada, Kei; Takase, Keiichirou; Matsukado, Koichiro; Sasaki, Masayuki; Fukui, Masashi [Kyushu Univ., Fukuoka (Japan). Graduate School of Medicine; Ohta, Michiya

    1999-12-01

    The case was 54-years-old man who was bombed at 4-years old 1.5 km apart from the center of explosion in Hiroshima, and had intractable epilepsy after 10 years or more. He suffered from systemic convulsion from 18 years old and took anti-convulsant drugs from 23 years old. The frequency of seizure increased from once a half year to thrice 2 months for these 3-4 years. The attack mainly occurred at night, and it was generalized tonicoclonic convulsion accompanied with unconsciousness and urinary incontience. Valproate (1,800 mg) and clonazepam (1 mg) failed to control the attack, and then he was referred to author's hospital. By CT scanning, MRI and HMPAO-SPECT, the area around the ossified lesion in the right frontal lobe was considered the focus of the epilepsy, and the focus was removed on June 4, 1998. No neurodegeneration and convulsive seizure occurred after surgery. The ossified lesion was confirmed to be bone tissue containing osteoblasts from histological findings and was accompanied by severe gliosis to the brain surface. A large number of active astrocytes were found around the nerve cells in the cortex showing spine-like wave focus, but there were no significant changes in blood vessels in the brain. (K.H.)

  17. An operated case with post-traumatic epilepsy following atomic bombing injury

    International Nuclear Information System (INIS)

    The case was 54-years-old man who was bombed at 4-years old 1.5 km apart from the center of explosion in Hiroshima, and had intractable epilepsy after 10 years or more. He suffered from systemic convulsion from 18 years old and took anti-convulsant drugs from 23 years old. The frequency of seizure increased from once a half year to thrice 2 months for these 3-4 years. The attack mainly occurred at night, and it was generalized tonicoclonic convulsion accompanied with unconsciousness and urinary incontience. Valproate (1,800 mg) and clonazepam (1 mg) failed to control the attack, and then he was referred to author's hospital. By CT scanning, MRI and HMPAO-SPECT, the area around the ossified lesion in the right frontal lobe was considered the focus of the epilepsy, and the focus was removed on June 4, 1998. No neurodegeneration and convulsive seizure occurred after surgery. The ossified lesion was confirmed to be bone tissue containing osteoblasts from histological findings and was accompanied by severe gliosis to the brain surface. A large number of active astrocytes were found around the nerve cells in the cortex showing spine-like wave focus, but there were no significant changes in blood vessels in the brain. (K.H.)

  18. Behavioral response of people in Belgrade to the bombing campaign during 1999

    Directory of Open Access Journals (Sweden)

    Đurić Marija

    2013-01-01

    Full Text Available Introduction. In contrast to numerous reports on long-term psychological consequences of disasters, the literature addressing the acute impact of intentional collective disaster is limited. Objective. This research aimed to examine the impact of the bombing campaign on the behavior of people living in Belgrade during the air attacks in 1999. Methods. The questionnaire was designed and administered to 231 participants. Psychological distress symptoms were assessed using the Symptom Checklist-Revised (SCL-90-R. Results. Participants reported fear and anger as dominant feelings, and the majority of them complained about sleep disturbance, body weight change, and loss of interest for sexual activity. Regression analysis of the scores of the SCL-90-R revealed significant effects of the duration of living under the stress of air attacks, age and gender of the participants and living in the risky areas of the city, upon the scores on Anxiety and Depression dimension. Conclusion. The results of the study contributed to our understanding of the processes through which individuals pass during a long lasting bombardment. It can be beneficial for mental health services in evaluating which actions of care and support could be most suitable. [Projekat Ministarstva nauke Republike Srbije, br. 45005

  19. FLOODING ATTACK AWARE SECURE AODV

    OpenAIRE

    Madhavi, S; K. Duraiswamy

    2013-01-01

    Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the ...

  20. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  1. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  2. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  3. Small-Scale Structuring Of Ellerman Bombs at Solar Limb

    CERN Document Server

    Nelson, C J; Doyle, J G; Freij, N; Erdélyi, R

    2014-01-01

    Ellerman bombs (EBs) have been widely studied in recent years due to their dynamic, explosive nature and apparent links to the underlying photospheric magnetic field implying that they may be formed by magnetic reconnection in the photosphere. Despite a plethora of researches discussing the morphologies of EBs, there has been a limited investigation of how these events appear at the limb, specifically, whether they manifest as vertical extensions away from the disc. In this article, we make use of high-resolution, high-cadence observations of an AR at the solar limb, collected by the CRISP instrument, to identify EBs and infer their physical properties. The upper atmosphere is also probed using the SDO/AIA. We analyse 22 EB events evident within these data, finding that 20 appear to follow a parabolic path away from the solar surface at an average speed of 9 km s^(-1), extending away from their source by 580 km, before retreating back at a similar speed. These results show strong evidence of vertical motions ...

  4. Telomere loss: mitotic clock or genetic time bomb?

    Science.gov (United States)

    Harley, C B

    1991-01-01

    The Holy Grail of gerontologists investigating cellular senescence is the mechanism responsible for the finite proliferative capacity of somatic cells. In 1973, Olovnikov proposed that cells lose a small amount of DNA following each round of replication due to the inability of DNA polymerase to fully replicate chromosome ends (telomeres) and that eventually a critical deletion causes cell death. Recent observations showing that telomeres of human somatic cells act as a mitotic clock, shortening with age both in vitro and in vivo in a replication dependent manner, support this theory's premise. In addition, since telomeres stabilize chromosome ends against recombination, their loss could explain the increased frequency of dicentric chromosomes observed in late passage (senescent) fibroblasts and provide a checkpoint for regulated cell cycle exit. Sperm telomeres are longer than somatic telomeres and are maintained with age, suggesting that germ line cells may express telomerase, the ribonucleoprotein enzyme known to maintain telomere length in immortal unicellular eukaryotes. As predicted, telomerase activity has been found in immortal, transformed human cells and tumour cell lines, but not in normal somatic cells. Telomerase activation may be a late, obligate event in immortalization since many transformed cells and tumour tissues have critically short telomeres. Thus, telomere length and telomerase activity appear to be markers of the replicative history and proliferative potential of cells; the intriguing possibility remains that telomere loss is a genetic time bomb and hence causally involved in cell senescence and immortalization.

  5. Thyroid disorders in atomic-bomb survivors

    International Nuclear Information System (INIS)

    It is known from several studies, including those from RERF that radiation exposure can cause thyroid tumors (Socolow, N Engl J Med. 1963;268:406, Parker, Ann Intern Med. 1974;80:600). Effects of radiation on autoimmune thyroid disease are not well understood. We have conducted thyroid disease screening on a population of 2856 individuals from the Adult Health Study (AHS) cohort of atomic-bomb survivors for the period of 1984-1987. This study, which for logistical reasons involved survivors only from Nagasaki, revealed a statistically significant relationship between radiation dose and prevalence of solid nodules, including cancer, and that of autoimmune hypothyroidism (Nagataki, JAMA. 1994;272:364). Because the previous thyroid study was conducted only in Nagasaki, the new comprehensive thyroid disease screening study has been ongoing in Hiroshima and Nagasaki AHS participants since March 2000. For about 4,000 participants in Hiroshima and Nagasaki AHS cohort, thyroid ultrasonography, aspiration biopsy of nodules, thyroid function test, thyroid autoantibody (thyroid peroxidase antibody and thyroglobulin antibody) test by highly sensitive assay using enzyme linked immunosorbent assay were performed for the diagnosis of thyroid diseases. Analysis of data from the 1874 people examined through July 2001 (915 people from Hiroshima, 959 people from Nagasaki) provides evidence that thyroid cancer increases with radiation dose. The prevalence of positive result for thyroid autoantibody test is increased in the people exposed to relative low dose of radiation (0.01-0.99 Sv). Examination and measurements was completed in February 2003 for all patients. The analysis of these data is providing new and more complete insights into relationships between thyroid diseases and low doses of radiation

  6. Is Einstein the Father of the Atomic Bomb

    Science.gov (United States)

    Lustig, Harry

    2009-05-01

    Soon after the American atomic bombs were dropped on Hiroshima and Nagasaki, the notion took hold in the popular mind that Albert Einstein was ``the father of the bomb.'' The claim of paternity rests on the belief that E=mc2 is what makes the release of enormous amounts of energy in the fission process possible and that the atomic bomb could not have been built without it. This is a misapprehension. Most physicists have known that all along. Nevertheless in his reaction to the opera Dr. Atomic, a prominent physicist claimed that Einstein's discovery that matter can be transformed into energy ``is precisely what made the bomb possible.'' In fact what makes the fission reaction and one of its applications,the atomic bomb, possible is the smaller binding energies of fission products compared to the binding energies of the nuclei that undergo fission.The binding energies of nuclei are a well understood consequence of the numbers and arrangements of protons and neutrons in the nucleus and of quantum-mechanical effects. The realization that composite systems have binding energies predates relativity. In the 19th century they were ascribed to potential and other forms of energy that reside in the system. With Einstein they became rest mass energy. While E=mc2 is not the cause of fission, measuring the masses of the participants in the reaction does permit an easy calculation of the kinetic energy that is released.

  7. Mortality statistics among atomic bomb survivors in Hiroshima Prefecture

    International Nuclear Information System (INIS)

    In a comparative analysis of mortality among atomic bomb survivors versus the non-exposed, both resident in Hiroshima Prefecture, it was found that in addition to leukaemia, malignant lymphoma, multiple myeloma, and cancers of the thyroid gland, breast, lung, esophagus, stomach, urinary organs and salivary gland which have been reported from the past to be elevated in risk among atomic bomb survivors, cancers of the colon, larynx, accessory sinuses, uterus, ovary and testis, diseases of the blood, cirrhosis of liver, hypertensive disease and diabetes mellitus were elevated in risk, but the risk of cerebrovascular disease, heart disease, peptic ulcer, gastroenteritis, senility, and accidents was lower than the non-exposed. The relationship of atomic bomb exposure to the relative risk of cancers of the lung, breast, uterus, and testis could be readily explained, but the relationship between atomic bomb exposure and the relative risk of cancers of many other sites, diseases of the blood, and other causes of death was inconsistent. One of the reasons why the risk of senility was low and the risk of diseases of the blood, malignant neoplasms, diabetes mellitus, and hypertensive disease was high is considered to be the higher diagnostic accuracy in atomic bomb survivors. (author)

  8. A method to detect low-level 63Ni activity for estimating fast neutron fluence from the Hiroshima atomic bomb.

    Science.gov (United States)

    Ito, Y; Shibata, T; Imamura, M; Shibata, S; Nogawa, N; Uwamino, Y; Shizuma, K

    1999-06-01

    The Hiroshima and Nagasaki atomic bombs resulted in the worst reported exposure of radiation to the human body. The data of survivors have provided the basis for the risk estimation for ionizing radiation, and thus are widely used as the basis of radiation safety. In this report we have studied a new method to detect the low-level 63Ni activity in copper samples in order to estimate the fast neutron fluence from the Hiroshima atomic bomb. Only 0.8 x 10(-3) Bq g(-1) of 63Ni is expected to be produced by the atomic bomb in a copper sample with the 63Cu(n, p)63Ni reaction at a distance of 500 m from the hypocenter. Our method has the required level of sensitivity for determination of the fast neutron fluence out to distances of at least 500 m, and perhaps as far as 1,000 m. We have already investigated and collected some bomb-irradiated copper samples for further study. PMID:10334579

  9. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  10. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    Science.gov (United States)

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  11. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  12. The Rhetoric of "Unconditional Surrender" and the Decision to Drop the Atomic Bomb.

    Science.gov (United States)

    Hikins, James W.

    1983-01-01

    Analyzes the decision to drop the atomic bomb from a rhetorical point of view, arguing that the bombs were launched because of an American commitment to a particular rhetoric that focused on the propaganda slogan "unconditional surrender." (PD)

  13. Forensic applications of 14C bomb-pulse dating

    International Nuclear Information System (INIS)

    After a brief review of the basics of 14C bomb-pulse dating, this paper presents two unique forensic applications. Particular attention is dedicated to the use of the 14C bomb-pulse to establish the time of harvest of illicit drugs such as heroin and opium. Preliminary measurements of 14C concentrations in milligram samples taken from seized drugs are presented. 14C bomb-pulse dating can determine whether drug distribution originates from stockpiles or recent manufacture, and support the action of law enforcement authorities against criminal organisations involved in drug trafficking. In addition, we describe the dating of wine vintages for a number of authenticated single label vintage red wines from the Barossa Valley - South Australia. Our results show that radiocarbon dating can be used to accurately determine wine vintages and therefore reveal the addition of unrelated materials of natural and synthetic origin

  14. Forensic applications of {sup 14}C bomb-pulse dating

    Energy Technology Data Exchange (ETDEWEB)

    Zoppi, U. E-mail: ugo@ansto.gov.au; Skopec, Z.; Skopec, J.; Jones, G.; Fink, D.; Hua, Q.; Jacobsen, G.; Tuniz, C.; Williams, A

    2004-08-01

    After a brief review of the basics of {sup 14}C bomb-pulse dating, this paper presents two unique forensic applications. Particular attention is dedicated to the use of the {sup 14}C bomb-pulse to establish the time of harvest of illicit drugs such as heroin and opium. Preliminary measurements of {sup 14}C concentrations in milligram samples taken from seized drugs are presented. {sup 14}C bomb-pulse dating can determine whether drug distribution originates from stockpiles or recent manufacture, and support the action of law enforcement authorities against criminal organisations involved in drug trafficking. In addition, we describe the dating of wine vintages for a number of authenticated single label vintage red wines from the Barossa Valley - South Australia. Our results show that radiocarbon dating can be used to accurately determine wine vintages and therefore reveal the addition of unrelated materials of natural and synthetic origin.

  15. A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs

    Science.gov (United States)

    Chen, Honglong; Lou, Wei; Wang, Zhi

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sniffs packets at one point in the network, tunnels them through a wired or wireless link to another point, and the other of which relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization process and propose a novel consistency-based secure localization scheme against wormhole attacks, which includes wormhole attack detection, valid locators identification and self-localization. We also conduct the simulations to demonstrate the effectiveness of our proposed scheme.

  16. Sweden and the bomb. The Swedish plans to acquire nuclear weapons, 1945 - 1972

    International Nuclear Information System (INIS)

    This study analyses the Swedish nuclear weapons research since 1945 carried out by the Swedish National Defence Research Establishment (FOA). The most important aspect of this research was dealing with protection in broad terms against nuclear weapons attacks. However, another aspect was also important from early on - to conduct research aiming at a possible production of nuclear weapons. FOA performed an extended research up to 1968, when the Swedish government signed the Non-Proliferation Treaty (NPT), which meant the end of these production plans. Up to this date, five main investigations about the technical conditions were made, 1948, 1953, 1955, 1957 and 1965, which all together expanded the Swedish know-how to produce a bomb. The Swedish plans to procure nuclear weapons were not an issue in the debate until the mid-50's. The reason for this was simple, prior to 1954 the plans were secretly held within a small group of involved politicians, military and researchers. The change of this procedure did take place when the Swedish Supreme Commander in a public defence report in 1954 favoured a Swedish Nuclear weapons option. In 1958 FOA had reached a technical level that allowed the parliament to make a decision. Two programs were proposed - the L-programme (the Loading Programme), to be used if the parliament would say yes to a production of nuclear weapons, and the S-programme (the Protection Programme), if the parliament would say no. The debate on the issue had now created problems for the Social Democratic Government. The prime minister, Tage Erlander, who had earlier defended a procurement of nuclear weapons, was now forced to reach a compromise. The compromise was presented to the parliament in a creative manner that meant that only the S-programme would be allowed. The government argued that the technical level did allow a 'freedom of action' up to at least the beginning of the 60's when Sweden was mature to make a decision on the issue. During this period

  17. An assessment of the terrorist threat to use a nuclear or radiological device in an attack

    Energy Technology Data Exchange (ETDEWEB)

    Kingshott, B.F. [Grand Valley State University, 275C DeVos Center, 401 West Fulton Street, Grand Rapids, MI 49504 (United States)]. E-mail: kingshob@gvsu.edu

    2006-07-01

    This paper will discuss terrorism from the perspective of a terrorist organisation acquiring nuclear material to build weapons and how security of radiological material world wide will minimise the risk of such devices being used. It will discuss the need to improve security at nuclear waste processing and storage sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device containing nuclear material be detonated. (author)

  18. Mental health conditions in Korean atomic bomb survivors: a survey in Seoul

    OpenAIRE

    Koshimoto, Rika; Nakane, Hideyuki; Kim, Hyen; Kinoshita, Hirohisa; Moon, Deok Su; Ohtsuru, Akira; Bahn, Geonho; Shibata, Yoshisada; Ozawa, Hiroki; Yamashita, Shunichi

    2011-01-01

    More than 60 years have elapsed since the atomic bombings to Hiroshima and Nagasaki, and since all of the atomic bomb survivors have become old, the importance of caring their mental health has become increasing in Japan. Although approximately 70% of overseas atomic bomb are living in Korea, there have been quite few studies on their mental health. The objectives of the present study were to elucidate whether the mental health conditions of atomic bomb survivor in Korea are similar to those ...

  19. Effects of radiation on the incidence of prostate cancer among Nagasaki atomic bomb survivors

    OpenAIRE

    Kondo, Hisayoshi; Soda, Midori; Mine, Mariko; Yokota, Kenichi

    2013-01-01

    Atomic bomb survivors have been reported to have an increased risk of some cancers, especially leukemia. However, the risk of prostate cancer in atomic bomb survivors is not known to have been examined previously. This study examined the association between atomic bomb radiation and the incidence of prostate cancer among male Nagasaki atomic bomb survivors. The subjects were classified by distance from the hypocenter into a proximal group (

  20. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  1. The Manhattan Project: Making the Atomic Bomb. 1999 edition.

    Science.gov (United States)

    Gosling, F. G.

    1999-01-01

    "The Manhattan Project: Making the Atomic Bomb" is a short history of the origins and development of the American atomic bomb program during World War II. Beginning with the scientific developments of the pre-war years, the monograph details the role of the United States government in conducting a secret, nationwide enterprise that took science from the laboratory and into combat with an entirely new type of weapon. The monograph concludes with a discussion of the immediate postwar period, the debate over the Atomic Energy Act of 1946, and the founding of the Atomic Energy Commission.

  2. Why didn't Hitler get the atomic bomb

    International Nuclear Information System (INIS)

    This bibliographical note presents a book in which the author reports his historical studies on the Nazi's nuclear activities as, by the end of the 1930's, Germany was probably the leader in this domain. He mentions and describes the various programs that were launched between 1939 and 1945, discusses some evidences related to the fact that the Germans probably tried to master nuclear energy production, and that they might have tested a weapon containing fissile materials (probably a dirty bomb). The author analyses the reasons of the failure of this nuclear sector: a lack of organization, war and bombings, and a relative lack of interest of political authorities

  3. Hot-spring cure of atomic-bomb survivors, 16

    Energy Technology Data Exchange (ETDEWEB)

    Ouchi, Tamon (Beppu Genbaku Senta (Japan))

    1984-03-01

    Though a cold winter with snowfalls, in the fiscal year 1983, the number of the atomic-bomb sufferers using the Beppu Atomic-bomb Center (a medical hot spring) was large in January and February, 1984; throughout the fiscal year, the total number was about 3,800 persons. The diseases of the sufferers, mostly in locomotion organs, are such as osteoarthritis of spine, lame hip and knee arthropathy. Being the typical diseases for which hot spring treatment is good, the effect is clear, and those desiring to enter the Center twice in a year are increasing. The situation of usage of the Center from April, 1983, to March, 1984, is described.

  4. The Manhattan Project: Making the Atomic Bomb. 1999 edition.

    Energy Technology Data Exchange (ETDEWEB)

    Gosling, F.G.

    1999-01-01

    ``The Manhattan Project: Making the Atomic Bomb`` is a short history of the origins and development of the American atomic bomb program during World War II. Beginning with the scientific developments of the pre-war years, the monograph details the role of the United States government in conducting a secret, nationwide enterprise that took science from the laboratory and into combat with an entirely new type of weapon. The monograph concludes with a discussion of the immediate postwar period, the debate over the Atomic Energy Act of 1946, and the founding of the Atomic Energy Commission.

  5. Locating bomb factories by detecting hydrogen peroxide.

    Science.gov (United States)

    Romolo, Francesco Saverio; Connell, Samantha; Ferrari, Carlotta; Suarez, Guillaume; Sauvain, Jean-Jacques; Hopf, Nancy B

    2016-11-01

    The analytical capability to detect hydrogen peroxide vapour can play a key role in localizing a site where a H2O2 based Improvised Explosive (IE) is manufactured. In security activities it is very important to obtain information in a short time. For this reason, an analytical method to be used in security activity needs portable devices. The authors have developed the first analytical method based on a portable luminometer, specifically designed and validated to locate IE manufacturing sites using quantitative on-site vapour analysis for H2O2. The method was tested both indoor and outdoor. The results demonstrate that the detection of H2O2 vapours could allow police forces to locate the site, while terrorists are preparing an attack. The collected data are also very important in developing new sensors, able to give an early alarm if located at a proper distance from a site where an H2O2 based IE is prepared.

