WorldWideScience

Sample records for bomb attack investigation

  1. Ancestry Analysis in the 11-M Madrid Bomb Attack Investigation

    OpenAIRE

    Phillips, Christopher; Prieto, Lourdes; Fondevila, Manuel; Salas, Antonio; G?mez-Tato, Antonio; ?lvarez-Dios, Jos?; Alonso, Antonio; Blanco-Verea, Alejandro; Bri?n, Mar?a; Montesino, Marta; Carracedo, ?ngel; Lareu, Mar?a Victoria

    2009-01-01

    The 11-M Madrid commuter train bombings of 2004 constituted the second biggest terrorist attack to occur in Europe after Lockerbie, while the subsequent investigation became the most complex and wide-ranging forensic case in Spain. Standard short tandem repeat (STR) profiling of 600 exhibits left certain key incriminatory samples unmatched to any of the apprehended suspects. A judicial order to perform analyses of unmatched samples to differentiate European and North African ancestry became a...

  2. Ancestry analysis in the 11-M Madrid bomb attack investigation.

    Directory of Open Access Journals (Sweden)

    Christopher Phillips

    Full Text Available The 11-M Madrid commuter train bombings of 2004 constituted the second biggest terrorist attack to occur in Europe after Lockerbie, while the subsequent investigation became the most complex and wide-ranging forensic case in Spain. Standard short tandem repeat (STR profiling of 600 exhibits left certain key incriminatory samples unmatched to any of the apprehended suspects. A judicial order to perform analyses of unmatched samples to differentiate European and North African ancestry became a critical part of the investigation and was instigated to help refine the search for further suspects. Although mitochondrial DNA (mtDNA and Y-chromosome markers routinely demonstrate informative geographic differentiation, the populations compared in this analysis were known to show a proportion of shared mtDNA and Y haplotypes as a result of recent gene-flow across the western Mediterranean, while any two loci can be unrepresentative of the ancestry of an individual as a whole. We based our principal analysis on a validated 34plex autosomal ancestry-informative-marker single nucleotide polymorphism (AIM-SNP assay to make an assignment of ancestry for DNA from seven unmatched case samples including a handprint from a bag containing undetonated explosives together with personal items recovered from various locations in Madrid associated with the suspects. To assess marker informativeness before genotyping, we predicted the probable classification success for the 34plex assay with standard error estimators for a naïve Bayesian classifier using Moroccan and Spanish training sets (each n = 48. Once misclassification error was found to be sufficiently low, genotyping yielded seven near-complete profiles (33 of 34 AIM-SNPs that in four cases gave probabilities providing a clear assignment of ancestry. One of the suspects predicted to be North African by AIM-SNP analysis of DNA from a toothbrush was identified late in the investigation as Algerian in origin. The

  3. Ancestry analysis in the 11-M Madrid bomb attack investigation.

    Science.gov (United States)

    Phillips, Christopher; Prieto, Lourdes; Fondevila, Manuel; Salas, Antonio; Gómez-Tato, Antonio; Alvarez-Dios, José; Alonso, Antonio; Blanco-Verea, Alejandro; Brión, María; Montesino, Marta; Carracedo, Angel; Lareu, María Victoria

    2009-08-11

    The 11-M Madrid commuter train bombings of 2004 constituted the second biggest terrorist attack to occur in Europe after Lockerbie, while the subsequent investigation became the most complex and wide-ranging forensic case in Spain. Standard short tandem repeat (STR) profiling of 600 exhibits left certain key incriminatory samples unmatched to any of the apprehended suspects. A judicial order to perform analyses of unmatched samples to differentiate European and North African ancestry became a critical part of the investigation and was instigated to help refine the search for further suspects. Although mitochondrial DNA (mtDNA) and Y-chromosome markers routinely demonstrate informative geographic differentiation, the populations compared in this analysis were known to show a proportion of shared mtDNA and Y haplotypes as a result of recent gene-flow across the western Mediterranean, while any two loci can be unrepresentative of the ancestry of an individual as a whole. We based our principal analysis on a validated 34plex autosomal ancestry-informative-marker single nucleotide polymorphism (AIM-SNP) assay to make an assignment of ancestry for DNA from seven unmatched case samples including a handprint from a bag containing undetonated explosives together with personal items recovered from various locations in Madrid associated with the suspects. To assess marker informativeness before genotyping, we predicted the probable classification success for the 34plex assay with standard error estimators for a naïve Bayesian classifier using Moroccan and Spanish training sets (each n = 48). Once misclassification error was found to be sufficiently low, genotyping yielded seven near-complete profiles (33 of 34 AIM-SNPs) that in four cases gave probabilities providing a clear assignment of ancestry. One of the suspects predicted to be North African by AIM-SNP analysis of DNA from a toothbrush was identified late in the investigation as Algerian in origin. The results achieved

  4. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  5. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  6. Suicide bomb attack causing penetrating craniocerebral injury

    OpenAIRE

    Hussain Manzar; Bari Muhammad Ehsan

    2013-01-01

    【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed wi...

  7. Suicide bomb attack causing penetrating craniocerebral injury.

    Science.gov (United States)

    Hussain, Manzar; Bari, Muhammad-Ehsan

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue. At 6 months'follow-up his right-sided power improved to against gravity.