  6. SURVEY ON SURVIVAL APPROACHES IN WIRELESS NETWORK AGAINST JAMMING ATTACK

    Directory of Open Access Journals (Sweden)

    FARAZ AHSAN

    2011-08-01

    Full Text Available Wireless networks are more depicted to intentional or unintentional threats than their wired based equivalent networks. Major reason being the wireless medium which can be approached by others, who can listen and interfere in an on-going valid communication. In the absence of a collision detection mechanism and relying mainly on cooperation of each other for packet routing, the standard defined for wireless network is unable to identify any malicious activity, by default. Among attacks the ones which create isolation of the nodes on the network are considered more severe. If they last long enough, can result in denial-of-service and hence network collapses completely. The simplest form of such attacks is jamming attack which can block any current legitimate communication. It is easy to launch as no especial hardware is required and the area in range for a particular time can be jammed for any legal communication. Jamming is a specialized Denial of Service attack in which purpose is not to overflow buffers, instead to choke the physical communication channel, hence avoiding jammer is much harder than other forms of denial of service attacks. Unlike other attacks, especially routing attacks, no network parameter and topology etc need to be known in advance before launching jamming attack. However, if the network parameters are known and the attack is intelligently placed, a jammer can last longer resulting in more survival time on the network and damage. This paper surveys on different types of jamming attack and the mitigation techniques generally used. Besides this, we investigate about the approaches proposed that are considered efficient to survive in a jammed region, actively. Finally, we conclude by highlighting the potential areas which can be targeted to optimize in minimizing the effects of a jamming attack, as future directions.

  7. (41)Ca in tooth enamel. Part I: a biological signature of neutron exposure in atomic bomb survivors.

    Science.gov (United States)

    Wallner, A; Rühm, W; Rugel, G; Nakamura, N; Arazi, A; Faestermann, T; Knie, K; Maier, H J; Korschinek, G

    2010-08-01

    The detection of (41)Ca atoms in tooth enamel using accelerator mass spectrometry is suggested as a method capable of reconstructing thermal neutron exposures from atomic bomb survivors in Hiroshima and Nagasaki. In general, (41)Ca atoms are produced via thermal neutron capture by stable (40)Ca. Thus any (41)Ca atoms present in the tooth enamel of the survivors would be due to neutron exposure from both natural sources and radiation from the bomb. Tooth samples from five survivors in a control group with negligible neutron exposure were used to investigate the natural (41)Ca content in tooth enamel, and 16 tooth samples from 13 survivors were used to estimate bomb-related neutron exposure. The results showed that the mean (41)Ca/Ca isotope ratio was (0.17 +/- 0.05) x 10(-14) in the control samples and increased to 2 x 10(-14) for survivors who were proximally exposed to the bomb. The (41)Ca/Ca ratios showed an inverse correlation with distance from the hypocenter at the time of the bombing, similar to values that have been derived from theoretical free-in-air thermal-neutron transport calculations. Given that gamma-ray doses were determined earlier for the same tooth samples by means of electron spin resonance (ESR, or electron paramagnetic resonance, EPR), these results can serve to validate neutron exposures that were calculated individually for the survivors but that had to incorporate a number of assumptions (e.g. shielding conditions for the survivors). PMID:20681780

  8. Lack of tissue renewal in human adult Achilles tendon is revealed by nuclear bomb (14)C

    DEFF Research Database (Denmark)

    Heinemeier, Katja Maria; Schjerling, Peter; Heinemeier, Jan;

    2013-01-01

    the 14C bomb-pulse method. This method takes advantage of the dramatic increase in atmospheric levels of 14C, produced by nuclear bomb tests in 1955-1963, which is reflected in all living organisms. Levels of 14C were measured in 28 forensic samples of Achilles tendon core and 4 skeletal muscle samples...... is revealed by nuclear bomb 14C....

  9. Art, Education, and the Bomb: Reflections on an International Children's Peace Mural Project.

    Science.gov (United States)

    Anderson, Tom

    1997-01-01

    Argues that social change can be evidenced in the absence of an image. Discusses how murals painted by children 50 years after the bombing of Hiroshima and Nagasaki do not depict "the bomb," but it pervades the murals nonetheless. Shows that viewers draw unintended analogies between the images and the bombings. (DSK)

  10. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  11. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  12. Strategies and scenarios of CSRF attacks against the CAPTCHA forms

    Directory of Open Access Journals (Sweden)

    Hossein Moradi

    2015-01-01

    Full Text Available In this article, we’ve tried to examine the hypothesis of the robustness of a form by using CAPTCHA against CSRF and login CSRF attacks. Our investigations showed that unlike public opinion, common attacks to bypass CAPTCHAs such as Optical Character Recognition (OCR and 3rd party human attacks are not applicable in the CSRF case and instead, Clickjacking is the most important scenario of CSRF and login CSRF attacks against a secure session-dependent CAPTCHA form. Remember that the Clickjacking is also applicable to bypass the well-known CSRF protections, such as the secret token and the Referer header. Therefore, although the frequent application of CAPTCHA on every page of a website negatively impacts the user experience, but the robustness of a robust session-dependent CAPTCHA against the CSRF and login CSRF attacks is almost the same as the session-dependent security token. Moreover, when a website is using a session-independent or week pattern of CAPTCHA, attackers can bypass the CAPTCHAs and launch the CSRF or login CSRF attacks by using XSS, session hijacking, replay attacks or submitting a random response.

  13. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made

  14. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  15. Anti-Human T-Lymphotropic Virus Type-I Antibodies in Atomic-Bomb Survivors

    OpenAIRE

    Matsuo, Tatsuki; Nakashima, Eiji; Carter, Randolph L.; Neriishi, Kazuo; Mabuchi, Kiyohiko; Akiyama, Mitoshi; Shimaoka, Katsutaro; Kinoshita, Ken-Ichiro; Tomonaga, Masao; Ichimaru, Michito

    1995-01-01

    Adult T-cell leukemia (ATL), induced by human T-lymphotropic virus type-I (HTLV-I), is endemic in Nagasaki, Japan. To investigate the effects of atomic-bomb radiation on development of this specific type of leukemia, 6182 individuals in the Radiation Effects Research Foundation (RERE) Adult Health Study sample in Hiroshima and Nagasaki were examined for positive rate of HTLV-I antibody. Several lymphocyte parameters were also studied for 70 antibody-positive subjects in Nagasaki. The HTLV-I a...

  16. Detailed analysis of a quench bomb for the study of aluminum agglomeration in solid propellants

    Science.gov (United States)

    Gallier, S.; Kratz, J.-G.; Quaglia, N.; Fouin, G.

    2016-07-01

    A standard quench bomb (QB) - widely used to characterize condensed phase from metalized solid propellant combustion - is studied in detail. Experimental and numerical investigations proved that collected particles are mostly unburned aluminum (Al) agglomerates despite large quenching distances. Particles are actually found to quench early as propellant surface is swept by inert pressurant. Further improvements of the QB are proposed which allow measuring both Al agglomerates and alumina residue with the same setup. Finally, the results obtained on a typical aluminized ammonium perchlorate (AP) / hydroxyl-terminated polybutadiene (HTPB) propellant are briefly discussed.

  17. Suicide Attacks on the Rise

    OpenAIRE

    CCS Research Staff

    2008-01-01

    This article was published in Culture and Conflict Review (March 2008), v.2 no.2 "The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star ...

  18. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  19. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  20. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  1. Coal Slag Attack-A Review

    Institute of Scientific and Technical Information of China (English)

    GUO Zongqi

    2004-01-01

    Although slagging coal gasifiers have served the commercial systems of electricity and chemical fertilizer productions for more than ten years, refractory service life still is a critical factor for gasifier availability. Some investigations were attracted, focusing on coal slag attack on high chromia refractories. A general introduction is made in order to have further understanding about slag corrosion in coal gasification environment. Microstructural deterioration and wear process of high chromia refractory in slagging gasifiers are discussed.

  2. Uranium tetrafluoride reduction closed bomb. Part I: Reduction process general conditions; Reduccion del tetrafluoruro de uranio en bomba cerrada. Part I. estudio de las variables generales del proceso de reduccion

    Energy Technology Data Exchange (ETDEWEB)

    Anca Abati, R.; Lopez Rodriguez, M.

    1961-07-01

    General conditions about the metallo thermic reduction in small bombs (250 and 800 gr. of uranium) has been investigated. Factors such as kind and granulometry of the magnesium used, magnesium excess and preheating temperature, which affect yields and metal quality have been considered. magnesium excess increased yields in a 15% in the small bomb, about the preheating temperature, there is a range between which yields and metal quality does not change. All tests have been made with graphite linings. (Author) 18 refs.

  3. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  4. Lymphocyte cytotoxicity of colchicine in Hiroshima atomic bomb survivors

    International Nuclear Information System (INIS)

    The cytotoxicity of colchicine for the peripheral blood lymphocytes of 151 Hiroshima atomic bomb survivors and their controls was determined. No radiation effect was found, but modest age-related changes for the initial number of vialble cells and for the cytotoxicity of colchicine were observed. (author)

  5. Ahab's Speeches: Bombs or Bombastics? A Rhetorical Criticism.

    Science.gov (United States)

    Fadely, Dean

    In an attempt to define rhetorical discourse, the paper examines the speeches of Ahab, the main character from Herman Melville's book, "Moby-Dick." The paper first determines if Ahab's speeches actually fall into the category of rhetorical discourse by examining his major speeches, and then ascertains whether his speeches are bombs (successful…

  6. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  7. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  8. Sertraline-induced panic attack.

    Science.gov (United States)

    González-Berríos, Nereida

    2009-01-01

    Selective Serotonin Reuptake Inhibitors are the treatment of choice for depression and anxiety disorders due to its tolerability, safety and side effects profile. However, with the current and frequent use of these medications in patients with these disorders, new side effects have been reported. This case report describes the development of panic attacks in a 24-year-old-female patient with depressive and anxiety symptoms, and no previous predisposing history for panic attacks. PMID:19954091

  9. Microarchitectural Side-Channel Attacks

    OpenAIRE

    Gallais, Jean-Francois

    2013-01-01

    Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weaknesses and flaws. Initially confined to the black-box model, where only the input and output data were considered, cryptanalysis is now broadened to the security evaluation of the physical implementation of a cryptosystem. The implementation attacks which compose physical cryptanalysis are divided into fault attacks, exploiting the effect of disruption of the normal functioning of the device, and s...

  10. Acute ischemic cerebral attack

    Directory of Open Access Journals (Sweden)

    Franco-Garcia Samir

    2010-12-01

    Full Text Available The decrease of the cerebral blood flow below the threshold of autoregulation led to changes of cerebral ischemia and necrosis that traduce in signs and symtoms of focal neurologic dysfunction called acute cerebrovascular symdrome (ACS or stroke. Two big groups according to its etiology are included in this category the hemorragic that constitue a 20% and the ischemic a 80% of cases. Great interest has wom the ischemic ACS because of its high social burden, being the third cause of no violent death in the world and the first of disability. Many risk factors favor the presentation of these events and some of them are susceptible of modification and therfore are objetives of primary prevention just as the control of diabetes, hypertension and the practice of healthy habits of life. The advances in the knowledge of the physiopatology, had taken to sustantial change in the nomenclature and management of ischemic ACS. Within these changes it was substituted the term cerebrovascular accident fo acute stroke, making emphasis in the key rol of a timely management with goals of time similiar to the acute coronary syndrome. It was redefined the time of acute ischemic attack to a one hour. Once stablished the cerebrovascular attack the semiology of symtoms with frecuency will led us make a topographic diagnosis of the in injury that joined to the cerebral TAC will allow us to exclude an hemorragic event and to start the treatment. In the management of these patients its essential the coordination of the differents teams of work, from the early recognition of symtoms on the part of patients andthe family, the rapid activation and response of emergency systems and the gearing of health care institutions. Are pillars of treatment: the abcde of reanimatiion, to avoid the hiperpirexis, the seizures, the hipoglicemy, the hiperglicemy, to achieve the thrombolysis in the first three hours of the begining of symtoms, to use antiplatelets, antithrombotic profilaxis

  11. Automatic behavior sensing for a bomb-detecting dog

    Science.gov (United States)

    Nguyen, Hoa G.; Nans, Adam; Talke, Kurt; Candela, Paul; Everett, H. R.

    2015-05-01

    Bomb-detecting dogs are trained to detect explosives through their sense of smell and often perform a specific behavior to indicate a possible bomb detection. This behavior is noticed by the dog handler, who confirms the probable explosives, determines the location, and forwards the information to an explosive ordnance disposal (EOD) team. To improve the speed and accuracy of this process and better integrate it with the EOD team's robotic explosive disposal operation, SPAWAR Systems Center Pacific has designed and prototyped an electronic dog collar that automatically tracks the dog's location and attitude, detects the indicative behavior, and records the data. To account for the differences between dogs, a 5-minute training routine can be executed before the mission to establish initial values for the k-mean clustering algorithm that classifies a specific dog's behavior. The recorded data include GPS location of the suspected bomb, the path the dog took to approach this location, and a video clip covering the detection event. The dog handler reviews and confirms the data before it is packaged up and forwarded on to the EOD team. The EOD team uses the video clip to better identify the type of bomb and for awareness of the surrounding environment before they arrive at the scene. Before the robotic neutralization operation commences at the site, the location and path data (which are supplied in a format understandable by the next-generation EOD robots—the Advanced EOD Robotic System) can be loaded into the robotic controller to automatically guide the robot to the bomb site. This paper describes the project with emphasis on the dog-collar hardware, behavior-classification software, and feasibility testing.

  12. Survival Analyses of Atomic Bomb Survivors in Hiroshima Prefecture, Japan, 1968-1982. : Cancer Mortality Risk among Early Entrants

    OpenAIRE

    Matsuura, Masaaki; Hayakawa, Norihiko; Shimokata, Hiroshi

    1995-01-01

    We examined the mortality risk due to all causes of death and due to malignant neoplasms during 1968-82 among 204,209 atomic bomb survivors, including 49,215 early entrants. We used data compiled by the Research Institute for Radiation Biology and Medicine at Hiroshima University, which conducts mortality surveillance of these survivors in Hiroshima Prefecture, Japan. The purposes of this study were to investigate whether there was any relationship between exposure status and mortality risk a...

  13. Dose–responses from multi-model inference for the non-cancer disease mortality of atomic bomb survivors

    OpenAIRE

    Schöllnberger, H.; Kaiser, J. C.; Jacob, P.; Walsh, L

    2012-01-01

    The non-cancer mortality data for cerebrovascular disease (CVD) and cardiovascular diseases from Report 13 on the atomic bomb survivors published by the Radiation Effects Research Foundation were analysed to investigate the dose–response for the influence of radiation on these detrimental health effects. Various parametric and categorical models (such as linear-no-threshold (LNT) and a number of threshold and step models) were analysed with a statistical selection protocol that rated the mode...

  14. Imaginary Savior: the image of the nuclear bomb in Korea, 1945-1960.

    Science.gov (United States)

    Kim, Dong-Won

    2009-01-01

    Two atomic bombs dropped on Hiroshima and Nagasaki in August 1945 brought the unexpected liberation of Korea from the 35-year Japanese occupation. Koreans therefore had a very favorable and positive image of the nuclear bomb and nuclear energy from the beginning. The image of the nuclear bomb as "savior" was strengthened during the Korean War when the United States openly mentioned the possible use of the nuclear bomb against North Korean and Chinese military. After the end of the Korean War in July 1953 South Koreans strongly supported the development of the nuclear bomb in order to deter another North Korean invasion. When the US government provided South Korea with a research nuclear reactor in the late 1950s, most South Koreans hailed it as the first step to developing their own nuclear bomb. This paper will analyze how and why the savior image of the nuclear bomb originated and spread in Korea during the 1950s.

  15. Imaginary Savior: the image of the nuclear bomb in Korea, 1945-1960.

    Science.gov (United States)

    Kim, Dong-Won

    2009-01-01

    Two atomic bombs dropped on Hiroshima and Nagasaki in August 1945 brought the unexpected liberation of Korea from the 35-year Japanese occupation. Koreans therefore had a very favorable and positive image of the nuclear bomb and nuclear energy from the beginning. The image of the nuclear bomb as "savior" was strengthened during the Korean War when the United States openly mentioned the possible use of the nuclear bomb against North Korean and Chinese military. After the end of the Korean War in July 1953 South Koreans strongly supported the development of the nuclear bomb in order to deter another North Korean invasion. When the US government provided South Korea with a research nuclear reactor in the late 1950s, most South Koreans hailed it as the first step to developing their own nuclear bomb. This paper will analyze how and why the savior image of the nuclear bomb originated and spread in Korea during the 1950s. PMID:20518158

  16. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Nichols, Jeff A. {Cyber Sciences} [ORNL; Curtis, Laura [Pacific Northwest National Laboratory (PNNL)

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.

  17. Sensitivity to carbon dioxide in subjects with a single lifetime panic attack: possible clinical "bedside" predictive test for panic disorder after a first attack.

    Science.gov (United States)

    Berzak, Elina; Reznik, Mila; Narsia, Oxana; Benjamin, Jonathan

    2004-01-01

    There is currently no way of knowing whether a patient who has recently had a single panic attack has incipient panic disorder. Sensitivity to carbon dioxide (CO2) is lower in healthy volunteers than in panic disorder patients. If this is also true of people who experience a single lifetime panic attack, it could be used as a prognostic test. Subjects with a single lifetime panic attack and subjects with panic disorder received an inhalation of 35% CO2. Subjects completed the panic symptoms scale (PSS), and also stated whether they considered that they had experienced an attack. None of 14 subjects with a single lifetime panic attack, compared to 7 of 17 subjects with panic disorder (P=.009), had an attack. The PSS also distinguished between the groups. The 35% CO2 challenge warrants further investigation as a predictive test after a first panic attack. PMID:15368597

  18. Study of skin cancer incidence in Nagasaki atomic bomb survivors, 1958-85

    International Nuclear Information System (INIS)

    The effects of exposure to ionizing radiation on skin cancer incidence in a cohort of atomic bomb (A-bomb) survivors in the Nagasaki Extended Life Span Study (LSS-E85) sample have been investigated. Among 25,942 exposed survivors at risk whose DS86 dose estimates were available, 47 cases of skin cancer including malignant melanoma were confirmed in the Nagasaki Tumor Registry during the period from 1 April 1958 to 31 December 1985. The dose-response relationship of skin cancer based on an additive relative risk model showed linearity without threshold, not a linear-quadratic curve. The excess relative risk (ERR) of 2.2 per gray in the LSS-E85 sample was highly significant (95% confidence limits: 0.5 to 5.0). In addition, the ERR of 3.1 per gray in the Adult Health Study (AHS) sample was also significant (95% confidence limits: 0.6 to 20.3). When dose equivalents based on a relative biological effectiveness of neutrons of 10 were used, the ERR in the former sample decreased to 2.0 per sievert (95% confidence limits: 0.7-4.5), and the risk in the latter group also declined, to 2.7 per sievert (95% confidence limits: 0.6-17.8). The ERRs did not differ significantly between males and females in the LSS-E85 and AHS samples, but a highly significant increase was observed for the ERR of age at exposure and time trend since exposure. The ERR of skin cancer cases including and excluding 4 malignant melanoma cases for the LSS-E85 sample (there were no malignant melanoma cases in the AHS sample) showed almost the same linear dose response. This is the first report to demonstrate a highly significant dose-response relationship between A-bomb exposure and skin cancer incidence. (author)

  19. Medical examination of A-bomb survivors on Nagasaki A-bomb Casualty

    Energy Technology Data Exchange (ETDEWEB)

    Tagawa, Masuko [Nagasaki Atomic Bomb Casualty Council (Japan)

    1996-03-01

    Medical examination of A-bomb survivors was described and discussed on history, time change of examinee number, action for subjects not examined, change of prevalence, cancer examination, examination for the second generation, and education and enlightenment. Free examination of the survivors was begun in 1953 and the present casualty was made in 1958 on the law for medical care for the survivors. Systematic examination started from 1967 and the examination for the 2nd generation, from 1974. Cancer examination was from 1988. The number of the survivors was the maximum of 82,439 in 1974 and decreased to 61,388 in 1994, when the actual number of examinees, which being rather settled recently, was 32,294 and their average age was 64 y. The examination is done by tour or at the Center. Subjects receive the information of the examination twice by mail. Hematopoietic diseases like anemia, hepatic ones, metabolic and endocrinic ones like diabetes, renal impairment and others (mostly hyperlipidemia) are increasing recently. The number of examinees for cancer is increasing. Lung cancer is examined by the direct roentgenography, gastric cancer by transillumination, and other cancers like myeloma, those in large bowel, uterus and mammary gland, by the respective suitable methods. Health education and enlightenment have been conceivably effective. (H.O.)

  20. Medical examination of A-bomb survivors on Nagasaki A-bomb Casualty

    International Nuclear Information System (INIS)

    Medical examination of A-bomb survivors was described and discussed on history, time change of examinee number, action for subjects not examined, change of prevalence, cancer examination, examination for the second generation, and education and enlightenment. Free examination of the survivors was begun in 1953 and the present casualty was made in 1958 on the law for medical care for the survivors. Systematic examination started from 1967 and the examination for the 2nd generation, from 1974. Cancer examination was from 1988. The number of the survivors was the maximum of 82,439 in 1974 and decreased to 61,388 in 1994, when the actual number of examinees, which being rather settled recently, was 32,294 and their average age was 64 y. The examination is done by tour or at the Center. Subjects receive the information of the examination twice by mail. Hematopoietic diseases like anemia, hepatic ones, metabolic and endocrinic ones like diabetes, renal impairment and others (mostly hyperlipidemia) are increasing recently. The number of examinees for cancer is increasing. Lung cancer is examined by the direct roentgenography, gastric cancer by transillumination, and other cancers like myeloma, those in large bowel, uterus and mammary gland, by the respective suitable methods. Health education and enlightenment have been conceivably effective. (H.O.)

  1. Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures

    OpenAIRE

    Xing, Xinyu; Dang, Jianxun; Han, Richard; Liu, Xue; Mishra, Shivakant

    2010-01-01

    Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-on-one via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper presents one of the first investigations of the privacy threats found in such video chat systems, identifying three such threats, namely de-anonymization attacks, phishing attacks, and ma...

  2. A Framework to Prevent QR Code Based Phishing Attacks

    OpenAIRE

    Dayaratne, T. T.

    2016-01-01

    Though the rapid development and spread of Information and Communication Technology (ICT) making people's life much more easier, on the other hand it causing some serious threats to the society. Phishing is one of the most common cyber threat, that most users falls in. This research investigate on QR code based phishing attacks which is a newly adopted intrusive method and how to enhance the awareness and avoidance behavior of QR based phishing attacks through the user centric security educat...

  3. SECURITY CHALLENGESASA FACTOR AFFECTINGTHE SECURITY OFMANET: ATTACKS, AND SECURITY SOLUTIONS

    OpenAIRE

    Dr.Nabeel Zanoon; Dr.Nashat Albdour; Dr.Hatem S. A. Hamatta; RashaMoh'd Al-Tarawneh

    2015-01-01

    The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed.

  4. SECURITY CHALLENGESASA FACTOR AFFECTINGTHE SECURITY OFMANET: ATTACKS, AND SECURITY SOLUTIONS

    Directory of Open Access Journals (Sweden)

    Dr.Nabeel Zanoon

    2015-06-01

    Full Text Available The Ad Hoc mobile network (MANET is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed.

  5. Public health nutritional studies on the atomic bomb female survivors living in Hiroshima

    International Nuclear Information System (INIS)

    The dietary life and socio-economic status of atomic bomb female survivors living in Hiroshima were investigated. The atomic bomb survivors group exposed at a long distance (LDG) was found to take a great quantity of soybean curd, miso and fruit except citrus, while the atomic bomb survivors group exposed at a short distance (SDG) was found to take a significant amount of fish paste products. SDG tends to ingest processed food and in nutrient supply rate the percentage of calcium, iron and vitamin A is low. Judging from a state of food group without a meal rate, we got the result that SDG has a few kinds of ingestion food and takes them partially in each meal. In terms of socio-economic status, the rate of living alone, supporting oneself and living an empty life is high and the rate of living with a partner is low. On the other hand, we analysed the relations of three factors on physique.physical fitness and living status, and then got the following results. (1) ''Volume capacity'', in the cases of ''be married at present'', ''have a large family'', ''ingest a lot of protein and iron'', tends to be large, while in the cases of ''have no dis ease'', ''don't go without a meal'', ''ingest a lot of carbohydrates (non-fibrous)'', and ''nutr itional balance is good'', it tends to be small. (2) ''Height'', in the case of ''socio-economical status was good before exposure to the atomic bomb'', tends to increase. (3) ''Synthetic physical fitness'', in the cases of ''health condition is good at present'', ''have no disease at present'', ''ingest a lot of vitamin A'' and ''nutritional balance is good'', tends to be superior; in the cases of ''food cost is high'' and ''ingest a lot of carbohydrates (non-fibrous)'', it tends to be low. The significant difference was observed in ''synthetic physical fitness'' between the two age groups of 50-59 years and beyond 70 years. (author)

  6. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  7. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  8. Panic disorder, panic attacks and panic attack symptoms across race-ethnic groups: results of the collaborative psychiatric epidemiology studies.

    Science.gov (United States)

    Asnaani, Anu; Gutner, Cassidy A; Hinton, Devon E; Hofmann, Stefan G

    2009-01-01

    The current study investigates race-ethnic differences in rates of panic disorder, panic attacks and certain panic attack symptoms by jointly combining three major national epidemiological databases. The compared groups were White, African American, Latino and Asian. The White group had significantly higher rates of panic disorder, and of many panic symptoms, including palpitations, as compared to the African American, Asian and Latino groups. Several expected race-ethnic differences were not found. An explanation for these findings are adduced, and suggestions are given for future studies so that possible ethnic-racial differences in panic disorder, panic attacks and panic attack symptoms can be investigated in a more rigorous manner. PMID:19691544

  9. Blast Injuries: From Improvised Explosive Device Blasts to the Boston Marathon Bombing.

    Science.gov (United States)

    Singh, Ajay K; Ditkofsky, Noah G; York, John D; Abujudeh, Hani H; Avery, Laura A; Brunner, John F; Sodickson, Aaron D; Lev, Michael H

    2016-01-01

    Although most trauma centers have experience with the imaging and management of gunshot wounds, in most regions blast wounds such as the ones encountered in terrorist attacks with the use of improvised explosive devices (IEDs) are infrequently encountered outside the battlefield. As global terrorism becomes a greater concern, it is important that radiologists, particularly those working in urban trauma centers, be aware of the mechanisms of injury and the spectrum of primary, secondary, tertiary, and quaternary blast injury patterns. Primary blast injuries are caused by barotrauma from the initial increased pressure of the explosive detonation and the rarefaction of the atmosphere immediately afterward. Secondary blast injuries are caused by debris carried by the blast wind and most often result in penetrating trauma from small shrapnel. Tertiary blast injuries are caused by the physical displacement of the victim and the wide variety of blunt or penetrating trauma sustained as a result of the patient impacting immovable objects such as surrounding cars, walls, or fences. Quaternary blast injuries include all other injuries, such as burns, crush injuries, and inhalational injuries. Radiography is considered the initial imaging modality for assessment of shrapnel and fractures. Computed tomography is the optimal test to assess penetrating chest, abdominal, and head trauma. The mechanism of blast injuries and the imaging experience of the victims of the Boston Marathon bombing are detailed, as well as musculoskeletal, neurologic, gastrointestinal, and pulmonary injury patterns from blast injuries.

  10. KAMEDO Report 90: terrorist attacks in Madrid, Spain, 2004.

    Science.gov (United States)

    Bolling, Roger; Ehrlin, Ylva; Forsberg, Rebecca; Rüter, Anders; Soest, Vivian; Vikström, Tore; Ortenwall, Per; Brändström, Helge

    2007-01-01

    This is a descriptive study of the medical responses to the bombings by terrorists in Madrid on 11 March 2004. The nature of the event, the human damage, and the responses are described. It describes the: (1) nature and operations associated with the alarm; (2) assignment of responding units and personnel; (3) establishment and operations of casualty collection points; (4) medical transport and distribution of injured victims; (5) prioritization and command; (6) hospital care; (7) psychosocial care; (8) identification of the dead; and (9) police investigation and actions. Each of these descriptions is discussed in terms of what currently is known and the implications for future planning, preparedness, and response. PMID:17894223

  11. Reducing the Impact of Attacks against Healthcare by Curbing the Use of Explosive Weapons in Populated Areas: Developments at the Global Level.

    Science.gov (United States)

    Bagshaw, Simon

    2016-01-01

    Attacks against healthcare in situations of armed conflict have emerged as an issue of increasing concern with explosive weapons - such as aircraft bombs, mortars and improvised explosive devices - accounting for more deaths, injuries and damage than any other type of weapon in attacks on healthcare facilities. While this is perhaps unsurprising, it offers some insight into a possible course of action for dealing with the problem of attacks against healthcare - by curbing the use of explosive weapons in populated areas. There has been growing recognition in recent years of the humanitarian problems caused by the use of such weapons in populated areas. Steps are now being taken at the global level to curb this use which could, in time, make an important contribution to reducing the incidence and devastating impact of attacks against healthcare. PMID:27358016

  12. Reducing the Impact of Attacks against Healthcare by Curbing the Use of Explosive Weapons in Populated Areas: Developments at the Global Level.

    Science.gov (United States)

    Bagshaw, Simon

    2016-01-01

    Attacks against healthcare in situations of armed conflict have emerged as an issue of increasing concern with explosive weapons - such as aircraft bombs, mortars and improvised explosive devices - accounting for more deaths, injuries and damage than any other type of weapon in attacks on healthcare facilities. While this is perhaps unsurprising, it offers some insight into a possible course of action for dealing with the problem of attacks against healthcare - by curbing the use of explosive weapons in populated areas. There has been growing recognition in recent years of the humanitarian problems caused by the use of such weapons in populated areas. Steps are now being taken at the global level to curb this use which could, in time, make an important contribution to reducing the incidence and devastating impact of attacks against healthcare.

  13. COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Bose

    2012-01-01

    Full Text Available Mobile Adhoc Networks (MANETs are dynamic in nature. Any nodes can join and leave the network at any time. Hence any type of intruders can attack the communication at any time, especially the routing mechanism between the nodes. In this study, we study and understand two types of attacks which cause more damage to the routing performance of MANET; the attacks are Black Hole attacks and Gray Hole attacks and compare the impact of these attacks on MANET. “Send Fake Route Reply to the nodes” type of attack is used to understand the behavior of these two types of attacks. Existing AODV protocol is modified in order to study these types of attacks in MANET. Performance evaluation of the proposed method is carried out using NS-2. In the presence of these attacks the network performance degrades for various network attributes. The performance of MANET under attack is thoroughly investigated, by applying it on various network parameters with various node densities. Not only had that which attack causes more damage to the environment also studied.

  14. Hot spring therapy of atomic bomb exposed patients, (9)

    International Nuclear Information System (INIS)

    The following description shows the statistics and the results of medical examinatin concerning the patients utilized Beppu Atomic Bomb Center from April, 1977, to March, 1978. Number of persons utilized the center was 3904, and 20285 man-days in total. Number of case treated there was 268. Number of diseases amounted to 442 of 66 sorts, excluding temporary of acute diseases such as acute entergastritis and cold diseases, etc. According to the report by the Ministry of Health and Welfare, atomic bomb-exposed persons show twice as much rate of incidence as normal persons, and owing to aging, many of them have more than two kinds of diseases. Among the diseases, 60 cases were hypertension, 32 heart disease, 30 knee-arthritis, 26 diabetes, 25 hepatitis, 23 spondylosis deformans, etc. Among 268 cases treated by hot spring therapy, 6 were totally cured, and 252 showed alleviation, while 10 showed no change. (Kobatake, H.)

  15. By emotion, no atomic bomb and no blackhole

    Science.gov (United States)

    Shin, Philip

    2011-10-01

    As to be, we glory to God and that is basic theology for christian. And I want to say that BE means just thinking. There is no clue of nature and no proposition to prove it. I just believe by feeling and emotion. I trust that it can be the physic really. As for me, I believe when there is atomic bomb, than anytime it has to blow out the world each time of we are living. So the atomic bomb we thinking is just accident and not by the atomic theory. Also when there is blackhole, than there must be the wall to block me forever and never to walk again. So there are no blackhole. And these two subject is the best two subject for the physic.

  16. Physicists and the 1945 Decision to Drop the Bomb

    CERN Document Server

    Byers, N

    2002-01-01

    In 1943 fear that the German war machine might use atomic bombs was abating and among physicists another fear was taking its place - that of a postwar nuclear arms race with worldwide proliferation of nuclear weapons. Manhattan Project scientists and engineers began to discuss uses of nuclear energy in the postwar world. Niels Bohr, Leo Szilard, James A. Franck and others launched a concerted effort to lay groundwork for international control of the technology. Realizing the devastation nuclear weapons could cause and that they could be made and delivered much more cheaply than conventional weapons of the same power, they tried to persuade policy makers to take into account long range consequences of using atomic bombs and not base their decisions on short range military expediency alone. They met with little success. The scientists' main message, unheeded then and very relevant now, is that worldwide international agreements are needed to provide for inspection and control of nuclear weapons technology. Thei...

  17. Study of biochemical examination among A-bomb survivors

    International Nuclear Information System (INIS)

    Biochemical findings were compared in 1003 A-bomb survivors exposed at ≤1900 m from the hypocenter and 1003 age- and sex-matched A-bomb survivors exposed at ≥3,000 m. Mean and abnormal values for lung function, such as total protein, GOT and GPT, did not differ in two groups of both men and women. However, mean values of both total cholesterol and neutral fat were significantly higher in the ≤1900m group than in the ≥3000 m group, irrespective of sex. Similarly, the ≤1900 m group had a significantly higher incidence of abnormal values for these items than the ≥3000 m group. (N.K.)

  18. Food habits in atomic bomb survivors suffering from malignant neoplasms

    International Nuclear Information System (INIS)

    Food habits were surveyed in patients admitted to 13 hospitals in Nagasaki prefecture and other prefectures to compare the incidence of malignant neoplasms according to the food intake between atomic bomb exposed group and non-exposed group. The incidence of malignant neoplasms was significantly higher in male patients having the low intake of milk and salted fish than in those having the high intake of them in atomic bomb exposed group, while it was significantly higher in male patients having the low intake of potatoes and milk and in female patients having the low intake of boiled fish paste than in those having the high intake of them in non-exposed group. (Namekawa, K.)

  19. Bombing beyond Democracy. Remembering the Ruins of Europe

    DEFF Research Database (Denmark)

    Hoffmann, Birthe

    2013-01-01

    become – a part of European identity. The paper will discuss the possibility of a new transnational remembering of the Ruins of Europe and show some of the still remaining difficulties. If the experience of two World Wars, including the long cold war to follow, plays a decisive role in creating a more...... to rewrite national narratives of the war that of course have served very different purposes. The case in point will be the debate on the allied, specifically the British bombing strategy in World War II, which has evolved since the end of the Cold War. In Britain as well as in the Germany, the debate...... involves questions as: Was the British bombing campaign legitimate to the very end of the war? Do the Germans have any right to commemorate their being victim to the allied air raids, considering the Holocaust and the German conduct towards other countries? How can experiences like this even be remembered...

  20. Physicists and the 1945 Decision to Drop the Bomb

    OpenAIRE

    Byers, Nina

    2002-01-01

    In 1943 fear that the German war machine might use atomic bombs was abating and among physicists another fear was taking its place - that of a postwar nuclear arms race with worldwide proliferation of nuclear weapons. Manhattan Project scientists and engineers began to discuss uses of nuclear energy in the postwar world. Niels Bohr, Leo Szilard, James A. Franck and others launched a concerted effort to lay groundwork for international control of the technology. Realizing the devastation nucle...

  1. Monitoring exposure to atomic bomb radiation by somatic mutation.

    Science.gov (United States)

    Akiyama, M; Kyoizumi, S; Kusunoki, Y; Hirai, Y; Tanabe, K; Cologne, J B

    1996-05-01

    Atomic bomb survivors are a population suitable for studying the relationship between somatic mutation and cancer risk because their exposure doses are relatively well known and their dose responses in terms of cancer risk have also been thoroughly studied. An analysis has been made of erythrocyte glycophorin A (GPA) gene mutations in 1,226 atomic bomb survivors in Hiroshima and Nagasaki. The GPA mutation frequency (Mf) increased slightly but significantly with age at the time of measurement and with the number of cigarettes smoked. After adjustment for the effect of smoking, the Mf was significantly higher in males than in females and higher in Hiroshima than in Nagasaki. All of these characteristics of the background GPA Mf were in accord with those of solid tumor incidence obtained from an earlier epidemiological study of A-bomb survivors. Analysis of the dose effect on Mf revealed the doubling dose to be about 1.20 Sv and the minimum dose for detection of a significant increase to be about 0.24 Sv. No significant dose effect for difference in sex, city, or age at the time of bombing was observed. Interestingly, the doubling dose for the GPA Mf approximated that for solid cancer incidence (1.59 Sv). And the minimum dose for detection was not inconsistent with the data for solid cancer incidence. The dose effect was significantly higher in those diagnosed with cancer before or after measurement than in those without a history of cancer. These findings are consistent with the hypothesis that somatic mutations are the main cause of excess cancer risk from radiation exposure. PMID:8781371

  2. Effect of L/D Ratio on Bomb Ricochet

    Directory of Open Access Journals (Sweden)

    R. A. Goel

    1986-10-01

    Full Text Available Intensive experimental work carried out, to study the effect of the length of a projectile on its ricochet behaviour has been reported. The work is pertinent for designing the bomb to be delivered by low altitude/high speed mode for destruction of runways. Scaled models have been used to conduct these studies and a relationship showing the variation of critical angle of no-ricochet with L/D ratio is evolved.

  3. Forensic Medicine: Age Written in Teeth by Nuclear Bomb Tests

    Energy Technology Data Exchange (ETDEWEB)

    Lawrence Livermore National Laboratory

    2005-05-04

    Establishing the age of individuals is an important step in identification and a frequent challenge in forensic medicine. This can be done with high precision up to adolescence by analysis of dentition, but establishing the age of adults has remained difficult. Here we show that measuring {sup 14}C from nuclear bomb tests in tooth enamel provides a sensitive way to establish when a person was born.

  4. The hypothesis of radiation-accelerated aging and the mortality of Japanese A-bomb victims

    International Nuclear Information System (INIS)

    The hypothesis that ionizing radiation accelerates aging is extremely difficult to investigate in man except at the level of mortality. Among the 82000 Japanese A-bomb survivors being followed for mortality, there were 14400 deaths from non-neoplastic diseases from October 1950 to September 1974, and this experience has been analysed for evidence of a non-specific mortality differential associated with radiation dose (kerma). Cause of death has been classified as follows: neoplastic diseases individually and in various groupings, tuberculosis, cerebrovascular diseases, cardiovascular diseases other than cerebrovascular, diseases of blood and blood-forming organs, diseases of the digestive system, all other non-neoplastic diseases, and all non-neoplastic diseases. Although there is clear evidence of a radiation effect for many forms of cancer, mortality from other diseases contains little suggestion of a relationship to radiation dose. A superficial association between mortality from diseases of blood and blood-forming organs and radiation rests entirely on the carcinogenic effect of radiation, especially the leukaemogenic effect. Deaths from digestive diseases seem related to radiation dose but only in the 1971-74 period and among the Hiroshima survivors; the excess is small but occurred in all age groups. Thus far the mortality experience of the Japanese A-bomb survivors suggests that the life-shortening effect of whole-body human exposure to ionizing radiation derives from its carcinogenic effect, not from any acceleration of the aging process

  5. Genetic effect of A-bomb radiation- Analysis of minisatellite regions detected by DNA fingerprint probe

    Energy Technology Data Exchange (ETDEWEB)

    Kodaira, Mieko [Radiation Effects Research Foundation, Hiroshima (Japan)

    1999-06-01

    In author's laboratory, screening of mutation in germ cells of A-bomb survivors is under investigation with use of 8 single-locus minisatellite probes and no increase in mutation rate has been detected hitherto. This paper reported results of screening on the minisatellite region, which consisting of short repeated base sequence, using a DNA fingerprint probe for 33.15 core sequence. Subjects were 50 A-bomb survivor families exposed to mean dose of 1.9 Sv (exposed group) or 0 Gy (control), having 64 or 60 children, respectively. DNA was extracted from their B cells established by EB virus and subjected to agarose-gel electrophoresis followed by southern blotting with some improvements for fingerprinting. On the fingerprints, numbers of the band detected in regions of >3.5 kb were 1080 in children of the exposed group (16.9/child) and 1024 (17.1) in the control group, indicating no detectable effect of exposure on the germ cell mutation rate in the region.(K.H.)

  6. Stock Market Reaction to Terrorist Attacks: Empirical Evidence from a Front Line State

    Directory of Open Access Journals (Sweden)

    Muhammad Tahir Suleman

    2012-03-01

    Full Text Available The world financial markets have reacted in a highly consistent pattern to the incident of 9/11 in the United States, suicide blasts at night clubs at Bali in 2002, the Madrid and London train bombings in 2004-2005 and a series of continuous blasts and suicide attacks in Pakistan. In this study, we examined the effect of terrorist attack news on returns and volatility for the Karachi Stock Exchange. We employ the EGARCH model proposed by Engle and Ng (1993as it allows good and bad news to have a different impact on volatility. Our results indicate that terrorist attack news has negative impact on the returns of all the sector indices. However, news of these events increased the volatility of KSE100 index and financial sector index. Further it is concluded that the results of oil and gas, and industry are not statistically significant in response to terrorist attack news, indicating that such type of news does not affect the volatility of these two sectors. Moreover, volatility asymmetry is negative in all of the sectors including KSE100 confirming leverage effect.

  7. A SURVEY ON PROTOCOLS & ATTACKS IN MANET ROUTING

    Directory of Open Access Journals (Sweden)

    Meenakshi

    2012-09-01

    Full Text Available A mobile ad hoc network (MANET is a dynamic wirelessnetwork that can be formed without any pre-existinginfrastructure in which each node can act as a router.MANET has no clear line of defense, so, it is accessible toboth legitimate network users and malicious attackers. Inthe presence of malicious nodes, one of the main challengesin MANET is to design the robust security solution that canprotect MANET from various routing attacks. Differentmechanisms have been proposed using variouscryptographic techniques to countermeasure the routingattacks against MANET. However, these mechanisms arenot suitable for MANET resource constraints, i.e., limitedbandwidth and battery power, because they introduce heavytraffic load to exchange and verifying keys. In this paper,the current security issues in MANET are investigated.Particularly, we have examined different routing attacks,such as flooding, blackhole, link spoofing, wormhole, andcolluding misrelay attacks, as well as existing solutions toprotect MANET protocols.

  8. Quantum cloning attacks against PUF-based quantum authentication systems

    Science.gov (United States)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-08-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  9. Quantum cloning attacks against PUF-based quantum authentication systems

    Science.gov (United States)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-05-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  10. Countermeasures Against Blinding Attack on Superconducting Nanowire Detectors for QKD

    Directory of Open Access Journals (Sweden)

    Elezov M.S.

    2015-01-01

    Full Text Available Nowadays, the superconducting single-photon detectors (SSPDs are used in Quantum Key Distribution (QKD instead of single-photon avalanche photodiodes. Recently bright-light control of the SSPD has been demonstrated. This attack employed a “backdoor” in the detector biasing technique. We developed the autoreset system which returns the SSPD to superconducting state when it is latched. We investigate latched state of the SSPD and define limit conditions for effective blinding attack. Peculiarity of the blinding attack is a long nonsingle photon response of the SSPD. It is much longer than usual single photon response. Besides, we need follow up response duration of the SSPD. These countermeasures allow us to prevent blind attack on SSPDs for Quantum Key Distribution.