  8. The pattern of thoracic trauma after suicide terrorist bombing attacks.

    Science.gov (United States)

    Bala, Miklosh; Shussman, Noam; Rivkind, Avraham I; Izhar, Uzi; Almogy, Gidon

    2010-11-01

    The worldwide escalation in the volume of suicide terrorist bombing attacks warrants special attention to the specific pattern of injury associated with such attacks. The goal of this study was to characterize thoracic injuries inflicted by terrorist-related explosions and compare pattern of injury to penetrating and blunt thoracic trauma. Prospectively collected database of patients with chest injury who were admitted to Hadassah Hospital Level I trauma centre, in Jerusalem, Israel, from October 2000 to December 2005. Patients were divided into three groups according to the mechanism of injury: terrorist explosions (n = 55), gunshot wounds (GSW; n = 78), and blunt trauma (n = 747). There were many female victims after suicide bombing attacks (49.1%) compared with GSW (21.8%) and blunt trauma (24.6%; p = 0.009). The number of body regions injured was significantly higher in the terror group compared with the GSW and blunt groups (median, 4, 2, and 3, respectively, p attacks was caused by a unique combination of the effects of the blast wave and penetrating shrapnel. More than half (52.7%) of the terror victims suffered from lung contusion and 25 (45.5%) required tube thoracostomy. Five patients (9.1%) underwent thoracotomy for lung lacerations (n = 3), injury to great vessels (n = 2), cardiac lacerations (n = 1), and esophageal injury (n = 1). Penetrating shrapnel was the mechanism of injury in all these cases. Injury inflicted by terrorist bombings causes a unique pattern of thoracic wounds. Victims are exposed to a combination of lung injury caused by the blast wave and penetrating injury caused by metallic objects.

  9. Radioactive decontamination for the terrorism attacks from 'dirty bomb'

    International Nuclear Information System (INIS)

    Shi Zhilan; Wang Shanqiang; Ma Xinhua

    2009-01-01

    Radioactive contamination source term characteristics for the terrorism attacks from 'dirty bomb' and its special demands of decontamination technology are analyzed in this paper. The development and direction of decontamination technology are also discussed. The suggestions are advanced, which decontaminate radioactive contamination caused by the terrorism attacks from 'dirty bomb'. (authors)

  10. Suicide to harass others: clues from mythology to understanding suicide bombing attacks.

    Science.gov (United States)

    Preti, Antonio

    2006-01-01

    Suicide by revenge, the Samsonic suicide, and the suicide by devotio, all described in classical mythology and also reported in the ethnographic literature, belong to the same class of suicidal behaviors as kamikaze suicide and the suicide bombing attack: suicide to harass and burden others or suicide with a hostile intent. The lack of a social dimension to share in a positive manner may lead an individual to integrate him/herself in another social structure, e.g., a military organization, which allows the individual to express his/her desires and personal identity only by destroying others and themselves. The dynamics of these forms of suicide are also likely to work in other displays of life-threatening behavior, such as family annihilation, mass murder, and spree killing. A more thorough investigation of the dynamics operating in suicide bombing attacks could, therefore, contribute to preventative strategies against violence at large.

  11. The Approach to Suicide Bombing Attacks: Changing Concepts.

    Science.gov (United States)

    Almgody, Gidon; Bala, Miklosh; Rivkind, Avraham I

    2008-06-01

    Suicide bombing attacks have emerged as a lethal weapon in the hands of terrorist groups. Our aim was to review the medical experience acquired in Israel, Spain, the United Kingdom and the United States in managing terrorist attacks, and prepare medical systems for the difficult task of managing these events. EMS protocols are amended to deal with a large number of victims in an urban setting who must be rapidly evacuated to a medical center where resuscitative as well as definitive care is delivered. A combination of extensive soft tissue damage caused by penetrating injuries, blast injury to the lungs and tympanic membranes, and burns are common among survivors. Preparation must include establishment of a clear chain-of-command lead by a general surgeon who manages the event and is responsible for decisions regarding OR preferences and ICU admissions. The emergency department is re-organized to handle the influx of numerous severely injured casualties. Professional personnel and resources are recruited and re-directed away from routine tasks towards treating the victims. This is achieved by deferring non-urgent operations, procedures and imaging studies. Victims are frequently re-assessed and re-evaluated to control chaos, minimize missed injuries and ensure delivery of an adequate level of care.

  12. Injury pattern of suicide bomb attacks in Pakistan.

    Science.gov (United States)

    Yasin, M M A; Nasreen, G; Malik, S A

    2012-04-01

    The aim of our study was to analyze the pattern of injuries, hospital care, and outcome of the victims of suicide bomb attacks in Pakistan. This prospective, cohort study was conducted at the Combined Military Hospital Rawalpindi during the last 3 years. Seriously injured patients in the "immediate category" were resuscitated in the emergency operation theater adjacent to the emergency room and, after resuscitation, the patients were transferred to the main operation theaters, where consultant surgeons were available. During the study period, 1,296 terrorist victims presented to the emergency department and (86.9%) were admitted, with a mean hospital stay of 8.2 ± 2.1 days. The majority of patients arrived by ambulance (91%) and only 38 (3%) were evacuated by air. Penetrating splinter injuries were the most prevalent (87%), and 29% patients also had associated injuries. Open bone fractures were found in 48% and 42% had injured hollow and solid viscous. Overall, 33% of patients had thoracic injuries and neuro-trauma was observed in 16% of the study population. Deafness was a feature in 33% patients, 121 had to undergo limb amputations, and mortality remained in 7% of patients. Most of the problems encountered were logistic in nature. Early evacuation of the victims remains pivotal in saving lives. The major causes of death in peripheral patients was hypovolemic shock, sepsis, and hypothermia. Mortality and morbidity can be enhanced by ample fluid resuscitation, tetanus prophylaxis, and proficient first aid at the site of injury.

  13. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  14. An autopsy case related to a terrorist attack using a ball-bearing bomb.

    Science.gov (United States)

    Takamiya, Masataka; Biwasaka, Hitoshi; Niitsu, Hisae; Saigusa, Kiyoshi; Aoki, Yasuhiro

    2009-03-01

    We encountered an autopsy case related to a terrorist attack using a ball-bearing bomb. The decedent was a 51-year-old male without significant medical histories. During dinner in a restaurant, the perpetrator suddenly exploded a ball-bearing bomb, the blast from which blew the victim off his chair. The victim was found to be unresponsive, and pronounced dead. X-ray photographs taken before autopsy revealed six spherical shadows. Three penetrating wounds in the head, one in the neck and chest, and two in the left upper arm were observed in vivo. Six projectiles recovered from the body were identified as ball-bearings, one of which traveled through the midbrain, diencephalon, and left temporal lobe. Although blast injuries and penetrating wounds are often combined in bomb attack victims, penetrating brain injury would be the cause of death in this case. Lethal injuries to major organs can thus occur even though the destructive force of a ball-bearing bomb is weak. X-ray films were informative for detecting the ball-bearings in this case, suggesting that autopsy imaging is essential in cases of terrorism victims.