  11. 无尾布局嵌入式舵面的大迎角纵向操纵能力研究%Longitudinal Control Ability Investigation of Lower Surface Spoiler for Blended Wing Body Tailless Configuration at High Angles of Attack

    Institute of Scientific and Technical Information of China (English)

    孙静; 张彬乾; 杨广珺

    2012-01-01

    Based on the platform of blended wing body tailless configuration, to solve the problem of decreasing pitching control efficiency at high angles of attack for basic longitudinal control surfaces including canard elevator and tail elevator, the new concept of lower surface spoiler is put forward and the effectiveness and auxiliary function for pitching control at high angles of attack is analyzed with numerical simulation method. The influences of the parameters such as lower surface spoiler's height, deflection angle, and relative position when combined with tail elevator are studied. The design law, flow mechanism and action principle to afford nose-down pitching moment increment are put forward. The results show that lower surface spoiler can support tailless configuration as a high-efficiency longitudinal control effecter. With the single use of lower surface spoiler, the maximal nose down pitching moment can be obtained to balance 10° angle of attack with little effect on lift and drag characteristics. When combined with the tail elevator, nose down moment increment of 6° angle of attack can be obtained with the angles of attack smaller than 32' and favorable effect on lift-drag performance is produced. The longitudinal control ability at high angles of attack is improved. The design developed in this paper can provide a reference for control surface design for blended wing body tailless configuration.%针对某前掠翼翼身融合无尾布局由鸭面与尾舵组成的纵向基本控制舵面在大迎角状态操纵效率降低的问题,采用数值模拟方法研究一种机身下表面嵌入式新概念纵向操纵舵面实施大迎角纵向操纵补充的可行性.提出了嵌入式舵面的设计思想,研究了嵌入式舵面高度、偏度及其与尾舵组合时的相对位置等参数影响,提出了嵌入式舵面的设计原则、流动机理以及提供低头力矩增量的作用原理.研究结果表明:嵌入式舵面是无尾布局飞机大

  12. Hyperparathyroidism among atomic bomb survivors in Hiroshima, 1986-88

    International Nuclear Information System (INIS)

    During the two-year period from August 1986 to July 1988, the prevalence of hyperparathyroidism (HPT) was determined among A-bomb survivors and unexposed control subjects in Hiroshima. The diagnosis of HPT was determined biochemically, based upon the presence of consistent hypercalcemia and elevated serum parathyroid hormone levels. Among a population of 4,675 individuals (1,527 males, 3,148 females), primary HPT was diagnosed in 22 (3 males, 19 females). Of these, 8 underwent surgery, of whom 6 had a single parathyroid adenoma and 2 had parathyroid hyperplasia. HPT was more prevalent among the A-bomb survivors who received higher radiation doses (p <.001 for linear trend). The prevalence rates predicted from the model were 0.204% (±0.094%) at 0 Gy and 0.893% (±0.237%) at 1 Gy. The background rate of HPT did not differ significantly by sex or by age at the time of the bombing, although the effect of radiation exposure was greater for individuals exposed at a younger age (p <.01). (author)

  13. The prognosis of pancreatic carcinoma in atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Kawanishi, Masahiro; Munaka, Masaki (Hiroshima Univ. (Japan). Research Inst. for Nuclear Medicine and Biology); Okamoto, Sukeyoshi; Kajiyama, Goro

    1992-03-01

    Prognosis of pancreatic carcinoma in 28 Hiroshima A-bomb survivors was compared with that in background- and tumor size-matched non-exposed patients living in Hiroshima. A-bomb survivors consisted of 13 exposed within 2,000 m from the hypocenter, 12 who had entered the city within 3 days after A-bombing, and 3 not clarified in detail. Survival time was significantly prolonged when tumor resection or surgical internal fistula for obstructive jaundice was performed. The significant therapeutic factor was thus adjusted by using the Cox model to clarify the difference in cumulative survival rates between the exposed and non-exposed groups of pancreatic cancer patients. Median survival was 120 days in the exposed group and 186 days in the non-exposed group. The corresponding figures for 75% and 25% cumulative survival rates were 175 days and 75 days in the exposed group and 238 days and 120 days in the non-exposed group. Prognosis was worse in the exposed group than the non-exposed group. (N.K.).

  14. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  15. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    reflected in the journalistic practices. The described norms form a coherent pattern if safeguarding the existing democracy and the general public is considered to be the main purpose. A coverage based on this pattern of norms can be compared to other forms of crisis management following attacks because...

  16. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  17. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  18. [Polygraphy of a panic attack].

    Science.gov (United States)

    Noffke, H U; Roser, M

    2001-09-01

    We studied a 24-year old female patient with Type 1 diabetes mellitus suffering for 4 weeks from a major depressive episode combined with panic disorder without agoraphobia. A spontaneous panic attack was serendipitously recorded by polygraph while the subject was at rest. Electrocardiogram, finger blood-flow, respiratory rhythm and muscle tone (forearm, forehead) were recorded. A triphasic course consisting of a "dynamic phase" (appr. 80 s) preceded by a discrete "initial phase" (appr. 140 s) and a "declining phase" (appr. 180 s) was observed. The dynamic phase is characterized by an acute increase of fingertip vasoconstriction and heart rate. The patient was not aware of the panic attack before the dynamic phase. The recognisable central regulation confirms previously published findings indicating a sympathetic-norepinephrine activation at the beginning of the panic attack without activating the musculoskeletal system. Furthermore, a paradoxical phenomenon involving heart and respiratory rate was observed before the onset of anxiety, i.e. an increase of the heart rate and a simultaneous decline of the respiratory rate, suggesting a non-antagonistic regulation of the ergotropic-trophotropic system. The autonomic state of the patient points to a lability in homeostasis from which panic attacks as a form of CNS response could develop. PMID:11572106

  19. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  20. Relation between both oxidative and metabolic-osmotic cell damages and initial injury severity in bombing casualties

    Directory of Open Access Journals (Sweden)

    Vučeljić Marina

    2006-01-01

    Full Text Available Background/Aim. We have recently reported the development of oxidative cell damages in bombing casualties within a very early period after the initial injury. The aim of this study, was to investigate malondialdehyde (MDA, as an indicator of lipid peroxidation, and osmolal gap (OG, as a good indicator of metabolic cell damages and to assess their relationship with the initial severity of the injury in bombing casualties. Methods. The study included the males (n = 52, injured during the bombing with the Injury Severity Score (ISS ranging from 3 to 66. The whole group of casualties was devided into a group of less severely (ISS < 25, n = 24 and a group of severely (ISS ≥ 26, n = 28 injured males. The uninjured volunteers (n = 10 were the controls. Osmolality, MDA, sodium, glucose, urea, creatinine, total bilirubin and total protein levels were measured in the venous blood, sampled daily, within a ten-day period. Results. In both groups of casualties, MDA and OG levels increased, total protein levels decreased, while other parameters were within the control limits. MDA alterations correlated with ISS (r = 0.414, p < 0.01, while a statistically significant correlation between OG and ISS was not obtained. Interestingly, in spite of some differences in MDA and OG trends, at the end of the examined period they were at the similar level in both groups. Conclusion. The initial oxidative damages of the cellular membrane with intracellular metabolic disorders contributed to the gradual development of metabolic-osmotic damages of cells, which, consequently caused the OG increase. In the bombing casualties, oxidative cell damages were dependent on the initial injury severity, while metabolic-osmotic cell damages were not.

  1. CD14 and IL18 gene polymorphisms associated with colorectal cancer subsite risks among atomic bomb survivors.

    Science.gov (United States)

    Hu, Yiqun; Yoshida, Kengo; Cologne, John B; Maki, Mayumi; Morishita, Yukari; Sasaki, Keiko; Hayashi, Ikue; Ohishi, Waka; Hida, Ayumi; Kyoizumi, Seishi; Kusunoki, Yoichiro; Tokunaga, Katsushi; Nakachi, Kei; Hayashi, Tomonori

    2015-01-01

    Colorectal cancer (CRC) is a common malignancy worldwide, and chronic inflammation is a risk factor for CRC. In this study, we carried out a cohort study among the Japanese atomic bomb (A-bomb) survivor population to investigate any association between immune- and inflammation-related gene polymorphisms and CRC. We examined the effects of six single-nucleotide polymorphisms of CD14 and IL18 on relative risks (RRs) of CRC. Results showed that RRs of CRC, overall and by anatomic subsite, significantly increased with increasing radiation dose. The CD14-911A/A genotype showed statistically significant higher risks for all CRC and distal CRC compared with the other two genotypes. In addition, the IL18-137 G/G genotype showed statistically significant higher risks for proximal colon cancer compared with the other two genotypes. In phenotype-genotype analyses, the CD14-911A/A genotype presented significantly higher levels of membrane and soluble CD14 compared with the other two genotypes, and the IL18-137 G/G genotype tended to be lower levels of plasma interleukin (IL)-18 compared with the other two genotypes. These results suggest the potential involvement of a CD14-mediated inflammatory response in the development of distal CRC and an IL18-mediated inflammatory response in the development of proximal colon cancer among A-bomb survivors. PMID:27081544

  2. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  3. Age validation of quillback rockfish (Sebastes maliger) using bomb radiocarbon

    Energy Technology Data Exchange (ETDEWEB)

    Kerr, L A; Andrews, A H; Munk, K; Coale, K H; Frantz, B R; Cailliet, G M; Brown, T A

    2005-01-05

    Rockfishes (Sebastes spp.) support one of the most economically important fisheries of the Pacific Northwest and it is essential for sustainable management that age estimation procedures be validated for these species. Atmospheric testing of thermonuclear devices during the 1950s and 1960s created a global radiocarbon ({sup 14}C) signal in the ocean environment that scientists have identified as a useful tracer and chronological marker in natural systems. In this study, we first demonstrated that fewer samples are necessary for age validation using the bomb-generated {sup 14}C signal by emphasizing the utility of the time-specific marker created by the initial rise of bomb-{sup 14}C. Second, the bomb-generated {sup 14}C signal retained in fish otoliths was used to validate the age and age estimation methodology of the quillback rockfish (Sebastes maliger) in the waters of southeast Alaska. Radiocarbon values from the first year's growth of quillback rockfish otoliths were plotted against estimated birth year producing a {sup 14}C time series spanning 1950 to 1985. The initial rise of bomb-{sup 14}C from pre-bomb levels ({approx} -90 {per_thousand}) occurred in 1959 {+-} 1 year and {sup 14}C levels rose relatively rapidly to peak {Delta}{sup 14}C values in 1967 (+105.4 {per_thousand}), with a subsequent declining trend through the end of the record in 1985 (+15.4 {per_thousand}). The agreement between the year of initial rise of {sup 14}C levels from the quillback rockfish record and the chronometer determined for the waters of southeast Alaska from yelloweye rockfish (S. ruberrimus) otoliths validated the ageing methodology for the quillback rockfish. The concordance of the entire quillback rockfish {sup 14}C record with the yelloweye rockfish time series demonstrated the effectiveness of this age validation technique, confirmed the longevity of the quillback rockfish up to a minimum of 43 years, and strongly supports higher age estimates of up to 90 years.

  4. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  5. Incidence of multiple primary cancers in Nagasaki atomic bomb survivors: association with radiation exposure.

    OpenAIRE

    Nakashima, Masahiro; Kondo, Hisayoshi; Miura, Shiro; Soda, Midori; Hayashi, Tomayoshi; Matsuo, Takeshi; Yamashita, Shunichi; Sekine, Ichiro

    2008-01-01

    To assess the effects of atomic bomb radiation on the incidence of multiple primary cancers (MPC), we analyzed the association between the incidence of second primary cancers in survivors of the atomic bombing of Nagasaki, and exposure distance. The incidence rate (IR) of a second primary cancer was calculated and stratified by the distance from the hypocenter and age at the time of bombing for the years 1968 through 1999. The IR of the first primary cancer was also calculated and compared wi...

  6. The Last Act: The Atomic Bomb and the End of World War II.

    Science.gov (United States)

    Smithsonian Institution, Washington, DC. National Air And Space Museum.

    This text was to have been the script for the National Air and Space Museum's exhibition of the Enola Gay, focusing on the end of World War II and the decision of the United States to use of the atomic bomb. The Enola Gay was a B-29 aircraft that carried the atomic bomb dropped on Hiroshima, Japan, on August 6, 1945. The atomic bomb brought a…

  7. Assassination in the United States: an operational study of recent assassins, attackers, and near-lethal approachers.

    Science.gov (United States)

    Fein, R A; Vossekuil, B

    1999-03-01

    This study is the first operational exploration of the thinking and behavior of all 83 persons known to have attacked, or approached to attack, a prominent public official or public figure in the United States since 1949. In addition to data about each attack or near-attack and each subject's demographic and background characteristics, information was gathered about each subject's ideas and actions in the days and weeks before their attacks or near-lethal approaches. Questions were examined about each subject's movement from the idea of attack to actual attack, motives, selection of targets, planning, communication of threat and intent, symptoms of mental illness, and significant life experiences. In every case, the attack or near-attack was the end result of an understandable, and often discernible, process of thinking and action. Implications for protectors, investigators, and researchers are discussed.

  8. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  9. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  10. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made

  11. Research on Semi-automatic Bomb Fetching for an EOD Robot

    Directory of Open Access Journals (Sweden)

    Qian Jun

    2008-11-01

    Full Text Available An EOD robot system, SUPER-PLUS, which has a novel semi-automatic bomb fetching function is presented in this paper. With limited support of human, SUPER-PLUS scans the cluttered environment with a wrist-mounted laser distance sensor and plans the manipulator a collision free path to fetch the bomb. The model construction of manipulator, bomb and environment, C-space map, path planning and the operation procedure are introduced in detail. The semi-automatic bomb fetching function has greatly improved the operation performance of EOD robot.

  12. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  13. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  14. Heart attack - what to ask your doctor

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000231.htm Heart attack - what to ask your doctor To use the ... features on this page, please enable JavaScript. A heart attack occurs when blood flow to a part of ...

  15. Fat May Not Hike Heart Attack Risk

    Science.gov (United States)

    ... news/fullstory_160179.html Fat May Not Hike Heart Attack Risk: Study But it does raise diabetes risk, ... that obesity may not increase the risk of heart attack or premature death. Their study of identical twins ...

  16. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  17. Diabetes Ups Risk of Heart Attack Death

    Science.gov (United States)

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  18. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  19. DULOXETINE-RELATED PANIC ATTACKS

    OpenAIRE

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-01-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients’ trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who respon...

  20. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  1. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  2. Coyote Attacks: An Increasing Suburban Problem

    OpenAIRE

    Timm, Robert M.; Baker, Rex O.; Bennett, Joe R.; Coolahan, Craig C.

    2004-01-01

    Coyote attacks on humans and pets have increased within the past 5 years in California. We discuss documented occurrences of coyote aggression and attacks on people, using data from USDA Wildlife Services, the California Department of Fish & Game, and other sources. Forty-eight such attacks on children and adults were verified from 1998 through 2003, compared to 41 attacks during the period 1988 through 1997; most incidents occurred in Southern California near the suburban-wildland interfac...

  3. Sybil attack in Wireless Sensor Network

    OpenAIRE

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  4. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  5. A Novel Attack against Android Phones

    CERN Document Server

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  6. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  7. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Stroke More Understand Your Risks to Prevent a Heart Attack Updated:Aug 2,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  8. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  9. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  10. 360° FILM BRINGS BOMBED CHURCH TO LIFE

    Directory of Open Access Journals (Sweden)

    K. Kwiatek

    2012-09-01

    Full Text Available This paper explores how a computer-generated reconstruction of a church can be adapted to create a panoramic film that is presented in a panoramic viewer and also on a wrap-around projection system. It focuses on the fundamental principles of creating 360º films, not only in 3D modelling software, but also presents how to record 360º video using panoramic cameras inside the heritage site. These issues are explored in a case study of Charles Church in Plymouth, UK that was bombed in 1941 and has never been rebuilt. The generation of a 3D model of the bombed church started from the creation of five spherical panoramas and through the use of Autodesk ImageModeler software. The processed files were imported and merged together in Autodesk 3ds Max where a visualisation of the ruin was produced. A number of historical images were found and this collection enabled the process of a virtual reconstruction of the site. The aspect of merging two still or two video panoramas (one from 3D modelling software, the other one recorded on the site from the same locations or with the same trajectories is also discussed. The prototype of 360º non-linear film tells a narrative of a wartime wedding that occurred in this church. The film was presented on two 360º screens where members of the audience could make decisions on whether to continue the ceremony or whether to run away when the bombing of the church starts. 3D modelling software made this possible to render a number of different alternati ves (360º images and 360º video. Immersive environments empower the visitor to imagine the building before it was destroyed.

  11. 360° Film Brings Bombed Church to Life

    Science.gov (United States)

    Kwiatek, K.

    2011-09-01

    This paper explores how a computer-generated reconstruction of a church can be adapted to create a panoramic film that is presented in a panoramic viewer and also on a wrap-around projection system. It focuses on the fundamental principles of creating 360º films, not only in 3D modelling software, but also presents how to record 360º video using panoramic cameras inside the heritage site. These issues are explored in a case study of Charles Church in Plymouth, UK that was bombed in 1941 and has never been rebuilt. The generation of a 3D model of the bombed church started from the creation of five spherical panoramas and through the use of Autodesk ImageModeler software. The processed files were imported and merged together in Autodesk 3ds Max where a visualisation of the ruin was produced. A number of historical images were found and this collection enabled the process of a virtual reconstruction of the site. The aspect of merging two still or two video panoramas (one from 3D modelling software, the other one recorded on the site) from the same locations or with the same trajectories is also discussed. The prototype of 360º non-linear film tells a narrative of a wartime wedding that occurred in this church. The film was presented on two 360º screens where members of the audience could make decisions on whether to continue the ceremony or whether to run away when the bombing of the church starts. 3D modelling software made this possible to render a number of different alternati ves (360º images and 360º video). Immersive environments empower the visitor to imagine the building before it was destroyed.

  12. Cancer Mortality in Nagasaki Atomic Bomb Survivors with Epilation

    OpenAIRE

    Yokota, Ken-Ichi; Mine, Mariko; Honda, Sumihisa; Tomonaga, Masao

    2005-01-01

    To elucidate the association between epilation and cancer mortality in Nagasaki atomic bomb survivors, cancer mortality was determined for a total of 9,356 survivors (3,591 males and 5,765 females) from 1 January 1970 to 31 December 1997. The subjects included individuals other than those in the Life Span Study (LSS) cohort of ABCC-RERF. Information on acute injury was obtained from a survey that was conducted at the time of application for a health handbook. The association between epilation...

  13. Mortality of atomic bomb survivors predicted from laboratory animals

    Science.gov (United States)

    Carnes, Bruce A.; Grahn, Douglas; Hoel, David

    2003-01-01

    Exposure, pathology and mortality data for mice, dogs and humans were examined to determine whether accurate interspecies predictions of radiation-induced mortality could be achieved. The analyses revealed that (1) days of life lost per unit dose can be estimated for a species even without information on radiation effects in that species, and (2) accurate predictions of age-specific radiation-induced mortality in beagles and the atomic bomb survivors can be obtained from a dose-response model for comparably exposed mice. These findings illustrate the value of comparative mortality analyses and the relevance of animal data to the study of human health effects.

  14. Genetic analysis of children of atomic bomb survivors.

    OpenAIRE

    Satoh, C; Takahashi, N.; Asakawa, J; Kodaira, M; Kuick, R; Hanash, S M; Neel, J V

    1996-01-01

    Studies are under way for the detection of potential genetic effects of atomic bomb radiation at the DNA level in the children of survivors. In a pilot study, we have examined six minisatellites and five microsatellites in DNA derived from 100 families including 124 children. We detected a total of 28 mutations in three minisatellite loci. The mean mutation rates per locus per gamete in the six minisatellite loci were 1.5% for 65 exposed gametes for which mean parental gonadal dose was 1.9 Sv...

  15. Two cases of giant parathyroid adenoma in atomic bomb survivors

    International Nuclear Information System (INIS)

    In a study of parathyroid tumor among autopsy cases at RERF in Hiroshima, 16 cases of parathyroid adenoma were detected among 4,136 autopsies during 1961-77. Of these, two cases were giant adenoma (5 cm in diameter) accompanied by hyperparathyroidism. Both cases were atomic bomb survivors from Hiroshima. One was exposed to 55 rad at age 51 and died at age 71, and the other was exposed to 28 rad at age 45 and died at age 71. These two cases will be reported together with a review of the literature on parathyroid tumors developed following irradiation on the head and neck. (author)

  16. Review of dosimetry for the atomic bomb survivors

    International Nuclear Information System (INIS)

    This paper summarizes and discusses results of some 1980-1981 studies of neutron and γ-ray exposure to the atomic bomb survivors by W.E. Loewe and E. Mendelsohn of the Lawrence Livermore National Laboratory, D.C. Kaul and W.H. Scott of Science Applications, Inc., and J.V. Pace of the Oak Ridge National Laboratory. Some other special studies which are now underway to complete the review will also be discussed. The expert assistance of others in these special studies is being supported in part by the US Department of Energy and in part by the US Defense Nuclear Agency

  17. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka;

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... and interictal plasma levels of MMP-7, -8, -10 and TIMP-2 (P > 0.05). Our data suggest that plasma MMP-9 cannot be used as a biomarker of BBB disruption in migraine without aura. Decreased MMP-3 levels are an interesting and unexpected finding warranting further investigation....

  18. Estimation of inhalation radiation doses associated with a strontium-90 dirty bomb event

    International Nuclear Information System (INIS)

    The initial stage of dispersion of 90 Sr radiological dispersion device (dirty bomb) in a terrorist event was investigated on the basis of a numerical solution of the full system of Navier-Stokes equations. Maximum inhalation doses at the level of ≥1, ≥5, ≥10, ≥50 mSv are used as evaluative criteria to assess probable consequences. The intentional release of a relatively small amount of 90 Sr using a conventional explosive has the potential to cause internal exposure to beta-radiation with relatively high maximum inhalation doses achieving hundreds of mSv, but the spatial extent of the area within which high exposures might occur is very small with most of the population receiving maximum inhalation doses between 1-10 mSv. The extent of radiation contamination (area and activity) is dependent on 90 Sr particle size, the height of release, and local weather conditions

  19. ESR Dosimetry for Atomic Bomb Survivors Using Shell Buttons and Tooth Enamel

    Science.gov (United States)

    Ikeya, Motoji; Miyajima, Junko; Okajima, Shunzo

    1984-09-01

    Atomic bomb radiation doses to humans at Nagasaki and Hiroshima are investigated by electron spin resonance (ESR) from shell buttons and tooth enamel voluntarily supplied by survivors. A shell button gives a dose of 2.1± 0.2 Gy with ESR signals at g=2.001 and g=1.997 while the signal at g=1.997 for the tooth enamel of the same person is 1.9± 0.5 Gy. Other teeth show doses from about 0.5 Gy to 3 Gy. An apparent shielding converted to a concrete thickness is given using the T65D calculated in 1965. Teeth extracted during dental treatment should be preserved for cumulative radiation dosimetry.

  20. Analysis, classification and detection methods of attacks via wireless sensor networks in SCADA systems

    OpenAIRE

    Botvinkin, Pavel Viktorovich; Kamaev, Valery Anatolevich; Nefedova, Irina Sergeevna; Finogeev, Aleksey Germanovich; Finogeev, Egor Alekseevich

    2014-01-01

    Effectiveness of information security of automated process control systems, as well as of SCADA, depends on data transmissions protection technologies applied on transport environments components. This article investigates the problem of detecting attacks on WSN (wireless sensor networks) of SCADA systems. As the result of analytical studies the authors developed the detailed classification of external attacks on sensor networks and brought the detailed description of attacking impacts on com...

  1. Influence of self-compacting concrete composition on sulfuric acid attack

    OpenAIRE

    Feys, Dimitri; Liu, Zanqun; Heirman, Gert; De Schutter, Geert; Boel, Veerle; Desmet, Bram; Vantomme, John; Cizer, Özlem; Vandewalle, Lucie; Gemert, Dionys van

    2009-01-01

    Sulfuric acid attack on concrete has been reported for over a century. Many scientific papers deal with the issue of concrete damage due to sulfate and sulfuric attack. The introduction of self-compacting concrete introduces new questions related to the behaviour of powder-rich mixtures in a sulfate environment. This paper describes a simple testing method to investigate the influence of the concrete composition on the sulfuric acid attack. Concrete samples have been submerged in a sulfate...

  2. Water-Triggered Luminescent "Nano-bombs" Based on Supra-(Carbon Nanodots)

    NARCIS (Netherlands)

    Q. Lou; S. Qu; P. Jing; W. Ji; D. Li; J. Cao; H. Zhang; L. Liu; J. Zhao; D. Shen

    2015-01-01

    Novel luminescent "nano-bombs" based on a self-assembled system of carbon-nanodots, termed supra-CDs, are developed. The luminescence of these luminescent "nano-bombs" depends strongly on water contact; they show weak emission in toluene and decompose in contact with water, resulting in strong photo

  3. The association between chronic kidney disease and cardiovascular disease risk factors in atomic bomb survivors.

    Science.gov (United States)

    Sera, Nobuko; Hida, Ayumi; Imaizumi, Misa; Nakashima, Eiji; Akahoshi, Masazumi

    2013-01-01

    Atomic bomb (A-bomb) radiation is associated with cardiovascular disease (CVD) and metabolic CVD risk factors. Chronic kidney disease (CKD) is also known to be a risk factor for CVD and little is known whether CKD is associated with A-bomb radiation. To examine whether CKD is associated with CVD risk factors or with A-bomb radiation in A-bomb survivors, we classified renal dysfunction in 1,040 A-bomb survivors who were examined in 2004-2007 as normal [n = 121; estimated glomerular filtration rate (eGFR) ≥ 90 ml/min/1.73 m(2)]; mild (n = 686; eGFR 60-89 ml/min/1.73 m(2)); moderate (n = 217; eGFR 30-59 ml/min/1.73 m(2)); or severe (n = 16; eGFR bomb radiation. Hypertension [odds ratio (OR), 1.57; 95% confidence interval (CI), 1.12-2.20, P = 0.009]; DM (OR, 1.79; 95% CI, 1.23-2.61, P = 0.002); hyperlipidemia (OR, 1.55; 95% CI, 1.12-2.14, P = 0.008); and MetS (OR, 1.86; 95% CI, 1.32-2.63, P bomb survivors. PMID:23148507

  4. Interpreting the Atomic Age: Scientific News Coverage of the Atomic Bomb in Representative Newspapers and Magazines.

    Science.gov (United States)

    Barwis, Gail L.

    A study examined the coverage of the scientific aspects of the atomic bomb in four representative newspapers (New York "Times," New York "Herald Tribune," Chicago "Daily Tribune," and Boston "Daily Globe") and in 14 general mass circulation magazines in the time period immediately following the dropping of the bomb. Among the conclusions of the…

  5. Role Playing: The Atomic Bomb and the End of World War II

    Science.gov (United States)

    Eggleston, Noel C.

    1978-01-01

    Describes how a role playing exercise can be used to teach students in a college level history course about the use of the atomic bomb in World War II. Information is presented on general use of role playing in history courses, objectives, questions to consider about use of the atomic bomb, and course evaluation. For journal availability, see so…

  6. A Confusion of Signals: James Franck, the Chicago Scientists and Early Efforts to Stop the Bomb

    Science.gov (United States)

    Villa, Brian Loring

    1975-01-01

    If the scientists working on the Manhattan Project had realized the consequences of the atomic bomb earlier, formulated their recommendations more precisely, and approached the statesmen in time, American policy on use and control of the bomb might well have been different. (Author/BT)

  7. One minute after the detonation of the atomic bomb: the erased effects of residual radiation.

    Science.gov (United States)

    Takahashi, Hiroko

    2009-01-01

    The U.S. Government's official narrative denies the effects of residual radiation which appeared one minute after the atomic bomb detonations in Hiroshima and Nagasaki. This paper explores declassified documents from the U.S. Atomic Energy Commission, the Atomic Bomb Casualties Commission, and others and shows that these documents actually suggested the existence of serious effects from residual radiation. PMID:20521423

  8. Education, Income, and Support for Suicide Bombings: Evidence from Six Muslim Countries

    Science.gov (United States)

    Shafiq, M. Najeeb; Sinno, Abdulkader H.

    2010-01-01

    The authors examine the effect of educational attainment and income on support for suicide bombing among Muslim publics in six predominantly Muslim countries that have experienced suicide bombings: Indonesia, Jordan, Lebanon, Morocco, Pakistan, and Turkey. The authors make two contributions. First, they present a conceptual model, which has been…

  9. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  10. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  11. Study on specificity of leukemia among the second generation of A-bomb survivors

    International Nuclear Information System (INIS)

    The title specificity was studied and discussed for the leukemia (L) of 5 cases of the second generation who had lived in Osaka (Report 1977) in comparison with published statistic data of the second generation's 15 L cases in a life-span investigation (2003) and of 5,098 L cases in a nationwide report (2003). The A-bomb survivors were exposed in either Hiroshima or Nagasaki. The Osaka cases (4/5 boys) were morbid during 1958-1975, had acute L (myeloid L 3 cases, and unidentified type L 2) and died at ages of 10-19 y. Their parents were exposed to A-bomb directly (2 cases) or due to entrance in the city (3), and 1 father, 3 mothers and 1 couple of parents were exposed. Parent(s) in the life-span investigation were classified in high dose exposure (within 2 km distance from the city) and zero exposure (2.5 km afar from the city and other) groups. Their second generation (13/20 boys) were morbid during 1952-1969 at average age of 9.7 y (high dose group) and 8.3-7.2 y (zero group), and had acute myeloid L (8 cases), acute lymphocytic L (5) and other L. Exposure was to their 12 mothers, 4 fathers and 4 both parents. The nationwide statistics showed L of <18 years old pediatric patients (1986-2000) involving 56.7% boys, of morbid age peak of 3-4 y and of acute lymphocytic L in 68.8%. As above, it seemed that, in the second generation, their mothers were mostly exposed relative to fathers, the morbid sex ratio was higher in boys, morbid age was higher than general, and acute myeloid L was more frequent than general. L of the second generation thus seemed to be somehow specific, particularly in the higher age of morbidity and frequency of acute myeloid L. (T.T.)

  12. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  13. Sweden and the bomb. The Swedish plans to acquire nuclear weapons, 1945 - 1972

    Energy Technology Data Exchange (ETDEWEB)

    Jonter, T [Uppsala Univ. (Sweden). Dept. of History

    2001-09-01

    This study analyses the Swedish nuclear weapons research since 1945 carried out by the Swedish National Defence Research Establishment (FOA). The most important aspect of this research was dealing with protection in broad terms against nuclear weapons attacks. However, another aspect was also important from early on - to conduct research aiming at a possible production of nuclear weapons. FOA performed an extended research up to 1968, when the Swedish government signed the Non-Proliferation Treaty (NPT), which meant the end of these production plans. Up to this date, five main investigations about the technical conditions were made, 1948, 1953, 1955, 1957 and 1965, which all together expanded the Swedish know-how to produce a bomb. The Swedish plans to procure nuclear weapons were not an issue in the debate until the mid-50's. The reason for this was simple, prior to 1954 the plans were secretly held within a small group of involved politicians, military and researchers. The change of this procedure did take place when the Swedish Supreme Commander in a public defence report in 1954 favoured a Swedish Nuclear weapons option. In 1958 FOA had reached a technical level that allowed the parliament to make a decision. Two programs were proposed - the L-programme (the Loading Programme), to be used if the parliament would say yes to a production of nuclear weapons, and the S-programme (the Protection Programme), if the parliament would say no. The debate on the issue had now created problems for the Social Democratic Government. The prime minister, Tage Erlander, who had earlier defended a procurement of nuclear weapons, was now forced to reach a compromise. The compromise was presented to the parliament in a creative manner that meant that only the S-programme would be allowed. The government argued that the technical level did allow a 'freedom of action' up to at least the beginning of the 60's when Sweden was mature to make a decision on the issue

  14. The incidence of leukemia, lymphoma, and multiple myeloma among atomic bomb survivors: 1950 – 2001

    Science.gov (United States)

    Hsu, Wan-Ling; Preston, Dale L.; Soda, Midori; Sugiyama, Hiromi; Funamoto, Sachiyo; Kodama, Kazunori; Kimura, Akiro; Kamada, Nanao; Dohy, Hiroo; Tomonaga, Masao; Iwanaga, Masako; Miyazaki, Yasushi; Cullings, Harry M.; Suyama, Akihiko; Ozasa, Kotaro; Shore, Roy E.; Mabuchi, Kiyohiko

    2013-01-01

    A marked increase in leukemia risks was the first and most striking late effect of radiation exposure seen among the Hiroshima and Nagasaki atomic bomb survivors. This paper presents analyses of radiation effects on leukemia, lymphoma, and multiple myeloma incidence in the Life Span Study cohort of atomic bomb survivors updated 14 years since the last comprehensive report on these malignancies. These analyses make use of tumor- and leukemia-registry-based incidence data on 113,011 cohort members with 3.6 million person-years of follow-up from late 1950 through the end of 2001. In addition to a detailed analysis of the excess risk for all leukemias other than chronic lymphocytic leukemia or adult T-cell leukemia (neither of which appear to be radiation-related), we present results for the major hematopoietic malignancy types: acute lymphoblastic leukemia, chronic lymphocytic leukemia, acute myeloid leukemia, chronic myeloid leukemia, adult T-cell leukemia, Hodgkin and non-Hodgkin lymphoma, and multiple myeloma. Poisson regression methods were used to characterize the shape of the radiation dose response relationship and, to the extent the data allowed, to investigate variation in the excess risks with sex, attained age, exposure age, and time since exposure. In contrast to the previous report that focused on describing excess absolute rates, we considered both excess absolute rate (EAR) and excess relative risk (ERR) models and found that ERR models can often provide equivalent and sometimes more parsimonious descriptions of the excess risk than EAR models. The leukemia results indicated that there was a non-linear dose response for leukemias other than chronic lymphocytic leukemia or adult T-cell leukemia, which varied markedly with time and age at exposure, with much of the evidence for this non-linearity arising from the acute myeloid leukemia risks. Although the leukemia excess risks generally declined with attained age or time since exposure, there was evidence

  15. Game of thrown bombs in 3D: using high speed cameras and photogrammetry techniques to reconstruct bomb trajectories at Stromboli (Italy)

    Science.gov (United States)

    Gaudin, D.; Taddeucci, J.; Scarlato, P.; Del Bello, E.; Houghton, B. F.; Orr, T. R.; Andronico, D.; Kueppers, U.

    2015-12-01

    Large juvenile bombs and lithic clasts, produced and ejected during explosive volcanic eruptions, follow ballistic trajectories. Of particular interest are: 1) the determination of ejection velocity and launch angle, which give insights into shallow conduit conditions and geometry; 2) particle trajectories, with an eye on trajectory evolution caused by collisions between bombs, as well as the interaction between bombs and ash/gas plumes; and 3) the computation of the final emplacement of bomb-sized clasts, which is important for hazard assessment and risk management. Ground-based imagery from a single camera only allows the reconstruction of bomb trajectories in a plan perpendicular to the line of sight, which may lead to underestimation of bomb velocities and does not allow the directionality of the ejections to be studied. To overcome this limitation, we adapted photogrammetry techniques to reconstruct 3D bomb trajectories from two or three synchronized high-speed video cameras. In particular, we modified existing algorithms to consider the errors that may arise from the very high velocity of the particles and the impossibility of measuring tie points close to the scene. Our method was tested during two field campaigns at Stromboli. In 2014, two high-speed cameras with a 500 Hz frame rate and a ~2 cm resolution were set up ~350m from the crater, 10° apart and synchronized. The experiment was repeated with similar parameters in 2015, but using three high-speed cameras in order to significantly reduce uncertainties and allow their estimation. Trajectory analyses for tens of bombs at various times allowed for the identification of shifts in the mean directivity and dispersal angle of the jets during the explosions. These time evolutions are also visible on the permanent video-camera monitoring system, demonstrating the applicability of our method to all kinds of explosive volcanoes.

  16. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  17. Not to be forgotten: The bombing of Novi Sad: An ecological black area

    Directory of Open Access Journals (Sweden)

    Nježić Zvonko B.

    2009-01-01

    Full Text Available During the 1999 NATO bombing of Yugoslavia, the second largest Yugoslav city Novi Sad was one of the cities that bore the brunt of the bombing. According to NATO press releases, the bombing targeted oil refineries, roads, bridges, and telecommunications relay stations, facilities which had used for military purposes. The bombing of Novi Sad's refinery caused fires which burned 50000 tons of crude oil, sending toxins and carcinogens into the air and contaminating groundwater. The bombing of the city caused great damage to local civilians, including severe pollution and widespread ecological damage, health consequences which will remain for years as well as permanent psychological consequences caused by almost 3 months of trauma and fear.

  18. Proliferative and nonproliferative breast disease in atomic-bomb survivors

    International Nuclear Information System (INIS)

    The risk of female breast cancer in association with radiation exposure is well established, on the basis of follow-up studies of the atomic-bomb survivors and other exposed populations. This association is especially strong for women exposed before age 20 yr and appears to be much weaker among women exposed after age 40 yr. In this study, breast-tissue autopsy samples from high-dose and low-dose individuals in the Radiation Effects Research Foundation Life Span Study sample were examined in detail to determine whether nonproliferative or proliferative breast lesions are associated with radiation exposure. The results suggest that proliferative disease in general and atypical hyperplasia in particular are associated with radiation exposure and that the risk is strongest for subjects who were ages 40-49 yr at the time of the bombings. It is hypothesized that this finding may be related to the age dependence of radiation-induced breast cancer, in the sense that potential cancers reflecting early-stage changes induced at these ages by radiation exposure may receive too little hormonal promotion to progress to frank cancers. (author)

  19. Bonebrake Theological Seminary - Most Secret A-Bomb Project Site

    Science.gov (United States)

    Sopka, Katherine R.; Sopka, Elisabeth M.

    2004-05-01

    In late 1943, a small number of nuclear scientists was urgently assembled in Dayton, Ohio by the U.S. Army Manhattan District Engineers and Monsanto Chemical Company Research Division to set up a top secret research project essential to counteract the German atomic bomb threat. The site chosen was an old stone building built in 1879 by the United Brethren Church in a residential area known locally as the Bonebrake Seminary. Centered on a sizeable open plot, the austere three story building was surrounded by a tall cyclone fence with a narrow gate and a minimal guard post - nothing revealed the site's intense research activity then or even in the post-WWII Cold War period. Bonebrake scientists would produce the highly radioactive polonium sources for the plutonium (Pu-239) bomb igniter used in August over Nagasaki just before the end of WWII against Japan. The existence of Bonebrake and its research/production work remained classified top secret throughout the Cold War. Only in recent times can any reference be found even to the existence of this project (unlike , for example, Los Alamos or Oak Ridge) and few, if any details, have ever been published. The primary source of information for this paper is Dr. John J. Sopka who was recruited from Princeton University by the Manhattan District in 1943 as physicist for this project.

  20. Genetic radiation effects of Hiroshima and Nagasaki atomic bombs

    Energy Technology Data Exchange (ETDEWEB)

    Srsen, S. (Komenskeho Univ., Bratislava (Czechoslovakia). Lekarska Fakulta)

    1984-05-01

    A group of researchers examined persons who had survived the Hiroshima and Nagasaki bombs and were irradiated and their progeny with the aim of getting an idea of the genetic effects of these explosions. Teratogenic effects are not discussed. In the lymphocytes of the peripheral blood of persons who had been exposed to high dose irradiation the researchers found a significant increase in chromosomal aberrations by conventional and more recent methods of chromosomal analysis. In parents who had survived the atomic holocaust there were no significant deviations as against the rest of the population in still births, neonatal defects, infant mortality, and mortality of first generation progeny, in neonate weight, the sex ratio, increased occurence of leukosis and chromosomal aberrations in their children. These negative findings in the first generation do not signify that there is no danger from atomic bomb blasts for human kind. They only indicate that the effects of radiation were too small to be found by routine methods or that the methods used were not suitable.

  1. Genetic radiation effects of Hiroshima and Nagasaki atomic bombs

    International Nuclear Information System (INIS)

    A group of researchers examined persons who had survived the Hiroshima and Nagasaki bombs and were irradiated and their progeny with the aim of getting an idea of the genetic effects of these explosions. Teratogenic effects are not discussed. In the lymphocytes of the peripheral blood of persons who had been exposed to high dose irradiation the researchers found a significant increase in chromosomal aberrations by conventional and more recent methods of chromosomal analysis. In parents who had survived the atomic holocaust there were no significant deviations as against the rest of the population in still births, neonatal defects, infant mortality, and mortality of first generation progeny, in neonate weight, the sex ratio, increased occurence of leukosis and chromosomal aberrations in their children. These negative findings in the first generation do not signify that there is no danger from atomic bomb blasts for human kind. They only indicate that the effects of radiation were to small to be found by routine methods or that the methods used were not suitable

  2. Axial length of atomic bomb survivors in Nagasaki

    Energy Technology Data Exchange (ETDEWEB)

    Wakiyama, Harumi; Kishikawa, Yasuhiro; Imamura, Naoki [Nagasaki Atomic Bomb Hospital (Japan); Amemiya, Tsugio [Nagasaki Univ. (Japan). School of Medicine

    2002-03-01

    We reviewed a series of 778 patients who had cataract surgery during the past 4 years at the Nagasaki Atomic Bomb Memorial Hospital. We evaluated the history of exposure to radiation by atomic bomb in 1945, axial length and state of refraction. All were born before 1945. The series comprised 263 males and 515 females. Their ages averaged 76.5{+-}8.6 years. History of exposure to radiation was present in 356 patients. The remaining 422 patients served as control. There was no difference in the type of cataract between the two groups. High myopia was present in 11 irradiated patients (3.2%) and in 24 patients in the control group (6.0%). The difference was not significant (p=0.083). There was no high myopia among 24 patients who were aged 18 years or less at the time of radiation and who were within 2 km from the epicenter. No difference was present regarding the axial length between the two groups or between both sexes. The present result is not definitive because ''irradiated group'' would include those with little or no exposure and because precise data has not been available about the dosis of radiation. (author)

  3. Radiation and cancer risk in atomic-bomb survivors.

    Science.gov (United States)

    Kodama, K; Ozasa, K; Okubo, T

    2012-03-01

    With the aim of accurately assessing the effects of radiation exposure in the Japanese atomic-bomb survivors, the Radiation Effects Research Foundation has, over several decades, conducted studies of the Life Span Study (LSS) cohort, comprising 93 000 atomic-bomb survivors and 27 000 controls. Solid cancer: the recent report on solid cancer incidence found that at age 70 years following exposure at age 30 years, solid cancer rates increase by about 35%  Gy(-1) for men and 58% Gy(-1) for women. Age-at-exposure is an important risk modifier. In the case of lung cancer, cigarette smoking has been found to be an important risk modifier. Radiation has similar effects on first-primary and second-primary cancer risks. Finally, radiation-associated increases in cancer rates appear to persist throughout life. Leukaemia: the recent report on leukaemia mortality suggests that radiation effects on leukaemia mortality persisted for more than 50 years. Moreover, significant dose-response for myelodysplastic syndrome was observed in Nagasaki LSS members even 40-60 years after radiation exposure. Future perspective: given the continuing solid cancer increase in the survivor population, the LSS will likely continue to provide important new information on radiation exposure and solid cancer risks for another 15-20 years, especially for those exposed at a young age. PMID:22394591

  4. Pathological and Epidemiologic Study of Gastric Cancer in Atomic Bomb Survivors, Hiroshima and Nagasaki, 1959-77

    OpenAIRE

    Matsuura, Hiroo; Yamamoto, Tsutomu; Sekine, Ichiro; Ochi, Yoshimiti; Ohtake, Masanori

    1984-01-01

    A study to elucidate the effects of atomic bomb (A-bomb) radiation exposure on the incidence of stomach cancer was conducted on 79,856 A-bomb survivors included in the Life Span Study sample for whom dose estimates are available. From cases diagnosed duri

  5. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  6. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  7. A Probabilistic Analysis to Quantify the Effect of March 11, 2004, Attacks in Madrid on the March 14 Elections in Spain: A Dynamic Modelling Approach

    Directory of Open Access Journals (Sweden)

    Juan-Carlos Cortés

    2015-01-01

    Full Text Available The bomb attacks in Madrid three days before the general elections of March 14, 2004, and their possible influence on the victory of PSOE (Spanish Workers Socialist Party, defeating PP (Popular Party, have been a matter of study from several points of view (i.e., sociological, political, or statistical. In this paper, we present a dynamic model based on a system of differential equations such that it, using data from Spanish CIS (National Center of Sociological Research, describes the evolution of voting intention of the Spanish people over time. Using this model, we conclude that the probability is very low that the PSOE would have won had the attack not happened. Moreover, after the attack, the PSOE increased an average of 5.6% in voting on March 14 and an average of 11.2% of the Spanish people changed their vote between March 11 and March 14. These figures are in accordance with other studies.