  15. Probabilistic Project Management for a Terrorist Planning a Dirty Bomb Attack on a Major US Port [video

    OpenAIRE

    John, Richard

    2008-01-01

    Video: Richard John and Heather Rossoff: Probabilistic Project Management for a Terrorist Planning a Dirty Bomb Attack on a Major US Port. A talk for the Critical Infrastructure Protection (CIP) Metrics and Tools Conference, June 2008

  16. Discussion on protection and intervention actions in aftermath of a 'dirty bomb' attack

    International Nuclear Information System (INIS)

    Liu Liye; Zeng Zhi; Li Junli

    2009-01-01

    'Dirty bomb' attack differs from nuclear or radiological accidents in respects of occurrence site, radioactivity release mode and radiation effect scope. It would take place in densely populated downtown, with abruptness and uncertainty. This paper focuses on protection of initial respondors and some considerations in relation to protection and intervention actions in shelter and evacuation. Emphasis is placed on initial determination of emergency zone, devision of inner and outer alert area, and public protection measures, alongside the necessary suggestions recommended. (authors)

  17. Abdominal trauma after terrorist bombing attacks exhibits a unique pattern of injury.

    Science.gov (United States)

    Bala, Miklosh; Rivkind, Avraham I; Zamir, Gideon; Hadar, Tal; Gertsenshtein, Iryna; Mintz, Yoav; Pikarsky, Alon J; Amar, Dalit; Shussman, Noam; Abu Gazala, Mahmoud; Almogy, Gidon

    2008-08-01

    The recent growth in the volume of civilian blast trauma caused by terrorist bombings warrants special attention to the specific pattern of injury associated with such attacks. To characterize the abdominal injuries inflicted by terrorist-related explosions and to compare the pattern of injury with civilian, penetrating and blunt, abdominal trauma. Retrospective analysis of prospectively collected data from 181 patients with abdominal trauma requiring laparotomy, who were admitted to the Hadassah Hospital, Jerusalem, Israel, from October 2000 to December 2005. Patients were divided into 3 groups according to mechanism of injury: terror-related blast injury (n = 21), gunshot wounds (GSW) (n = 73) and blunt trauma (n = 87). Median injury severity score in the blast group was significantly higher compared with GSW and blunt groups (34, 18, and 29, respectively, P or = 3) occurred in 85.7% of blast group, 28.8% of GSW group, and 59.7% of blunt group (P Terrorist attacks generate more severe injuries to more body regions than other types of trauma. Abdominal injury inflicted by terrorist bombings causes a unique pattern of wounds, mainly injury to hollow organs. Shrapnel is the leading cause of abdominal injury following terrorist bombings.

  18. On the use of capillary electrophoresis for the determination of inorganic anions and cations, and carbohydrates in residues collected after a simulated suicide bombing attack.

    Science.gov (United States)

    Sarazin, Cédric; Delaunay, Nathalie; Costanza, Christine; Eudes, Véronique; Gareil, Pierre

    2013-01-15

    In order to train scientist field investigators after terrorist attacks, the laboratory of the Prefecture de Police of Paris simulated a suicide bombing attack in a bus. After collection of the residues, analyses were carried out to determine the composition of the original explosive charge. This article focuses on the combined use, for the first time, of three new capillary electrophoresis methods for the determination of inorganic anions and cations, and carbohydrates in two representative extracts. Capillary electrophoresis appears as an effective tool to identify and quantify the compounds in real extracts and is fully complementary to chromatographic methods. Copyright © 2012 Elsevier B.V. All rights reserved.

  19. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  20. Proximity to terror and post-traumatic stress: a follow-up survey of governmental employees after the 2011 Oslo bombing attack.

    Science.gov (United States)

    Hansen, Marianne B; Nissen, Alexander; Heir, Trond

    2013-01-01

    To assess the prevalence of post-traumatic stress disorder (PTSD) symptoms among governmental employees after the 2011 Oslo bombing attack targeted towards the Norwegian Ministries, and to explore the importance of proximity to the bomb explosion as a predictor of PTSD. A cross-sectional study. Data were collected from a survey 10 months after the Oslo bombing on 22 July 2011. A total of 3520 employees were invited to the study. Net samples comprised 1927 employees in 14 of the 17 Norwegian Ministries. The employees reported where they were at the time of the explosion. PTSD was assessed with the Norwegian version of the PTSD checklist (PCL). A total of 207 of the 1881 (11%) ministerial employees who completed the survey were present at work when the bomb exploded. Of these, a quarter (24%, 95% CI 18.4 to 30.0) had symptom levels equivalent to PTSD, while the prevalence was approximately 4% among those not present at work. In the latter group the prevalence was similar irrespective of whether their location was in Oslo, other places in Norway or abroad. Leadership responsibility was associated with lower risk for PTSD. The risk of PTSD is mainly associated with being present at work at the time of a terror attack. For those not present at work, the risk of PTSD is low and independent of proximity to the terror scene. The findings may have implications for planning and priority of healthcare services after a work place terror attack.

  1. Defining the need for blood and blood products transfusion following suicide bombing attacks on a civilian population: a level I single-centre experience.