  8. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  9. Declining Trends in Blood Pressure Levels and Prevalence of Hypertention in Atomic Bomb Survivors in Nagasaki, Japan, 1971-1991

    OpenAIRE

    Honda, Y; Nakashima, H; Katayama, T

    1994-01-01

    The annual trends in blood pressure levels and prevalence of hypertension classified by JNC-5 were investigated. This survey was conducted retrospectively in a large cohort of Nagasaki atomic bomb survivors (78, 323 persons in 1971) over 20 years. In the age-sex specific groups from the 30's to the 90's, the levels of mean SBP decreased in the latter 10 years compared to the former 10 years except in males in the 30's and the mean DBP decreased except in both sexes in the 30's. The annual tre...

  10. Adaptive Consensus of Distributed Varying Scale Wireless Sensor Networks under Tolerable Jamming Attacks

    Directory of Open Access Journals (Sweden)

    Jinping Mou

    2013-01-01

    Full Text Available Consensus problem is investigated for a varying scale wireless sensor network (VSWSN under tolerable jamming attacks, where the scale of the network is increasing or decreasing due to the newly joined nodes or the removed nodes, respectively; the tolerable jamming attack means that the attack strength is limited. It supposes that during the communications, all nodes may encounter with the tolerable jamming attacks; when the attack power is larger than the given value, the attacked nodes fall asleep, or otherwise the nodes are awakened. Under the sleep method, based on the Lyapunov method, it shows that if the communicating graph is the global limited intersectional connection (GLI connection and the system has the enough dwell time in the intersectional topology, then under the designed consensus protocol, all nodes achieve the global average consensus.

  11. Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator

    CERN Document Server

    Esmaili, H A; gharaee, Hossein

    2011-01-01

    Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the black hole. In this attack, a malicious node advertises itself as having freshest or shortest path to specific node to absorb packets to itself. The effect of black hole attack on ad hoc network using AODV as a routing protocol will be examined in this research. Furthermore, we investigate solution for increasing security in these networks. Simulation results using OPNET simulator depict that packet delivery ratio in the presence of malicious nodes, reduces notably.

  12. To mitigate Black-hole attack with CBDS in MANET

    OpenAIRE

    Navjot; Er.Pooja Ran

    2015-01-01

    Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperati...

  13. Vulnerability of complex networks under three-level-tree attacks

    Science.gov (United States)

    Hao, Yao-hui; Han, Ji-hong; Lin, Yi; Liu, Lin

    2016-11-01

    We investigate vulnerability of complex networks including model networks and real world networks subject to three-level-tree attack. Specifically, we remove three different three-level-tree structures: RRN (Random Root Node), MaxDRN (Max Degree Root Node) and MinDRN (Min Degree Root Node) from a network iteratively until there is no three-level-tree left. Results demonstrate that random network is more robust than scale-free network against three tree attacks, and the robustness of random network decreases as the increases. And scale-free network shows different characteristics in different tree attack modes. The robustness of scale-free is not affected by the parameters for RRN, but increases as the increases for MinDRN. The important thing is that MaxDRN is the most effective in the three tree attack modes, especially for scale-free network. These findings supplement and extend the previous attack results on nodes and edges, and can thus help us better explain the vulnerability of different networks, and provide an insight into more tolerant real complex systems design.

  14. Myocardial perfusion imaging study of CO(2)-induced panic attack.

    Science.gov (United States)

    Soares-Filho, Gastão L F; Machado, Sergio; Arias-Carrión, Oscar; Santulli, Gaetano; Mesquita, Claudio T; Cosci, Fiammetta; Silva, Adriana C; Nardi, Antonio E

    2014-01-15

    Chest pain is often seen alongside with panic attacks. Moreover, panic disorder has been suggested as a risk factor for cardiovascular disease and even a trigger for acute coronary syndrome. Patients with coronary artery disease may have myocardial ischemia in response to mental stress, in which panic attack is a strong component, by an increase in coronary vasomotor tone or sympathetic hyperactivity setting off an increase in myocardial oxygen consumption. Indeed, coronary artery spasm was presumed to be present in cases of cardiac ischemia linked to panic disorder. These findings correlating panic disorder with coronary artery disease lead us to raise questions about the favorable prognosis of chest pain in panic attack. To investigate whether myocardial ischemia is the genesis of chest pain in panic attacks, we developed a myocardial perfusion study through research by myocardial scintigraphy in patients with panic attacks induced in the laboratory by inhalation of 35% carbon dioxide. In conclusion, from the data obtained, some hypotheses are discussed from the viewpoint of endothelial dysfunction and microvascular disease present in mental stress response. PMID:24188891

  15. Findings of a recent ORNL review of dosimery for the Japanese atomic-bomb survivors

    International Nuclear Information System (INIS)

    More detail than previously available on the leakage spectra of neutrons from the Nagasaki and Hiroshima weapons was provided by calculations made at the Los Alamos National Laboratory in 1976. Several neutron-transport calculations using these data predicted significantly less neutron exposure in Hiroshima than the current radiation-exposure estimates for survivors designated as T65D (or Tentative 1965 Doses). The difference was extremely important since recent studies using the T65D estimates have predicted a very large leukemia risk for neutrons at low exposure levels in Hiroshima. Some findings are that the neutron exposures in Hiroshima were probably less than the T65D estimates by factors varying from about four at a ground distance of 1000 m to eight at 2000 m, and the gamma-ray exposures were greater than the T65D estimates starting at about 1000 m and were probably larger by a factor of about three at 2000 m. In Nagasaki, the situation was reversed with respect to gamma rays, and the T65D estimates were higher, but the differences were small (i.e., about 20% at 1000 m and 30% at 2000 m). As a result, it now appears that leukemia and other late effects at lower exposure levels in Hiroshima were due largely to gamma rays rather than neutrons. This may not be true at higher exposure levels in Hiroshima, however. Any reanalysis of data on late effects among the atomic-bomb survivors should be regarded as highly speculative until some other important issues have been investigated in more detail. These issues include the anisotropy in neutron leakage from the Hiroshima weapon, the energy yield of the Hiroshima weapon, the shielding factors for houses, and the organ-dose factors for the atomic-bomb survivors

  16. Analytical Investigation of Attack and Defense Ability Between Asian Men's Basketball Team and the World Top Ranked Team%亚洲男篮与世界诸强攻防能力分析

    Institute of Scientific and Technical Information of China (English)

    黄丽华

    2016-01-01

    The paper utilizes many methods,such as document literature,comparative analysis,videotape observation,mathe⁃matical statistics,etc. to analyze the index of attack and defense ability of Asian men�s basketball team in the 16th annual world basketball championship. The outcome shows that there is a big difference between Asian basketball team and world basketball team. 1) On the offensive,Asian basketball team shows few attempts of shoot and low rate of hits,especially 2 points ball which obviously fall behind his opponents;2)Asian basketball team has a poor ability to scramble for offensive rebound. 3) In a fierce competition Asian basketball team has weak secondary attack ability,and the error probability is rather high. 4) In defense the Steal ability of Asian basketball team is poor. 5) The Block Shot ability of Asian basketball team is inferior to his rival. 6) The robbing offensive rebound ability of Asian basketball team is weak. On account of the above questions,the officials propose that Asian basketball team should improve the players�confidence,intensify the practice of fast shooting,improve the consciousness of rushing for the offensive rebound,strengthen the practice of passing and catching ball ability,enhance the positivity,eager⁃ness and adaptability of defense,intensify the players�consciousness of grabbing the advantage spot first and then the ball when they grab the offensive rebound,reinforce the practice of the players� physical quality in order to improve the body�s withstan⁃ding ability.%运用文献资料、对比分析、录像观察、数据数理统计等方法,对第16届男篮世锦赛亚洲男篮攻防能力的指标进行研究,分析亚洲球队与世界强队之间存在着哪些差距。结果表明:亚洲球队在进攻方面表现为投篮的出手次数少、命中率低,尤其是2分球的出手次数和命中率与对手差距明显;抢进攻篮板球能力差;助攻能力弱,在强对抗中失误

  17. Shoulder injuries from attacking motion

    Science.gov (United States)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  18. A NASA study of the impact of technology on future sea based attack aircraft

    Science.gov (United States)

    Hahn, Andrew S.

    1992-01-01

    A conceptual aircraft design study was recently completed evaluating carrier-based, subsonic attack aircraft using contemporary and future technology assumptions. The study examined a configuration matrix that was made up of light and medium bomb loads, one and two man crews, internal and external weapons carriage, as well as conventional and flying wing planforms. Use of common technology assumptions, engine cycle simulation code, design mission, and consistent application of methods allow for direct comparison of the aircraft. This paper describes the design study ground rules and the aircraft designed. The aircraft descriptions include weights, dimensions, layout, design mission, design constraints, maneuver performance, and fallout mission performance. The strengths, and weaknesses of each aircraft are highlighted.

  19. Impact of London's terrorist attacks on a major trauma center in London.

    Science.gov (United States)

    Mohammed, Aso B; Mann, Haroon A; Nawabi, Danyal H; Goodier, Davis W; Ang, Swee C

    2006-01-01

    During the morning rush hour on Thursday, 07 July 2005, a series of four bombs exploded, affecting London's public transport system. These terrorist attacks killed 52 people and injured > 700. A major incident was declared, and the Royal London Hospital (RLH) was a primary receiving hospital. A total of 194 patients presented to the RLH. Twenty-seven patients required admission. A total of 11 amputations were performed on eight patients. One patient died intra-operatively. Another patient died on Day 6 due to complications related to a head injury. Coordination is vital to the implementation of the hospital's Major Incident Plan in such an emergency. Subsequent internal reviews of the response of the RLH on 07 July 2005 highlighted problems with communication and documentation, as well as the need for extra staffing. These areas should be improved for the management of future major incidents. PMID:17297905

  20. Is adiponectin a risk factor for transient ischaemic attacks?

    Science.gov (United States)

    Sener, Ufuk; Uludag, Irem Fatma; Kose, Sukran; Ozcelik, Murat; Zorlu, Yasar

    2015-01-01

    Adiponectin is an adipocytokine, and it plays a role in atherosclerosis. The role of adiponectin in the development of ischaemic stroke is controversial. Up to now, adiponectin was not evaluated in transient ischaemic stroke. In this study, we investigated the relationship between adiponectin and transient ischaemic attack. Forty patients with transient ischaemic attack were included into the study. In all patients, traditional risk factors of ischaemic stroke and intima-media thickness of carotid arteries were determined. Also, the relationship between these parameters and adiponectin levels were examined. No difference was found in terms of adiponectin levels between patients and healthy subjects. In addition, there was no association between adiponectin levels and traditional risk factors. Our results suggest that adiponectin may not be a predictive risk factor of transient ischaemic attack.

  1. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  2. Effect of attack angle change on hydrodynamic character of supercavitating bodies

    Institute of Scientific and Technical Information of China (English)

    JIANG Zeng-hui; YU Kai-ping; WANG Cong; ZHANG Jia-zhong; HUANG Wen-hu

    2009-01-01

    A series of experiments has been done in a moderate-velocity cavitation tunnel to investigate the effects of attack angle change on hydrodynamic characters of supercavitation. Hydrodynamic characters of the aft section at various attack angles were compared. The investigation shows that hydrodynamic forces of the aft section are dependent of supercavity shapes at different attack angles, and the magnitude of hydrodynamic forces of the aft section varies with the change of attack angle. When the aft section is in the fully wetted case, the drag coefficient changes little. Lift and moment coefficients both increase with the increased attack angle, and the increase magnitude is not large. When the aft body planing is on the cavity boundary, the drag coefficient of nonzero attack angle is larger than that of zero attack angle, and the maximal lift and moment coefficients both vary obviously with the increased attack angle. In the case that the body is fully enveloped by cavity, the drag coefficient, lift coefficient and moment coefficient are nearly constant with the change of attack angles.

  3. Low Serum Concentrations of Vitamin B6 and Iron Are Related to Panic Attack and Hyperventilation Attack

    OpenAIRE

    Mikawa, Yasuhito; Mizobuchi, Satoshi; Egi, Moritoki; Morita, Kiyoshi

    2013-01-01

    Patients undergoing a panic attack (PA) or a hyperventilation attack (HVA) are sometimes admitted to emergency departments (EDs). Reduced serotonin level is known as one of the causes of PA and HVA. Serotonin is synthesized from tryptophan. For the synthesis of serotonin, vitamin B6 (Vit B6) and iron play important roles as cofactors. To clarify the pathophysiology of PA and HVA, we investigated the serum levels of vitamins B2, B6, and B12 and iron in patients with PA or HVA attending an ED. ...

  4. Accounting for neutron exposure in the Japanese atomic bomb survivors.

    Science.gov (United States)

    Cullings, Harry M; Pierce, Donald A; Kellerer, Albrecht M

    2014-12-01

    The Japanese atomic bomb survivors that were directly exposed to both γ rays and neutrons have been followed by the Radiation Effects Research Foundation (RERF). The estimation of the γ-ray risks requires some adjustment for the greater biological effect of the neutrons per unit dose. Because the small neutron doses and the predominant γ-ray doses are highly correlated, the neutron relative biological effectiveness (RBE) cannot be reliably estimated from the survivors' data and information from radiobiology must be invoked. As data became available on neutron doses, RERF has used a constant neutron RBE value of 10, even though radiobiological studies indicate that the RBE values appear to have considerably larger values at low doses. The approximation RBE = 10 assumes that if the RBE is variable it takes roughly this value in the range of total dose most relevant for linear risk estimation, namely about 1 Gy. We consider some possible RBE functions to explain the correct use and the impact of a dose-dependent RBE. However, we do not advocate any particular choice or even that a variable RBE be employed. Rather we show that the assumed neutron RBE, within a wide range of choices, is far less important to the outcome of risk assessment of the RERF data than generally believed. Some of these misperceptions have been related to the consideration of variable RBE functions, and without due attention to the fact that in the case of the A-bomb survivors' data, the mixed field of neutrons and γ rays must be considered. Therefore, the RBE value of neutrons is much lower than the RBE in pure neutron fields that are used in radiobiological experiments. Thus, applying the pure neutron field RBE to the mixed-field A-bomb radiation can lead to an overestimation of the actual neutron RBE for moderate total dose levels of 1 Gy by a factor of more than four. While in a pure neutron exposure the RBE depends on the neutron dose, in the mixed field it depends on both components of

  5. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  6. Resveratrol products resulting by free radical attack

    Science.gov (United States)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  7. Phosphodiesterase 3 inhibitor cilostazol induces migraine-like attacks via cyclic AMP increase

    DEFF Research Database (Denmark)

    Guo, Song; Olesen, Jes; Ashina, Messoud

    2014-01-01

    The initiating mechanisms of migraine attacks are very complex but may involve the cyclic AMP signalling pathway. It is unknown whether intracellular cyclic AMP accumulation induces migraine attacks. We investigated whether administration of cilostazol, which causes cyclic AMP accumulation, may i...

  8. Attack Penetration System for SQL Injection

    Directory of Open Access Journals (Sweden)

    Manju Kaushik

    2014-06-01

    Full Text Available The SQL Injection attack is a popular way of attack in terms of document structure and common threats now a day. There are several ways of attack detection as per our study and also prevention methods had been discussed in several research papers. So the main motivation of our paper to penetrate the attack. For this we have proposed an efficient framework from which the central authority can control all the visited IP and restrict those IP. If the IP is in the restricted zone then the contents are restricted by using SQL update command with some status modification states. If the restricted IP wish to access the data from their credentials, it is immediately inform to the admin and the time of attack alert will be stored in the log area of that attack. Finally by comparison we will justify our results which are better in comparison to the previous test and methodology.

  9. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  10. Effects of radiation on the incidence of prostate cancer among Nagasaki atomic bomb survivors.

    Science.gov (United States)

    Kondo, Hisayoshi; Soda, Midori; Mine, Mariko; Yokota, Kenichi

    2013-10-01

    Atomic bomb survivors have been reported to have an increased risk of some cancers, especially leukemia. However, the risk of prostate cancer in atomic bomb survivors is not known to have been examined previously. This study examined the association between atomic bomb radiation and the incidence of prostate cancer among male Nagasaki atomic bomb survivors. The subjects were classified by distance from the hypocenter into a proximal group (atomic bomb survivors who were alive in 1996. The Cox proportional hazard model was used to estimate the risk of prostate cancer development, with adjustment for age at atomic bomb explosion, attained age, smoking status, and alcohol consumption. Compared with the distal group, the proximal group had significant increased risks of total, localized, and high-grade prostate cancer (relative risk and 95% confidence interval: 1.51 [1.21-1.89]; 1.80 [1.26-2.57]; and 1.88 [1.20-2.94], respectively). This report is the first known to reveal a significant relationship between atomic bomb radiation and prostate cancer. PMID:23859763

  11. SQL INJECTION ATTACK DETECTION AND PREVENTION

    OpenAIRE

    Dr. SUNITHA ABBURU; PERUMALSAMY RAMASAMY

    2012-01-01

    Nowadays SQL injection attacks (SQLIAs) and cross scripting increased in real web applications very much, and the SQL injection attacks damages the databases through web applications. Injection queries are different type of way to attack the databases. This paper address the issue of SQLIA’s and script in an efficient way. The proposed approach detects and prevents all the Injection queries as well as the cross scripting through the Framework and Static analysis and Dynamic analysis. The cont...

  12. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  13. An analysis of leukaemia, lymphoma and other malignancies together with certain categories of non-cancer mortality in the first generation offspring (F1) of the Japanese bomb survivors

    International Nuclear Information System (INIS)

    The absence of any significant excess of childhood leukaemia in the offspring of the Japanese bomb survivors has provided strong evidence against a causal interpretation of the association between paternal preconception radiation dose and the incidence of childhood leukaemia in the offspring of employees at the Sellafield nuclear installation, West Cumbria. The use of the Japanese data has, however, been questioned on the basis that leukaemia cases may have been under-recorded in the years immediately following the bombings. In order to investigate possible misdiagnoses of leukaemia cases in the first generation offspring (F1) of the Japanese bomb survivors, analyses have been undertaken of cases of leukaemia, non-Hodgkin's lymphoma (NHL), and all other malignancies, together with deaths due to blood diseases, deaths due to infectious diseases and deaths from unknown causes. (author)

  14. Rich dynamic of a stage-structured prey-predator model with cannibalism and periodic attacking rate

    Science.gov (United States)

    Zhang, Limin; Zhang, Chaofeng

    2010-12-01

    The dynamic behavior of a stage-structure prey-predator model with cannibalism for prey and periodic attacking rate for predator is investigated. Firstly, the permanence, locally and globally asymptotic stability analyses of the model with constant attacking rate are explored. After that, sufficient conditions for the permanence of the corresponding nonautonomous system with periodic attacking rate are obtained. Furthermore, numerical simulations are presented to illustrate the effects of periodic attacking rate. Simulation results show that the system with periodic attacking rate shows a rich behaviors, including period-doubling and period-having bifurcations, chaos and windows of periodicity.

  15. What did we do to Germany during the Second World War? A British perspective on the Allied strategic bombing campaign 1940-45

    OpenAIRE

    Ryan, Joseph F.; Hewer, Chris

    2016-01-01

    The Allied strategic bombing of Germany during World War II was a significant event in the history of Europe. Social representations of this event were investigated at the level of individual knowledge. To establish an index of British collective memory for this event, 169 adults (aged 18–87 years), divided into three generational groups, completed a questionnaire. The findings showed a disparity between subjective knowledge and historical actuality across all three age groups. A decline in u...

  16. The Radium Terrors. Science Fiction and Radioactivity before the Bomb.

    Science.gov (United States)

    Candela, Andrea

    2015-01-01

    At the beginning of the 20th century the collective imagination was fascinated and terrified by the discovery of radium. A scientific imagery sprang up around radioactivity and was disseminated by public lectures and newspaper articles discussing the ambiguous power of this strange substance. It was claimed that radium could be used to treat cholera, typhus and tuberculosis, but at the same time there were warnings that it could be used for military purposes. The media and the scientists themselves employed a rich vocabulary influenced by religion, alchemy and magic. The ambivalent power of radioactive elements exerted a great influence on science fiction novelists. This paper will examine some significant works published in Europe, America and Russia during the first decades of the 20th century and their role in the creation of the complex imagery of radioactivity that seized the public imagination long before the invention of the atomic bomb.