    Science.gov (United States)

    Bala, Miklosh; Kaufman, Tali; Keidar, Asaf; Zelig, Orly; Zamir, Gideon; Mudhi-Orenshat, Sigalit; Bdolah-Abram, Tali; Rivkind, Avraham I; Almogy, Gidon

    2014-01-01

    Knowledge of patterns of blood use in the care of mass casualty settings is important for preparedness of medical centre resources and for maximising survival when blood supplies are limited. Our objectives were to review of our experience with the use of blood products and define the utilisation of blood transfusion following suicide bombing attacks. We conducted a retrospective analysis of blood and blood product transfusion following civilian bombing attacks at a level I trauma centre in Jerusalem, Israel from 2000 to 2005. The study group consisted of 137 patients who were admitted following 17 suicide bombing attacks which were carried out in Jerusalem during the 5-year period. Demographic data, number of units of blood and blood products transfused and the need for massive transfusions were recorded and analyzed. Fifty-three patients received blood transfusions (38.7%). There were 33 males (62.2%) with a median ISS of 13 (range 4-25). These 53 patients received 524 PRBC, 42 WB, and 449 FFP. The mean number of PRBC transfused/admitted patient was 3.82 units (range 0-59). Thirty patients (21.9%) received 236 PRBC (45% of total PRBC) at the first 2h. The ratio of ordered to transfused blood was 946:524. The FFP:PRBC ratio for all transfused patients was 1:1.17. The number of PRBC transfused per attack correlated with the number of patients admitted per attack. The most commonly transfused blood type was A (52.3%). Only 18 units of uncrossed-matched blood were transfused (3.3% of total). 14 patients (10.2%) received massive transfusions. These patients received 399 PRBC (76.1% of total units transfused) and the average number of PRBC transfused was 28.5/patient (10-59). More than 1/3 of casualties admitted following civilian bombing attacks received transfusions, most in the first 2h. Large-scale attacks will require more blood and blood products than small-scale attacks. Twice the number of PRBC ordered than transfused reflects a known trend for over

  2. Investigation of stomach diseases in atomic bomb survivors, 6

    International Nuclear Information System (INIS)

    Kato, Masafumi; Matsumoto, Yasuko; Mito, Kazuyo; Kumazawa, Toshihiko; Ito, Chikako.

    1986-01-01

    This is a report of the results of gastric mass survey performed during a 3-year period from 1982 through 1984. Included in this survey were 16,781 A-bomb survivors. The subjects were divided into three groups: a group exposed at ≤ 2,000 m from ground zero (Group 1), a group exposed at > 2,000 m from ground zero (Group 2), and a group consisting of those who entered the city after the bombing or others (Group 3). Regarding the rate for necessity of detailed examinations, there was no difference among the groups. The incidence of abnormal findings was 6.1 % in Group 1, 5.4 % in Group 2, and 4.9 % in Group 3, showing significant difference between Groups 1 and 3. Similarly, the incidence of respective disease was significantly higher in Group 1 than Group 3: gastritis was the most common (2.7 % vs 2.0 %), followed by gastric polyp (0.9 % vs 0.5 %) and gastric cancer (0.6 % vs 0.2 %). The age-adjusted incidence of gastric cancer and polyp was high, irrespective of sex, in Group 1. This was significant for gastric cancer in women and for gastric polyp in men. The incidence of gastric cancer in any age class was higher in Group 1 than Group 3. The incidence of gastric polyp tended to increase with aging in Group 1, being higher particularly for survivors over the age of 50 than those in Groups 2 and 3. (Namekawa, K.)

  3. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  4. A forensics investigation into attacks on Linux servers

    OpenAIRE

    Andrade, Jhonattan Javier Barriga; Gan, Diane; University of East London Staff

    2012-01-01

    The aim of this work was to probe a Linux server and then to identify the digital footprint left behind. This investigation focuses mainly on passive attacks using Linux BackTrack5 tools, including Metasploit, Nessus, Whatweb, Nmap, PHP-Backdoor and Weevely. These are commonly used tools which can determine the security flaws and vulnerabilities present that could be exploited. The results of the forensic evidence collection will then be analysed to determine how to identify passive attacks i...

  5. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  6. Investigation of impingement attack mechanism of copper alloy condenser tubes

    International Nuclear Information System (INIS)

    Fukumura, Takuya; Nakajima, Nobuo; Arioka, Koji; Totsuka, Nobuo; Nakagawa, Tomokazu

    2001-01-01

    In order to investigate generation and growth mechanisms of impingement attacks of sea water against copper alloy condenser tubes used in condensers of nuclear power plants, we took out condenser tubes from actual condensers, cut them into several pieces and carried out several material tests mainly for impinged spots. In addition water flow inside of a pit was analyzed. From the results of the investigation, it was found that all of impingement attacks were found in the marks left by sessile organisms and none were found in downstream of the marks as frequently proposed so far. At the pits generated inside the marks, iron coating was striped and zinc content was deficient in some cases. Combining these data and the result of flow analysis, we considered the following mechanism of the impingement attacks: sessile organisms clinging to the surface of the condenser tube and growth, occlusion of the tube, extinction and decomposition of sessile organisms, pollution corrosion under the organisms and cavity formation, occlusion removal by the cleaning, generation of impingement attacks by flow collision inside the cavity, growth of the impingement attacks. (author)

  7. Investigation of stomach diseases in atomic bomb survivors, 6. Gastric mass survey in atomic bomb survivors (1982 - 1984)

    Energy Technology Data Exchange (ETDEWEB)

    Kato, Masafumi; Matsumoto, Yasuko; Mito, Kazuyo; Kumazawa, Toshihiko; Ito, Chikako

    1986-11-01

    This is a report of the results of gastric mass survey performed during a 3-year period from 1982 through 1984. Included in this survey were 16,781 A-bomb survivors. The subjects were divided into three groups: a group exposed at less than or equal to 2,000 m from ground zero (Group 1), a group exposed at > 2,000 m from ground zero (Group 2), and a group consisting of those who entered the city after the bombing or others (Group 3). Regarding the rate for necessity of detailed examinations, there was no difference among the groups. The incidence of abnormal findings was 6.1% in Group 1, 5.4% in Group 2, and 4.9% in Group 3, showing significant difference between Groups 1 and 3. Similarly, the incidence of respective disease was significantly higher in Group 1 than Group 3: gastritis was the most common (2.7% vs 2.0%), followed by gastric polyp (0.9% vs 0.5%) and gastric cancer (0.6% vs 0.2%). The age-adjusted incidence of gastric cancer and polyp was high, irrespective of sex, in Group 1. This was significant for gastric cancer in women and for gastric polyp in men. The incidence of gastric cancer in any age class was higher in Group 1 than Group 3. The incidence of gastric polyp tended to increase with aging in Group 1, being higher particularly for survivors over the age of 50 than those in Groups 2 and 3. (Namekawa, K.).