  17. Explosion and final state of the charged black hole bomb

    CERN Document Server

    Sanchis-Gual, Nicolas; Montero, Pedro J; Font, José A; Herdeiro, Carlos

    2015-01-01

    A Reissner-Nordstr\\"om black hole (BH) is superradiantly unstable against spherical perturbations of a charged scalar field, enclosed in a cavity, with frequency lower than a critical value. We use numerical relativity techniques to follow the development of this unstable system -- dubbed charged BH bomb -- into the non-linear regime, solving the full Einstein--Maxwell--Klein-Gordon equations, in spherical symmetry. We show that: $i)$ the process stops before all the charge is extracted from the BH; $ii)$ the system settles down into a hairy BH: a charged horizon in equilibrium with a scalar field condensate, whose phase is oscillating at the (final) critical frequency. For low scalar field charge, $q$, the final state is approached smoothly and monotonically. For large $q$, however, the energy extraction overshoots and an explosive phenomenon, akin to a $bosenova$, pushes some energy back into the BH. The charge extraction, by contrast, does not reverse.

  18. Atomic bombing and nuclear energy development in Japan

    International Nuclear Information System (INIS)

    The victims of Hiroshima and Nagasaki introduced Japan to nuclear power. Approximately ten years after the bombing, the Japanese Parliament adopted a ''Nuclear Basic Law'', and unanimously proclaimed independence, democracy, and openness as indispensable prerequisites for the continued peaceful utilization of nuclear power. For more than a decade, the political party in government and the opposition parties unanimously adopted all legislation and ordinances connected with nuclear power as well as the necessary budgets. This led to the establishment of research and development institutions. The basic consensus underlying nuclear development in Japan has been the exclusion of any military use. The Japanese public perceives that a military component is not feasible in the country's development of nuclear power. (orig./UA)

  19. Peace without the bomb? - To organize nuclear disarmament

    International Nuclear Information System (INIS)

    With a Christian ethical approach, the authors discuss the relevance of the nuclear bomb for great powers in front of risks of terrorism, or in front of instabilities around the Mediterranean Sea and in Africa. As some countries like Pakistan, India, China or Israel consider this weapon as a guarantee for their security, and as other countries like Iran and North Korea are examples of nuclear proliferation, it seems that the nuclear weapon does not respond to present security issues. The authors state and explain that unilateral disarmament could be a way to collective security. This approach is based on the Pacem in Terris encyclical. The authors have met representatives of peace movements and senior army officials

  20. Clinical studies of lung cancer of atomic bomb survivors, 4

    International Nuclear Information System (INIS)

    A comparative study was made on complications of lung cancer in 188 A-bomb survivors (group 1) and 327 non-exposed patients (group 2) treated from 1972 through 1982. The incidence of complications was higher in group 1 (32 %) than in group 2 (20 %). Complications occurred most frequently in the respiratory system, followed by those in the circulatory system and diabetes mellitus in both groups. Patients with complications in the respiratory, circulatory, or nervous system tended to be inoperable. For patients with clinical stage I or II developing complications, the prognosis was worse as compared with those without complications. Long-term survival can be achieved in two patients with early stage lung cancer in whom surgical treatment was impossible because of the association of severe complications. (Namekawa, K.)

  1. Lessons from the atomic bomb about secondary MDS.

    Science.gov (United States)

    Hata, Tomoko; Imanishi, Daisuke; Miyazaki, Yasushi

    2014-12-01

    Myelodysplastic syndromes (MDSs) is a hematological neoplasm defined by ineffective hematopoiesis, dysplasia of hematopoietic cells, and risk of progression to acute leukemia. MDS occurs as de novo or secondary, and chemoradiotherapy for cancers is thought to increase the risk of MDS among patients. Recently, an epidemiological study for MDS among A-bomb survivors was performed, and it clearly demonstrated that the exposure to external radiation significantly increased the risk of MDS. Precise epidemiological data among survivors have revealed important clinical factors related to the risk of leukemias. In this review, by comparing data for secondary MDS and leukemia/MDS among survivors, several factors which would affect the risk of MDS, especially secondary MDS, are discussed. PMID:25240475

  2. Laser Proximity Sensor for Fuel-air Explosive Bomb

    Directory of Open Access Journals (Sweden)

    Durga Singh

    2007-05-01

    Full Text Available Present study deals with design and development aspects of a diode laser proximity sensorbased on principle of optical triangulation. This sensor incorporates a laser transmitter and anoptical receiver. The beam divergence of laser transmitter and look angle of receiver are orientedin such a way that they intersect at a predetermined measuring segment. The sensor can be setto give signal output at predetermined distance from the target. Theoretical studies have beencarried out to determine the minimum power required for transmitter with a trade-off between S/Nratio, aperture of receiver optics, reflectivity of target and range requirement. The scattered laserradiation from the target in this segment is utilised in deriving a signal output to detonate thebomb at a predetermined distance from the target. The laser proximity sensor has been developedfor 3 ± 0.5 m operational range and has qualified various environmental tests and live fuel-airexplosive bomb trials.

  3. Children of the atomic bomb survivors: A genetic study

    International Nuclear Information System (INIS)

    This volume represents the results of over 40 years of study of the latent health effects on the survivors of the atomic bomb blasts. Planning for this research began in 1946 and data collection has been ongoing since 1948. The work represents the efforts of both US and Japanese agencies and presents 13 papers which the editors believe represent the best scientific information related to the genetic effects of radiation exposure. In general, the results presented here indicate that radiation exposure effects on reproductive cells are less than previously thought. The paper contained here examine that question in light of effects on pregnancy outcome, sex ratio, congenital defects, and early mortality of children. The papers also present helpful comparison of these results with the results seen in experimental radiation studies with animals. For anyone interested in the risks associated with radiation studies, this book represents a vital collection of information

  4. A-bomb survivors: reassessment of the radiation hazard.

    Science.gov (United States)

    Stewart, A M; Kneale, G W

    1999-01-01

    Newly released data from the Radiation Effects Research Foundation on the survivors of the Hiroshima and Nagasaki A-bombing allow a reassessment of radiation hazards. It appears that deaths from marrow damage (such as aplastic anaemia) continued after 1950. The Life Span Study cohort appears biased in favour of persons with high immunological competence, the result of infants and the elderly being more likely to die before 1950 than young adults. A study of survivors of in utero exposures suggests that embryos are more sensitive to the lethal effects of radiation than more mature foetuses. Current estimates of cancer risks from radiation may only apply to young adults with high immunological competence; young children and the elderly may be at greater risk. PMID:10218002

  5. Activation of cobalt by neutrons from the Hiroshima bomb

    International Nuclear Information System (INIS)

    A study has been completed of cobalt activation in samples from two new locations in Hiroshima. The samples consisted of a piece of steel from a bridge located at a distance of about 1300 m from the hypocenter and pieces of both steel and concrete from a building located at approximately 700 m. The concrete was analyzed to obtain information needed to calculate the cobalt activation in the two steel samples. Close agreement was found between calculated and measured values for cobalt activation of the steel sample from the building at 700 m. It was found, however, that the measured values for the bridge sample at 1300 m were approximately twice the calculated values. Thus, the new results confirm the existence of a systematic error in the transport calculations for neutrons from the Hiroshima bomb. 52 refs., 32 figs., 16 tabs

  6. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to...... properties of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  7. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  8. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  9. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  10. Thyroid cancer incidence among atomic bomb survivors, 1958-79

    International Nuclear Information System (INIS)

    One hundred and twelve cases of thyroid cancer diagnosed during the period 1958-79 among the extended Life Span Study cohort in Hiroshima and Nagasaki were studied. There was a statistically significant association between thyroid cancer incidence and exposure to atomic bomb radiation. The adjusted excess relative risk (ERR) per gray was 1.1 (95% confidence interval=0.3-2.5) and the adjusted absolute risk per 104 PYGy was 0.59 (95% confidence interval=0.2-1.7). Based on a comparison of the deviances obtained from relative and absolute risk models, a simple linear relative risk model appeared to fit the data better than an absolute risk model; however, it would not be appropriate to conclude that the data conform strictly to a relative risk pattern. The incidence of thyroid cancer among the members of the Adult Health Study (AHS) population, who have received biennial medical examinations at the Atomic Bomb Casualty Commission and its successor the Radiation Effects Research Foundation, since 1958, was 70% higher than that among the rest of the extended LSS cohort after adjustments for city, sex, log age, calendar year, and Dosimetry System 1986 dose. There was no significant difference between the slope of the dose-response curve for AHS and non-AHS participants, although the estimated ERRs at 1 Gy for the AHS and non-AHS population were 1.6 and 0.3, respectively. The elevated risk appeared to be confined to women, and there was an increasing risk with decreasing attained age and age at exposure. (J.P.N.)

  11. Malignant lymphoma and multiple myeloma in atomic-bomb survivors

    International Nuclear Information System (INIS)

    Of autopsies performed from 1956 to 1976 in Hiroshima Atomic Bomb Hospital, 22 cases of reticulo-sarcoma, 4 cases of lymphosarcoma, 6 cases of Hodgkin's disease, and 9 cases of multiple myeloma were observed in atomic bomb survivors. In regard to the relationship between exposure distance and the number of autopsied cases, the nearer the exposure distance to the center of explosion, the higher the incidence of reticulo-sarcoma in male patients only. Since 1966 cases of malignant lymphoma and multiple myeloma increased with an increase in the number of autopsied cases. An increase in incidences of lymphoma and multiple myeloma was marked especially in the group which entered the city after the explosion. There were more cases of malignant lymphoma in aged patients in the exposed group than in the non-exposed group. Lymphosarcoma and Hodgkin's disease were observed more often in women in the exposed group than in men. Many cases of reticulo-sarcoma in the digestive tract, especially primary stomach reticulo-sarcoma, were observed in the group which was exposed at places over 2 km from the center of explosion and in the exposed group which entered the city after the explosion. Four cases of leukemic reticulo-sarcoma were observed. With respect to histological types of reticulosarcoma, an undifferentiated type was observed in the group exposed at places over 2 km from the center of explosion and in the exposed group which entered the city after the explosion. Incidence of multiple myeloma was high in the group exposed at places within 2 km of the center of explosion. Three cases in which myeloma cells showed a tendency toward diffuse infiltration and proliferation within the bone marrow were observed in the exposed group. (Tsunoda, M.)

  12. Detecting body cavity bombs with nuclear quadrupole resonance

    Science.gov (United States)

    Collins, Michael London

    Nuclear Quadrupole Resonance (NQR) is a technology with great potential for detecting hidden explosives. Past NQR research has studied the detection of land mines and bombs concealed within luggage and packages. This thesis focuses on an NQR application that has received less attention and little or no publicly available research: detecting body cavity bombs (BCBs). BCBs include explosives that have been ingested, inserted into orifices, or surgically implanted. BCBs present a threat to aviation and secure facilities. They are extremely difficult to detect with the technology currently employed at security checkpoints. To evaluate whether or not NQR can be used to detect BCBs, a computational model is developed to assess how the dielectric properties of biological tissue affect the radio frequency magnetic field employed in NQR (0.5-5MHz). The relative permittivity of some biological tissue is very high (over 1,000 at 1MHz), making it conceivable that there is a significant effect on the electromagnetic field. To study this effect, the low-frequency approximation known as the Darwin model is employed. First, the electromagnetic field of a coil is calculated in free space. Second, a dielectric object or set of objects is introduced, and the free-space electric field is modified to accommodate the dielectric object ensuring that the relevant boundary conditions are obeyed. Finally, the magnetic field associated with the corrected electric field is calculated. This corrected magnetic field is evaluated with an NQR simulation to estimate the impact of dielectric tissue on NQR measurements. The effect of dielectric tissue is shown to be small, thus obviating a potential barrier to BCB detection. The NQR model presented may assist those designing excitation and detection coils for NQR. Some general coil design considerations and strategies are discussed.

  13. The Role of Social Context in Terrorist Attacks

    Science.gov (United States)

    Argo, Nichole

    2006-01-01

    An increasing number of studies on suicide bombing suggest that terrorism is not necessarily bound to religious extremism. The authors of this body of work, primarily drawn from political science and social psychology, agree that suicide bombings, with or without the trappings of religion, are largely a response to occupation, or, since September…

  14. Whole-blood phagocytic and bactericidal activities of atomic bomb survivors, Hiroshima and Nagasaki

    International Nuclear Information System (INIS)

    This in vitro study evaluated the phagocytic and bactericidal activities of leukocytes in aliquots of whole blood from Hiroshima and Nagasaki atomic bomb survivors for Staphylococcus aureus. The data were analyzed by multiple linear regression. Any significant effects of exposure to A-bomb radiation could not be detected for both phagocytic and bactericidal activities of whole blood from A-bomb survivors. In addition, there were no significant effects of age categories, sex or city, except in neutrophil counts. (J.P.N.)

  15. Incidence and impact of dog attacks on guide dogs in the UK: an update.

    Science.gov (United States)

    Moxon, R; Whiteside, H; England, G C W

    2016-04-01

    Data on dog attacks on Guide Dogs' stock were reviewed to investigate the characteristics of the attacks. An average of 11.2 attacks occurred each month. Nearly all of the attacks occurred in public areas, 68.4 per cent of victim dogs were qualified guide dogs and 55.5 per cent of victim dogs were working in harness when they were attacked. Guide Dogs' stock were injured in 43.2 per cent of attacks and veterinary costs for attacks were estimated at £34,514.30. Over 40 per cent of qualified guide dogs' working ability was affected and >20 per cent of qualified guide dogs required some time off from working after a dog attack. Twenty dogs were permanently withdrawn from the Guide Dogs' programme as a result of dog attacks, 13 of which were qualified and working with guide dog owners at the time of the withdrawal; this resulted in a financial cost of >£600,000 to the charity. More importantly perhaps, temporary and permanent withdrawals have a significant impact upon the mobility and independence of guide dog owners and in many cases significantly impacted their emotional well-being. PMID:26924739

  16. Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures

    Directory of Open Access Journals (Sweden)

    Yuanyuan Zhang

    2012-01-01

    Full Text Available Network coding has attracted the attention of many researchers in security and cryptography. In this paper, a well-known attack selective forwarding attack will be studied in network coding systems. While most of the works have been dedicated to the countermeasures against pollution attacks where an attacker modifies intermediate packets, only few works concern selective forwarding attacks on data or acknowledgment (ACK packets; those last ones are required in network coding. However, selective forwarding attacks stay a real threat in resource constraint networks such as wireless sensor networks, especially when selective forwarding attacks target the acknowledgment (ACK messages, referred to as flooding attack. In the latter model, an adversary can easily create congestion in the network and exhaust all the resources available. The degradation of the QoS (delay, energy goes beyond the capabilities of cryptographic solutions. In this paper, we first simulate and analyze the effects of selective forwarding attacks on both data flows and ACK flows. We then investigate the security capabilities of multipath acknowledgment in more details than in our original proposal (Zhang et al., 2011.

  17. Incidence and impact of dog attacks on guide dogs in the UK: an update.

    Science.gov (United States)

    Moxon, R; Whiteside, H; England, G C W

    2016-04-01

    Data on dog attacks on Guide Dogs' stock were reviewed to investigate the characteristics of the attacks. An average of 11.2 attacks occurred each month. Nearly all of the attacks occurred in public areas, 68.4 per cent of victim dogs were qualified guide dogs and 55.5 per cent of victim dogs were working in harness when they were attacked. Guide Dogs' stock were injured in 43.2 per cent of attacks and veterinary costs for attacks were estimated at £34,514.30. Over 40 per cent of qualified guide dogs' working ability was affected and >20 per cent of qualified guide dogs required some time off from working after a dog attack. Twenty dogs were permanently withdrawn from the Guide Dogs' programme as a result of dog attacks, 13 of which were qualified and working with guide dog owners at the time of the withdrawal; this resulted in a financial cost of >£600,000 to the charity. More importantly perhaps, temporary and permanent withdrawals have a significant impact upon the mobility and independence of guide dog owners and in many cases significantly impacted their emotional well-being.

  18. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  19. Clinical study of infectious diseases on aged A-bomb survivors in Hiroshima Welfare Home for aged A-bomb survivors

    International Nuclear Information System (INIS)

    Infections, especially urinary passage and respiratory infections of aged A-bomb survivers under special protective care was examined. Urinary passage infections have recently shown an increasing tendency. These infections are related to the factors such as their basic diseases and wearing napkins rather than a severe degree of protective care. In the case of respiratory infection, diseases such as influenza are observed rather in patients who can walk, but they tend to be aggravated in bedridden patients. It cannot be said that more urinary passage infections are observed in A-bomb survivers than non A-bomb survivers. Both urinary passage infection and respiratory infection tend to recur repeatedly. Aged A-bomb survivers show no significant difference of acquired immunity from that of non A-bomb survivers group. However, a maintenance of neutralizing antibody by vaccination of influenza in the former is worse than in the latter. Bedridden patients show a higher rate of infection to potential urinary passage diseases than patients who can walk, irrespective of sex. Moreover, bedridden patients have a large number of bacteria, but other significant host reaction couldn't be observed. In bedridden patients with potential urinary passage infection, a variety of bacteria, most of which are bacteria resistant to rutinely used broad spectrum antibiotics, is detected. As a main disease or a direct cause of death, pyelonephritis in women and bronchopneumonia are often observed. (Iwagami, H.)

  20. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  1. Automated Detection System for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Dr K.V.N.Sunitha

    2010-10-01

    Full Text Available Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL Injection vulnerability (SQLIV, which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. The intent is that Web applications will limit the kinds of queries that can be generated to a safe subset of all possible queries, regardless of what input users provide. SQL Injection attacks are possible due to the design drawbacks of the web sites, which interact with back-end databases. Successful attacks may damage more. We introduce a system that deals with new automated technique for preventing SQLIA based on the novel concept of regular expressions is to detect SQL Injection attacks. The proposed system can detect the attacks that are from Internet and Insider Attacks, by analyzing the packets of the network servers.

  2. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    R.J.J.H. van Son

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  3. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  4. Leo Szilard Lectureship Award Lecture: North Korea: Reactors, bombs and people

    Science.gov (United States)

    Hecker, Siegfried

    2012-03-01

    In November 2010, during my seventh trip to North Korea, Pyongyang produced a big surprise--it decided to build its own light-water reactor and uranium enrichment plant. During my first visit I was shown plutonium produced in its Yongbyon nuclear complex to convince me they have the bomb. For nearly 40 years, Pyongyang has moved along parallel paths of nuclear energy and nuclear weapons, opting to chose bombs over electricity. I will discuss how North Korea got the bomb, why it got it, and the prospects of whether or not it will give up the bomb. Finally, I will try to show with photos and stories of how North Korea is not such a hermit kingdom after all.

  5. The recovery and analysis of mitochondrial DNA from exploded pipe bombs.

    Science.gov (United States)

    Foran, David R; Gehring, Michael E; Stallworth, Shawn E

    2009-01-01

    Improvised explosive devices (IEDs) represent one of the most common modes of arbitrarily injuring or killing human beings. Because of the heat generated by, and destruction to, an IED postconflagration, most methods for identifying who assembled the device are ineffective. In the research presented, steel pipe bombs were mock-assembled by volunteers, and the bombs detonated under controlled conditions. The resultant shrapnel was collected and swabbed for residual cellular material. Mitochondrial DNA profiles were generated and compared blind to the pool of individuals who assembled the bombs. Assemblers were correctly identified 50% of the time, while another 19% could be placed into a group of three individuals with shared haplotypes. Only one bomb was assigned incorrectly. In some instances a contaminating profile (mixture) was also observed. Taken together, the results speak to the extreme sensitivity the methods have for identifying those who assemble IEDs, along with precautions needed when collecting and processing such evidence.

  6. Long-Term Health Effects of Atom Bomb on Japan Not as Bad as Feared: Study

    Science.gov (United States)

    ... Long-Term Health Effects of Atom Bomb on Japan Not as Bad as Feared: Study Survivors of ... 2011 at a nuclear power plant in Fukushima, Japan, after an earthquake triggered a massive tsunami shows ...

  7. Ellerman bombs at high resolution III. Simultaneous observations with IRIS and SST

    CERN Document Server

    Vissers, Gregal J M; Rutten, Robert J; Carlsson, Mats; De Pontieu, Bart

    2015-01-01

    Ellerman bombs are transient brightenings of the extended wings of the solar Balmer lines in emerging active regions. We describe their properties in the ultraviolet lines sampled by the Interface Region Imaging Spectrograph (IRIS), using simultaneous imaging spectroscopy in H$\\alpha$ with the Swedish 1-m Solar Telescope (SST) and ultraviolet images from the Solar Dynamics Observatory for Ellerman bomb detection and identification. We select multiple co-observed Ellerman bombs for detailed analysis. The IRIS spectra strengthen the view that Ellerman bombs mark reconnection between bipolar kilogauss fluxtubes with the reconnection and the resulting bi-directional jet located within the solar photosphere and shielded by overlying chromospheric fibrils in the cores of strong lines. The spectra suggest that the reconnecting photospheric gas underneath is heated sufficiently to momentarily reach stages of ionization normally assigned to the transition region and the corona. We also analyze similar outburst phenome...

  8. Research on dose by instant nuclear radiation from neutron bomb explosion

    International Nuclear Information System (INIS)

    Objective: To research the spatial distribution of personal absorbed dose (Dp(10)) about instant neutrons and γ-radiations at different ranges in the explosive field of neutron bomb. Methods: based on the analysis to the construction and the explosive principle of neutron bombs, a model for calculation was built, and Monte Carlo method was used. Results: Some features about personal absorbed dose (Dp(10)) of instant neutrons and γ-radiations at different ranges in space were observed. Conclusion: The authors hold that the strong γ-radiations would accompany the high-energy neutron radiation in the explosive field of neutron bombs. Meanwhile, the authors evaluated the killing effect of the instant radiation from a 1 kt neutron bomb

  9. Pattern of injury in those dying from traumatic amputation caused by bomb blast.

    Science.gov (United States)

    Hull, J B; Bowyer, G W; Cooper, G J; Crane, J

    1994-08-01

    Traumatic amputation of limbs caused by bomb blast carries a high risk of mortality. This paper describes 73 amputations in 34 deaths from bomb blast in Northern Ireland. The principal aim was to determine the sites of traumatic amputation to provide a biophysical basis for the development of protective measures. Few amputations were through joints; nearly all were through the bone shafts. The most common site in the tibia was the upper third. The distribution of femoral sites resulting from car bombs differed from that characterizing other types of explosion. For car bombs the principal site of amputation was the upper third; for other types of device it was the lower third. It is concluded that flailing is not a notable contributor to limb avulsion. The pattern of amputation is consistent with direct local pressure loads leading to bone fracture; the amputation itself is a secondary event arising from the flow of combustion products. PMID:7953338

  10. Pattern of injury in those dying from traumatic amputation caused by bomb blast.

    Science.gov (United States)

    Hull, J B; Bowyer, G W; Cooper, G J; Crane, J

    1994-08-01

    Traumatic amputation of limbs caused by bomb blast carries a high risk of mortality. This paper describes 73 amputations in 34 deaths from bomb blast in Northern Ireland. The principal aim was to determine the sites of traumatic amputation to provide a biophysical basis for the development of protective measures. Few amputations were through joints; nearly all were through the bone shafts. The most common site in the tibia was the upper third. The distribution of femoral sites resulting from car bombs differed from that characterizing other types of explosion. For car bombs the principal site of amputation was the upper third; for other types of device it was the lower third. It is concluded that flailing is not a notable contributor to limb avulsion. The pattern of amputation is consistent with direct local pressure loads leading to bone fracture; the amputation itself is a secondary event arising from the flow of combustion products.

  11. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  12. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  13. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  14. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  15. Biological Profiles of Korean Atomic Bomb Survivors in Residence at Daegu and Kyungbuk, Republic of Korea

    OpenAIRE

    Jhun, Hyung-Joon; Kim, Byoung-Gwon; Park, Jong-Tae; Kim, Su-Young; Koo, Bon-Min; Kim, Jin-Kook

    2008-01-01

    In 1945, many Koreans, in addition to Japanese, were killed or injured by the atomic bombs dropped on Hiroshima and Nagasaki, Japan. This study compared the biological profiles of Korean atomic bomb survivors in residence at Daegu and Kyungbuk, Republic of Korea with those of a representative sample of Koreans obtained during a similar period. We evaluated anthropometric measurements, blood pressure, blood cell counts, blood chemistry, and urinalysis of survivors (n=414) and age- and sex-matc...

  16. Non-cancer Diseases of Korean Atomic Bomb Survivors in Residence at Hapcheon, Republic of Korea

    OpenAIRE

    Ju, Young-Su; Jhun, Hyung-Joon; Kim, Jung-Bum; Kim, Jin-Kook

    2006-01-01

    Many Koreans, in addition to Japanese, were killed or injured by the atomic bombs detonated over Hiroshima and Nagasaki, Japan, in 1945. Our study examined non-cancer diseases of Korean A-bomb survivors in residence at Hapcheon, Republic of Korea and evaluated whether they had significantly higher prevalence of non-cancer diseases than non-exposed people. We evaluated a number of tests, including anthropometric measurements, blood pressure, blood chemistry, hepatitis B surface antigen, and ur...

  17. Greetings: 50 years of Atomic Bomb Casualty Commission–Radiation Effects Research Foundation studies

    OpenAIRE

    Shigematsu, Itsuzo

    1998-01-01

    The Atomic Bomb Casualty Commission was established in Hiroshima in 1947 and in Nagasaki in 1948 under the auspices of the U.S. National Academy of Sciences to initiate a long-term and comprehensive epidemiological and genetic study of the atomic bomb survivors. It was replaced in 1975 by the Radiation Effects Research Foundation which is a nonprofit Japanese foundation binationally managed and supported with equal funding by the governments of Japan and the United Sta...

  18. Effects of the Atomic Bomb Explosion in Nagasaki : A Medical Perspective 1

    OpenAIRE

    Kishikawa, Masao; Mine, Mariko; Okumura, Yutaka

    1991-01-01

    A review of the medical effects of the Nagasaki atomic bomb explosion encountered between 1945 and 1990 was conducted. In the early stage, severe and various manifestations due to a combination of heat rays, blast and radiation were detected, but the accurate number of deaths among victims during this early period remains obscure. Keloid scars, cataract, leukemia, thyroid cancer, breast cancer and lung cancer have been established as diseases related to the atomic bomb explosion. Recent epide...

  19. The incidence of leukemia, lymphoma, and multiple myeloma among atomic bomb survivors: 1950 – 2001

    OpenAIRE

    Hsu, Wan-Ling; Preston, Dale L.; Soda, Midori; Sugiyama, Hiromi; Funamoto, Sachiyo; Kodama, Kazunori; Kimura, Akiro; Kamada, Nanao; Dohy, Hiroo; Tomonaga, Masao; Iwanaga, Masako; Miyazaki, Yasushi; Cullings, Harry M.; Suyama, Akihiko; Ozasa, Kotaro

    2013-01-01

    A marked increase in leukemia risks was the first and most striking late effect of radiation exposure seen among the Hiroshima and Nagasaki atomic bomb survivors. This paper presents analyses of radiation effects on leukemia, lymphoma, and multiple myeloma incidence in the Life Span Study cohort of atomic bomb survivors updated 14 years since the last comprehensive report on these malignancies. These analyses make use of tumor- and leukemia-registry-based incidence data on 113,011 cohort memb...

  20. Medical Database for the Atomic-Bomb Survivors at Nagasaki University

    OpenAIRE

    Mori, Hiroyuki; Mine, Mariko; Kondo, Hisayoshi; Okumura, Yutaka

    1992-01-01

    The Scientific Data Center for Atomic-Bomb Disasters at Nagasaki University was established in 1974. The database of atomicbomb survivors has been in operation since 1977. The database is composed of following 6 physical database : (1) Fundamental information database. (2) Atomic-Bomb Hospital database, (3) Pathological database, (4) Household reconstruction database, (5) Second generation database, and (6) Address database. We review the current contents of the database for its further appli...

  1. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  2. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    Science.gov (United States)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  3. European Markets’ Reactions to Exogenous Shocks: A High Frequency Data Analysis of the 2005 London Bombings

    Directory of Open Access Journals (Sweden)

    Christos Kollias

    2013-11-01

    Full Text Available Terrorist incidents exert a negative, albeit usually short-lived, impact on markets and equity returns. Given the integration of global financial markets, mega-terrorist events also have a high contagion potential with their shock waves being transmitted across countries and markets. This paper investigates the cross-market transmission of the London Stock Exchange’s reaction to the terrorist attacks of 2005. It focuses on how this reaction was transmitted to two other major European stock exchanges: Frankfurt and Paris. To this effect, high frequency intraday data are used and multivariate Genralised Autorgressive Conditional Heteroskedasticity (GARCH models are employed. This type of data help reveal a more accurate picture of markets’ reaction to exogenous shocks, such as a terrorist attack, and thus allow more reliable inferences. Findings reported herein indicate that the volatility of stock market returns is increased in all cases examined.

  4. An Network Attack Modeling Method Based on MLL-AT

    Science.gov (United States)

    Fen, Yan; Xinchun, Yin; Hao, Huang

    In this paper, the method of modeling attack using attack tree is researched. The main goal is effectively using attack tree to model and express multi-stage network attacks. We expand and improve the traditional attack tree. The attack nodes in traditional attack tree are redefined, and the attack risk of leaf node is quantified. On those basis, the mentality and method of building MLL-AT (Multi-Level & Layer Attack Tree) are proposed. The improved attack tree can model attack more accurately, in particular to multi-stage network attacks. And the new model can also be used to evaluate system's risk, to distinguish between varying system security threat degrees caused by different attack sequences.

  5. The night of the physicists. Heisenberg, Hahn, Weizsaecker, and the German bomb; Die Nacht der Physiker. Heisenberg, Hahn, Weizsaecker und die deutsche Bombe

    Energy Technology Data Exchange (ETDEWEB)

    Schirach, Richard von

    2014-07-01

    Finally the German atomic physicists around Heisenberg, von Weizsaecker, and Hahn worked on their ''uranium machine'' in a Swabian beer-cellar - and took themselves for the world elite of nuclear research. In imprisonment they heared from the dropping of the Hiroshima bomb - a shock. Richard von Schirach shows the hindered ''fathers of the German atomic bomb'' in close-up, their eagerness, their hybris, their true importance, and their attempts to give after the war a new interpretation of their own role. A book, which raises in the sense of Duerrenmatt the question for the responsibility of science.

  6. ELLERMAN BOMBS AT HIGH RESOLUTION. II. TRIGGERING, VISIBILITY, AND EFFECT ON UPPER ATMOSPHERE

    Energy Technology Data Exchange (ETDEWEB)

    Vissers, Gregal J. M.; Rouppe van der Voort, Luc H. M.; Rutten, Robert J., E-mail: g.j.m.vissers@astro.uio.no [Institute of Theoretical Astrophysics, University of Oslo, P.O. Box 1029 Blindern, NO-0315 Oslo (Norway)

    2013-09-01

    We use high-resolution imaging spectroscopy with the Swedish 1-m Solar Telescope (SST) to study the transient brightenings of the wings of the Balmer H{alpha} line in emerging active regions that are called Ellerman bombs. Simultaneous sampling of Ca II 8542 A with the SST confirms that most Ellerman bombs also occur in the wings of this line, but with markedly different morphology. Simultaneous images from the Solar Dynamics Observatory (SDO) show that Ellerman bombs are also detectable in the photospheric 1700 A continuum, again with differing morphology. They are also observable in 1600 A SDO images, but with much contamination from C IV emission in transition-region features. Simultaneous SST spectropolarimetry in Fe I 6301 A shows that Ellerman bombs occur at sites of strong-field magnetic flux cancellation between small bipolar strong-field patches that rapidly move together over the solar surface. Simultaneous SDO images in He II 304 A, Fe IX 171 A, and Fe XIV 211 A show no clear effect of the Ellerman bombs on the overlying transition region and corona. These results strengthen our earlier suggestion, based on H{alpha} morphology alone, that the Ellerman bomb phenomenon is a purely photospheric reconnection phenomenon.

  7. Was Nazi Germany on the Road to an Atomic Bomb after all?

    Science.gov (United States)

    Lustig, Harry

    2006-04-01

    The story of Germany's efforts to develop a nuclear weapon during World War II is a much written about and contentious subject. However there has been agreement on one thing: by the end of the War the Germans had not achieved and were nowhere near to building a bomb. The dispute therefore has been about why Germany did not succeed. Now, from Germany, comes a challenge to this truth, in the provocative book Hitlers Bombe by Rainer Karlsch. The bombshell in Hitler's Bombe is the assertion that German scientists developed and tested a primitive fission and fusion nuclear weapon in March 1945. Karlsch bases this claim on testimony of witnesses in 1962, previously secret Russian documents, and the results of soil tests carried out in 2004 and 2005. However the physics is very murky and it seems out of the question that Germany had enough Uranium 235 or produced any Plutonium for a bomb. Hitlers Bombe also makes other, better documented and more credible revisionist assertions. These include the claim that the Nazis did continue to try to build a bomb after 1942 and that not Werner Heisenberg, but Kurt Diebner and Walther Gerlach were then the leaders of the German Uranium project. Karlsch's book therefore deserves more attention from physicists and historians than it has received in the United States.

  8. Personality and Major Depression among Directly Exposed Survivors of the Oklahoma City Bombing

    Directory of Open Access Journals (Sweden)

    Carol S. North

    2012-01-01

    Full Text Available Background. Few disaster studies have specifically examined personality and resilience in association with disaster exposure, posttraumatic stress disorder (PTSD, and major depression. Methods. 151 directly-exposed survivors of the Oklahoma City bombing randomly selected from a bombing survivor registry completed PTSD, major depression, and personality assessments using the Diagnostic Interview Schedule for DSM-IV and the Temperament and Character Inventory, respectively. Results. The most prevalent postdisaster psychiatric disorder was bombing-related PTSD (32%; major depression was second in prevalence (21%. Bombing-related PTSD was associated with the combination of low self-directedness and low cooperativeness and also with high self-transcendence and high harm avoidance in most configurations. Postdisaster major depression was significantly more prevalent among those with (56% than without (5% bombing-related PTSD (P<.001 and those with (72% than without (14% predisaster major depression (P<.001. Incident major depression was not associated with the combination of low self-directedness and low cooperativeness. Conclusions. Personality features can distinguish resilience to a specific life-threatening stressor from general indicators of well-being. Unlike bombing-related PTSD, major depression was not a robust marker of low resilience. Development and validation of measures of resilience should utilize well-defined diagnoses whenever possible, rather than relying on nonspecific measures of psychological distress.

  9. The Tokyo subway sarin attack-lessons learned

    International Nuclear Information System (INIS)

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin

  10. Strictosidine activation in Apocynaceae: towards a "nuclear time bomb"?

    Directory of Open Access Journals (Sweden)

    Guirimand Grégory

    2010-08-01

    strictosidine vacuolar pool upon enzyme-substrate reunion occurring during potential herbivore feeding constituting a so-called "nuclear time bomb" in reference to the "mustard oil bomb" commonly used to describe the myrosinase-glucosinolate defence system in Brassicaceae.

  11. Subclinical hyperthyroidism (Sh) in atomic-bomb survivors in Japan

    International Nuclear Information System (INIS)

    Full text: Purpose/Background Subclinical hyperthyroidism (Sh) is defined as a biochemical abnormality characterized by a subnormal level of TSH with otherwise normal thyroid tests (F T3, F T4) and no clinical symptoms. There are only a small number of cross-sectional studies on the prevalence of Sh. With the improvement of the sensitivity of TSH assay, it has become possible to survey the clinical significance of Sh. With regard to both Sh and subclinical hypothyroidism, discussions are being focused on such as the necessity of treatment. In order to elucidate the clinical significance of Sh, examination data of A-bomb survivors in Hiroshima and Nagasaki were analyzed. Subjects and Method Between 2000 and 2003, of 4,090 A-bomb survivors (1,352 males and 2,738 females with average age of 70.7), 75 individuals (1.83%) with Sh were found who had normal Free T4 (0.71∼1.51 ng/dL) and TSH<0.45 m U/L. Analysis was limited to those who had not taken antithyroid drugs or thyroxin, and the Sh group (n=35; 9 males and 26 females) was compared with a control group with TSH:0.45∼4.5 m U/L (Group C; N=3,243; 1,109 males and 2,134 females). Result: Nine individuals had TSH<0.1 m U/L. In the Sh group, six individuals were TPO antibody-positive (17%) and 14 were TG antibody-positive (40%); hence, TG antibody-positive was significantly greater in number (p=0.0096). Hematological biochemical tests showed no significant difference between the two groups. Electrocardiograms indicated that more individuals had atrial fibrillation [p=0.028; Odds ratio (OR)=3.98; 95% Confidential interval (CI)=1.2-13.7] or ventricular premature contraction [p=0.016; OR=3.29; 95% CI=1.3-8.6] in the Sh group. In terms of the presence or absence of diabetes, dyslipidemia, hypertension, and hyperuricemia, there was no difference between the two groups. One individual from the Sh group was confirmed to have Graves' disease two years later. Conclusion: Since more individuals in the Sh group were thyroid

  12. Biological dosimetry of atomic bomb survivors exposed within 500 meters from the hypocenter and the health consequences.

    Science.gov (United States)

    Kamada, N

    1999-12-01

    Seventy-eight atomic bomb survivors were examined for biological dosimetry using chromosome abnormality. They had been exposed within 500 meters from the hypocenter in heavily shielded conditions and were found from NHK-RIRBM joint study carried out from 1966 to 1971. Estimation of the exposure doses for these survivors was made under the following steps; 1) calculation by DS86 system (physically estimated doses) in survivors who had been exposed within 1,500 meters and had precise records of exposure conditions. RBE for the neutron was defined as 10. 2) setting of exposure dose-chromosome aberration curve, and 3) observation of chromosome aberrations in the proximally exposed survivors, for whom biological doses were estimated. Estimation of the exposure doses were possible from the aberration rate of chromosome in the peripheral lymphocytes, even 25-40 years after the exposure. Of the 78 survivors, 96% were estimated to have exposed more than one Sv. Detection of transforming gene(s) of N and K RAS genes in DNAs from non-leukemic survivors was carried out as one of the biological investigations for these heavily exposed survivors. All four survivors examined showed N or K RAS gene mutation. Three of the four healthy survivors had cancer or leukemia 7-10 years after the examination. Further continuous follow-up study of these heavily exposed people will give us more information on the late effects of A-bomb radiation, which may arise in the future. PMID:10805004

  13. Present status and self-reported diseases of the Korean atomic bomb survivors: a mail questionnaire survey.

    Science.gov (United States)

    Jhun, Hyung-Joon; Ju, Young-Su; Kim, Jung-Bum; Kim, Jin-Kook

    2005-01-01

    Many Koreans were forced to move to Japan while Korea was occupied by Japan. Consequently, when the atomic bombs were dropped on Hiroshima and Nagasaki an estimated 40,000 Koreans died and 30,000 survived. In 2004, 2,235 Koreans were registered as A-bomb survivors in South Korea. A mail questionnaire survey to evaluate the present status and self-reported diseases of the Korean survivors was conducted. In total, 1,256 questionnaires were returned and analysed. The most frequent chronic diseases reported by Korean survivors were hypertension (40.1 per cent), peptic ulcer disease (25.7 per cent), anaemia (23.3 per cent) and cataracts (23.1 per cent). The most frequent malignant diseases were stomach cancer (1.9 per cent), colon cancer (0.5 per cent) and leukaemia/multiple myeloma (0.4 per cent). This study suggests that further investigations are needed into the health concerns of the survivors and into health protection measures. PMID:16180735

  14. On the effectiveness of XML schema validation for countering XML signature wrapping attacks

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher; Somorovsky, Juraj;

    2011-01-01

    In the context of security of Web Services, the XML Signature Wrapping attack technique has lately received increasing attention. Following a broad range of real-world exploits, general interest in applicable countermeasures rises. However, few approaches for countering these attacks have been...... investigated closely enough to make any claims about their effectiveness. In this paper, we analyze the effectiveness of the specific countermeasure of XML Schema validation in terms of fending Signature Wrapping attacks. We investigate the problems of XML Schema validation for Web Services messages...

  15. Prodromes and predictors of migraine attack.

    Science.gov (United States)

    Rossi, Paolo; Ambrosini, Anna; Buzzi, M Gabriella

    2005-01-01

    Premonitory symptoms of migraine include a wide and heterogeneous collection of cognitive, psychic and physical changes preceding and forewarning of an attack by a few hours to 2-3 days. To date, premonitory symptoms have received little attention in the literature, being treated more as a curiosity than as a primary feature of migraine. This paper provides an extensive critical review of this neglected area of migraine research in the light of the recent advances in our understanding of the pathogenetic mechanisms of migraine. Epidemiological and clinical studies that have investigated the premonitory symptoms of migraine lack scientific rigour, producing conflicting results, whilst genetic and pathophysiological investigations are still in their very early stages. There is evidence supporting the idea that premonitory symptoms could be used as a phenotypical marker to identify subgroups of migraineurs which could show correlations with specific clinical expressions of the disease, genotypes, or responses to treatments. Future studies are needed to clarify the clinical, pathophysiological and therapeutic significance of premonitory symptoms. PMID:16483459

  16. PERFORMANCE ANALYSIS OF ADHOC ON DEMAND DISTANCE VECTOR PROTOCOL WITH BLACKHOLE ATTACK IN WSN

    Directory of Open Access Journals (Sweden)

    Adnan Ahmed

    2014-01-01

    Full Text Available The security is major challenging issue in wireless sensor network applications because they are operated in public and unrestrained areas which also makes difficult to protect against tampering or captured by an adversary force that can launch insider attacks to make a node compromised. One type of such attack is black hole attack. Existing AODV routing protocol does not have mechanism to defend against such attacks. In this study, we comprehensively investigates the performance of AODV protocol by simulating it on the various network parameters with various number of blackhole nodes. The metrics for evaluation has been considered as packet delivery ratio, end to end delay, normalized routing overhead and total number of packets drop. The simulation results show that blackhole attack severely degrades the performance of WSN.

  17. A Review of Current Routing Attacks in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Rashid Hafeez Khokhar

    2008-11-01

    Full Text Available A mobile ad hoc network (MANET is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various cryptographic techniques to countermeasure the routing attacks against MANET. However, these mechanisms are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power, because they introduce heavy traffic load to exchange and verifying keys. In this paper, the current security issues in MANET are investigated. Particularly, we have examined different routing attacks, such as flooding, blackhole, link spoofing, wormhole, and colluding misrelay attacks, as well as existing solutions to protect MANET protocols.

  18. Effect of hydrogen attack on acoustic emission behavior of low carbon steel

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    In order to investigate the effect of hydrogen attack degree on acoustic emission (AE) behavior of low carbon steel during tensiling, specimens made of low carbon steel was exposed to hydrogen gas of 18 MPa at 450 and 500℃ for 240, 480 and 720 h respectively. Experimental results show that with increase of the hydrogen attack degree, the totally AE activity decreases during tensiling. In addition, the count of AE signals with high amplitude for the specimens with hydrogen attack keeps a constant which is less than that without hydrogen attack. It is concluded that AE signals originate in the specimens with hydrogen attack from intergranular fracture induced by methane blisterings or/and microcracks on grain boundaries.

  19. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  20. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.