  8. Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices

    Directory of Open Access Journals (Sweden)

    Nourhene Ellouze

    2014-10-01

    Full Text Available A Cardiac Implantable Medical device (IMD is a device, which is surgically implanted into a patient's body, and wirelessly configured using an external programmer by prescribing physicians and doctors. A set of lethal attacks targeting these devices can be conducted due to the use of vulnerable wireless communication and security protocols, and the lack of security protection mechanisms deployed on IMDs. In this paper, we propose a system for postmortem analysis of lethal attack scenarios targeting cardiac IMDs. Such a system reconciles in the same framework conclusions derived by technical investigators and deductions generated by pathologists. An inference system integrating a library of medical rules is used to automatically infer potential medical scenarios that could have led to the death of a patient. A Model Checking based formal technique allowing the reconstruction of potential technical attack scenarios on the IMD, starting from the collected evidence, is also proposed. A correlation between the results obtained by the two techniques allows to prove whether a potential attack scenario is the source of the patient's death.

  9. Dirty Bomb Attack: Assessing New York City’s Level of Preparedness from a First Responder’s Perspective

    Science.gov (United States)

    2006-03-01

    York Stock Exchange, with intelligence pointing toward a possible al-Qaeda attack at these financial institutions.24 Thus, a new battle - hymn has been...were not for the unwavering support of my loving family. I am grateful to my mother and father for their patience and encouragement. It is the lessons...economy.21 Hoffman also states that continuous rhetoric presented by Osama bin Laden exposes “[the U.S.] as a ‘paper tiger ,’ on the verge of

  10. BombCAD - A new tool for bomb defense in nuclear facilities

    International Nuclear Information System (INIS)

    Massa, D.J.; Howard, J.W.; Sturm, S.R.

    1988-01-01

    This paper describes a new tool for analysis of the specific vulnerability of diverse facilites to bomb attack and for computer-aided-design (CAD) of siting, screening and hardening/softening aspects of comprehensive bomb defense programs. BombCAD combines the extensive architectural and engineering data base and graphics capabilities of modern architectural CAD systems with the bomb effects computational capability of the ''SECUREPLAN'' BOMB UTILITY. BombCAD permits architects/engineers, security professionals and facility managers to analytically estimate and graphically display facility vulnerability and changes (reductions) in vulnerability which result from the adoption of various bomb defense measures

  11. The 2005 London terror attacks: An investigation of changes in psychological wellbeing and social capital pre- and post-attacks (2003-07)-A UK panel study.

    Science.gov (United States)

    Giordano, Giuseppe N; Lindström, Martin

    2016-12-01

    The London public transport suicide bombings, which occurred on 7th July 2005, were described as the worst single terrorist atrocity on British soil to date. Past acts of terrorism have been associated with deterioration in population mental health. They may also negatively impact levels of social capital, which is considered a buffer against poor mental health outcomes. By employing panel data from the British Household Panel Survey and following the same individuals (N T =9287) three times over a five-year period (2003, 2005 and 2007), the aim of this longitudinal multilevel study was to investigate: (i) the impact of terrorism on individual-level social capital (generalised trust and social participation) across the UK; and (ii) the buffering effects of social capital on psychological wellbeing (GHQ-12). By comparing 2005 and 2007 covariate values (including the two social capital proxies) against their pre-terror baseline (2003) measurements in two separate multilevel logistic regression models, we examined the immediate and longer-term effects of the 2005 attacks on our GHQ-12 outcome. Compared to baseline, generalised trust dropped from 44% to 36% immediately post-terror attacks in 2005, while local participation increased from 45.8% to 47.5%. Social capital levels started to return to baseline levels by 2007, yet both proxies maintained independent buffering effects against poor GHQ-12 scores in years 2005 and 2007. From this empirical evidence, it seems that though generalised trust levels are negatively affected by acts of terrorism, the accompanying increase in local active participation may aid in the re-establishment of societal norms and beliefs in later years. Decision makers should be aware that such atrocities may negatively impact on populations' generalised trust in the shorter-term. To safeguard against losing this buffer against poor mental health outcomes, local active participation should be encouraged.

  12. Panic attacks and hoarding disorder: an initial investigation.

    Science.gov (United States)

    Raines, Amanda M; Oglesby, Mary E; Short, Nicole A; Albanese, Brian J; Schmidt, Norman B

    2014-08-01

    Panic attacks (PAs) defined as a discrete period of intense fear or discomfort, occur in the context of numerous anxiety and mood related disorders. Research has suggested that PAs serve as a significant indicator and prognostic factor for overall symptom severity, course, and comorbidity within various conditions. Consequently, a PA specifier is now applicable to all DSM-5 disorders. Despite these clinical and nosological implications, no research to date has examined associations between PAs and hoarding disorder. The current investigation evaluated relationships between PA endorsement and hoarding severity within a sample of 32 patients with hoarding disorder. Findings suggested a high rate of panic history among those with hoarding disorder (56%). Hoarders with co-occurring PAs, compared to those without PAs, evidenced significantly higher symptom severity. Moreover, PAs continued to significantly predict hoarding severity even after controlling for relevant covariates. When examining the specific relationships among PAs and hoarding symptoms (i.e., acquiring, difficulty discarding, and clutter), the endorsement of PAs was associated with increased acquiring and difficulty discarding symptoms. These findings add considerably to a growing body of literature on hoarding disorder. Implications for the assessment and treatment of PAs that co-occur with hoarding disorder are discussed. Copyright © 2014 Elsevier Inc. All rights reserved.

  13. Dirty Bomb Risk and Impact

    Energy Technology Data Exchange (ETDEWEB)

    Connell, Leonard W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    We examined the relative risk and impact of a dirty bomb employing Co-60 and Cs-137, the two most common high activity source materials. We found that the risk of an area denial dirty bomb attack is greater for Cs-137 due to the form and chemistry of CsCl, the soft, powdery salt form currently in use for high activity Cs-137 sources, found in blood and research irradiators.

  14. Investigating bomb radiocarbon transport in the southern Pacific Ocean with otolith radiocarbon

    Science.gov (United States)

    Grammer, G. L.; Fallon, S. J.; Izzo, C.; Wood, R.; Gillanders, B. M.

    2015-08-01

    To explore the transport of carbon into water masses from the surface ocean to depths of ∼ 1000 m in the southwest Pacific Ocean, we generated time series of radiocarbon (Δ14C) from fish otoliths. Otoliths (carbonate earstones) from long-lived fish provide an indirect method to examine the "bomb pulse" of radiocarbon that originated in the 1950s and 1960s, allowing identification of changes to distributions of 14C that has entered and mixed within the ocean. We micro-sampled ocean perch (Helicolenus barathri) otoliths, collected at ∼ 400- 500 m in the Tasman Sea, to obtain measurements of Δ14C for those depths. We compared our ocean perch Δ14C series to published otolith-based marine surface water Δ14C values (Australasian snapper (Chrysophrys auratus) and nannygai (Centroberyx affinis)) and to published deep-water values (800-1000 m; orange roughy (Hoplostethus atlanticus)) from the southwest Pacific to establish a mid-water Δ14C series. The otolith bomb 14C results from these different depths were consistent with previous water mass results in the upper 1500 m of the southwest Pacific Ocean (e.g. World Ocean Circulation Experiment and Geochemical Ocean Sections Study). A comparison between the initial Δ14C bomb pulse rise at 400-500 m suggested a ventilation lag of 5 to 10 yr, whereas a comparison of the surface and depths of 800-1000 m detailed a 10 to 20 yr lag in the time history of radiocarbon invasion at this depth. Pre-bomb reservoir ages derived from otolith 14C located in Tasman Sea thermocline waters were ∼ 530 yr, while reservoir ages estimated for Tasman Antarctic intermediate water were ∼ 730 yr.

  15. An Investigation of Kernel Data Attacks and Countermeasures

    Science.gov (United States)

    2017-02-14

    demonstrate that attackers can stealthily subvert various kernel security mechanism s and develop a new keylogger , which is more stealthy than existing... keyloggers .. By classifying kernel data into different categories and handling them separately, we propose a defense mechanism and evaluate its...a computer system. 15. SUBJECT TERMS Kernel Data, Rootkit, Keylogger , Countermeasure 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b

  16. Atomic bomb cataracts

    International Nuclear Information System (INIS)

    Shiraeda, Kanji

    1992-01-01

    Eye disturbance caused by atomic bomb radiation can be divided into three groups: direct injury immediately after exposure, eye lesions associated with radiation syndrome, and delayed disturbance. The crystalline lens of the eye is the most radiosensitive. Atomic bomb cataract has been investigated in a number of studies. The first section of this chapter discusses radiation cataract in terms of the incidence and characteristics. The second section deals with atomic bomb cataract, which can be diagnosed based on the four criteria: (1) opacity of the crystalline lens, (2) a history of proximal exposure, (3) lack of eye disease complicating cataract, and (4) non-exposure to radiation other than atomic bombing. The prevalence of cataract and severity of opacity are found to correlate with exposure doses and age at the time of exposure. Furthermore, it is found to correlate with distance from the hypocenter, the condition of shielding, epilation, and the presence or absence or degree of radiation syndrome. (N.K.)

  17. Bomb parameters

    International Nuclear Information System (INIS)

    Kerr, George D.; Young, Rebert W.; Cullings, Harry M.; Christry, Robert F.

    2005-01-01

    The reconstruction of neutron and gamma-ray doses at Hiroshima and Nagasaki begins with a determination of the parameters describing the explosion. The calculations of the air transported radiation fields and survivor doses from the Hiroshima and Nagasaki bombs require knowledge of a variety of parameters related to the explosions. These various parameters include the heading of the bomber when the bomb was released, the epicenters of the explosions, the bomb yields, and the tilt of the bombs at time of explosion. The epicenter of a bomb is the explosion point in air that is specified in terms of a burst height and a hypocenter (or the point on the ground directly below the epicenter of the explosion). The current reassessment refines the energy yield and burst height for the Hiroshima bomb, as well as the locations of the Hiroshima and Nagasaki hypocenters on the modern city maps used in the analysis of the activation data for neutrons and TLD data for gamma rays. (J.P.N.)

  18. Cartel Car Bombings in Mexico

    Science.gov (United States)

    2013-08-01

    to have ties to drug traffickers. The Mexico City newspaper Universal reported that police said members of the family of Rafael Caro Quintero...targets of attack and likely the first to respond to a bomb scene. Police and other local level responders (emergency medical services), the Cruz Rojo

  19. Resilience emotions and acute stress reactions in the population of Dimona and the general population of Israel two days after the first suicide bombing attack in Dimona.

    Science.gov (United States)

    Amital, Daniela; Amital, Howard; Shohat, Galit; Soffer, Yechiel; Bar-Dayan, Yaron

    2012-05-01

    On 4 February 2008, two terrorists armed with suicide bombs arrived atthe open market in the southern Israeli city of Dimona. One detonated his bomb at approximately 10:30 a.m. causing multiple casualties. Short-term emotional effects and acute stress reactions usually appear among survivors after such incidents. To compare the differences in emotions and in disturbances of daily life activities that emerge a couple of days following such an event and to identify patterns of stress development among resilient and low-resilient members of the population in Dimona and in the general population of Israel. A telephone survey of two randomly selected representative samples of adults (428 Israeli residents and 250 Dimona residents) was conducted 2 days afterthe event. A higher prevalence of stress and fear and a lower prevalence of joy were reported among the population of Dimona compared to the general population in Israel (P population of Dimona was categorized by its personal degree of resilience (P population in Dimona (P < 0.01). This study demonstrates that following a public terror event, self-reported low-resilient subjects have a higher prevalence of disturbances in daily life activities, as well as adverse emotional responses. These differences must be addressed by the relevant social service agencies for immediate public intervention.

  20. Investigation Model for DDoS Attack Detection in Real-Time

    Directory of Open Access Journals (Sweden)

    Abdulghani Ali Ahmed

    2015-02-01

    Full Text Available Investigating traffic of distributed denial of services (DDoS attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack.

  1. 'DIRTY BOMB' and its countermeasures

    International Nuclear Information System (INIS)

    Wang Shanqiang; Zou Shiya; Zhang Wenzhong

    2008-01-01

    'Dirty bomb', one of the three nuclear and radiological terrorism attack events, is a kind of weapon using conventional explosive to disperse radioactive materials, which leads to harmful and serious environmental contamination with α, β, γ rays and neutron having high radioactivity activity. This paper mainly introduces the characteristics and hazards, and puts forward some recommendations to counter RDD based on current international and national situations in nuclear and radiological terrorisms. (authors)

  2. Emergency assistance provided abroad to insured travellers from Australia following the Bali bombing.

    Science.gov (United States)

    Leggat, Peter A; Leggat, Frances W

    2004-02-01

    Background. On 12 October 2002, terrorist bombs detonated in the Kuta entertainment district of Bali, Indonesia, a popular tourist destination for Australian travellers. This study was designed to investigate travel insurance claims reported by travellers from Australia requiring emergency assistance and/or aeromedical evacuation, as well as to examine the role of travel insurance and emergency assistance companies, following the Bali bombing. Methods. In 2003, all claims reported, following the Bali bombing attack on 12 October 2002, to a major Australian travel insurance company were examined for those claims that described the use of the insurer's emergency assistance contractor by travellers in Bali following the bombing. Results. Thirteen insured travellers used the emergency assistance service following the Bali bombing. Six travellers cancelled their trip to Bali. Five travellers, who were already abroad cancelled their trip to Bali and one was given evacuation assistance. One traveller required aeromedical evacuation by scheduled aircraft with glass injuries resulting from the bomb blast, and there was also assistance provided to significant others following the death of one insured traveller as a direct consequence of the bombing. Two travellers sought only claiming and policy advice and no claim was made. The mean refund, where a travel insurance claim was made, was AUD1185.09 (SD=AUD3047.31). Conclusions. This study highlights the importance of travellers taking out appropriate travel insurance, which provides for emergency assistance. Travel insurance agencies do play some role after emergencies such as the Bali bombing. This assistance involves predominantly dealing with cancellation of travellers' intended visits to the affected area, but does also involve some assistance to travellers evacuating from the crisis, including some who require aeromedical evacuation. Travellers should be advised to seek travel health advice well before departure overseas

  3. The media and dirty bombs

    International Nuclear Information System (INIS)

    Hanley, C.J.

    2003-01-01

    During the recent Jose Padilla 'dirty bomb' scare, an indignant US citizen wrote to his local newspaper in Florida complaining that the news media were giving terrorists a recipe for making dirty bombs. 'Unless the media eases up on scaring us, he wrote, the public won't feel safe even leaving their homes. Or perhaps that is what they want, he said, 'us staying inside our homes watching the news on how terrorists can destroy us all.' It seems our real motivations have finally been uncovered we in the media want to scare them so much they won't leave their TV screens. Based on the previous event an analysis of the role of media and journalists is discussed. Leaders of the news media would, first of all, universally advise full and rapid and authoritative disclosure of what is known. If it isn't coming quickly from the highest levels, then the news will soon deteriorate to what's being heard on the streets, from police officers and fire fighters and other emergency personnel, and from passers-by. Journalists are the first to acknowledge their ignorance.That is why they ask questions. However, they seem to learn fast. It was found that that the term dirty bomb never appeared on Associated Press news wires before the 11 September 2001 attacks. Now it appears every day, and increasingly we are getting the facts right and helping to prepare our audience of millions for this dangerous new world

  4. An Experimental Investigation of Flow past a Wing at high Angles of Attack

    Science.gov (United States)

    Dalela, Vipul; Mukherjee, Rinku

    2017-11-01

    The aerodynamic characteristics for post-stall angles of attack past a single and/or multiple 3D wing(s) have been studied using a novel `decambering technique' assuming the flow to be steady. It is expected that the location of separation as well as the strength of the separated flow is unsteady. The objective of this work therefore is to investigate flow at high angles of attack considering unsteady behavior. The numerical technique used for this purpose that accounts for loss in camber due to flow separation is termed as `decambering'. Two linear functions are used to define the `decambering' for the steady case, located at the leading edge and anywhere between 50%-80% chord. Wind tunnel experiments are to be conducted to study the unsteady nature of separated flow using flow visualization techniques. An estimation of the unsteady wake will be of paramount importance. It is expected to get an experimental corroboration for the numerical decambering. A NACA 4415 wing section is being tested for a range of Reynolds numbers. It is observed from the preliminary results that the drag becomes more dominant after increasing the Reynolds number from Re = 0.093 ×106 to Re = 0.128 ×106 resulting a gentle decrease in the lift coefficient, Cl.

  5. United States Seaport Security: Protection Against a Nuclear Device Attack Delivered in a Shipping Cargo Container

    Science.gov (United States)

    2014-06-13

    military targets in various countries, including the 11 September 2001 attacks, 1998 U.S. Embassy bombings , USS Cole bombings , and 2002 Bali bombings ...off a radioactive dirty bomb , and on 29 June Moldavian undercover security agents posing as a North African buyer arrested six men trying to sell...eighteen grams of highly enriched uranium, which were weapons grade. Although a minimum of twenty-five grams is needed to create a dirty bomb , a terrorist

  6. Suicide in paradise: aftermath of the Bali bombings.

    Science.gov (United States)

    Suryani, L K; Page, A; Lesmana, C B J; Jennaway, M; Basudewa, I D G; Taylor, R

    2009-08-01

    The relationship between the Bali (Indonesia) bombings of October 2002 and suicide has not previously been investigated, despite anecdotal evidence of the economic and psychological consequences of these attacks. Suicide rates were calculated over the period 1994-2006 in three Bali regencies to determine whether suicide increased in the period following the first Bali bombings. Poisson regression and time-series models were used to assess the change in suicide rates by sex, age and area in the periods before and after October 2002. Suicide rates (age-adjusted) increased in males from an average of 2.84 (per 100 000) in the period pre-2002 to 8.10 in the period post-2002, and for females from 1.51 to 3.68. The greatest increases in suicide in the post-2002 period were in the age groups 20-29 and 60 years, for both males and females. Tourist arrivals fell significantly after the bombings, and addition of tourism to models reduced relative risk estimates of suicide, suggesting that some of the increase may be attributable to the socio-economic effects of declines in tourism. There was an almost fourfold increase in male suicide risk and a threefold increase in female suicide risk in the period following the 2002 bombings in Bali. Trends in tourism did not account for most of the observed increases. Other factors such as indirect socio-economic effects and Balinese notions of collective guilt and anxieties relating to ritual neglect are important in understanding the rise in suicide in the post-2002 period.

  7. Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks

    Directory of Open Access Journals (Sweden)

    Wenjuan Li

    2018-01-01

    Full Text Available Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN has thus been developed by allowing intrusion detection system (IDS nodes to exchange data with each other. Insider attacks are a great threat for such types of collaborative networks, where an attacker has the authorized access within the network. In literature, a challenge-based trust mechanism is effective at identifying malicious nodes by sending challenges. However, such mechanisms are heavily dependent on two assumptions, which would cause CIDNs to be vulnerable to advanced insider attacks in practice. In this work, we investigate the influence of advanced on–off attacks on challenge-based CIDNs, which can respond truthfully to one IDS node but behave maliciously to another IDS node. To evaluate the attack performance, we have conducted two experiments under a simulated and a real CIDN environment. The obtained results demonstrate that our designed attack is able to compromise the robustness of challenge-based CIDNs in practice; that is, some malicious nodes can behave untruthfully without a timely detection.

  8. Dirty bombs : the technical aspects of radiological dispersion devices

    OpenAIRE

    Visger, Benjamin Felix

    2004-01-01

    Approved for public release; distribution is unlimited. Considering the ever-rising threat of terrorist attack and disruption of the economy and of daily activity, the potential strength of a radiological dispersion device must be evaluated. A "dirty bomb" is a weapon in the terrorist arsenal that is highly effective in creating chaos, panic and disruption. All of the immediate deaths caused by a "dirty bomb" are due to blast effects, however the public association with radiation and nucle...

  9. Investigating multi-thread utilization as a software defence mechanism against side channel attacks

    CSIR Research Space (South Africa)

    Frieslaar, Ibraheem

    2016-11-01

    Full Text Available out information at critical points in the cryptographic algorithm and confuse the attacker. This research demonstrates it is capable of outperforming the known countermeasure of hiding and shuffling in terms of preventing the secret information from...

  10. Korean atomic bomb victims.

    Science.gov (United States)

    Sasamoto, Yukuo

    2009-01-01

    After colonizing Korea, Japan invaded China, and subsequently initiated the Pacific War against the United States, Britain, and their allies. Towards the end of the war, U.S. warplanes dropped atomic bombs on Hiroshima and Nagasaki, which resulted in a large number of Koreans who lived in Hiroshima and Nagasaki suffering from the effects of the bombs. The objective of this paper is to examine the history of Korea atomic bomb victims who were caught in between the U.S., Japan, the Republic of Korea (South Korea) and the Democratic People's Republic of Korea (North Korea).

  11. Investigation on asymmetric flow over a blunt-nose slender body at high angle of attack

    Science.gov (United States)

    Zhongyang, Qi; Yankui, Wang; Lei, Wang; Qian, Li

    2017-12-01

    The asymmetric vortices over a blunt-nose slender body are investigated experimentally and numerically at a high angle of attack (AoA, α = 50°) and a Reynolds number of Re D = 1.54 × 105 on the basis of an incoming free-stream velocity and diameter (D) of the model. A micro-perturbation in the form of a hemispherical protrusion with a radius of r = 0.012D is introduced and attached on the nose of the slender body to control the behavior of the asymmetric vortices. Given the predominant role of micro perturbation in the asymmetric vortex pattern, a square wave, which is singly periodic, is observed for side-force variation by setting the circumferential angle (θ) of the micro perturbation from 0° to 360°. The asymmetric vortex pattern and the corresponding side force are manageable and highly dependent on the location of perturbation. The flow structure over the blunt-nose slender body is clarified by building a physical model of asymmetric vortex flow structure in a regular state at a high AoA (α = 50°). This model is divided into several regions by flow structure development along the model body-axis, i.e., inception region at x/D ≤ 3.0, triple-vortex region at 3.0 ≤ x/D ≤ 6.0, four-vortex region at 6.0 ≤ x/D ≤ 8.5, and five-vortex region at 8.5 ≤ x/D ≤ 12. The model reveals a complicated multi-vortex system. The associated pressure distributions and flow characteristics are discussed in detail.

  12. Atomic bomb and leukemia

    International Nuclear Information System (INIS)

    Ichimaru, M.; Tomonaga, M.; Amenomori, T.; Matsuo, T.

    1991-01-01

    Characteristic features of the leukemia among atomic bomb survivors were studied. Dose estimates of atomic bomb radiation were based on T65D, but the new dosimetry system DS86 was used for some analyses. The ratio of a single leukemia type to all leukemias was highest for chronic myelogenous leukemia (CML) in Hiroshima, and the occurrence of CML was thought to be most characteristic to atomic bomb radiation induced leukemia. The threshold of CML occurrence in Hiroshima is likely to be between 0.5∼0.09 Gy. However, the threshold of acute leukemia appears to be nearly 1 Gy. In the distribution of acute myeloid leukemia (AML) subtypes by French-American-British classification, there was no M3 case in 1 Gy or more group, although several atypical AML cases of survivors were observed. Although aplastic anemia has not increased as a late effect of the atomic bomb radiation exposure, many atypical leukemia or other myeloproliferative diseases who had been diagnosed as aplastic anemia or its related diseases have been experienced among atomic bomb survivors. Chromosome study was conducted using colony forming cells induced by hemopoietic stem cells of peripheral blood of proximal survivors. Same chromosome aberrations were observed in colony forming cells and peripheral T-cells in several atomic bomb survivors. (author)

  13. Atomic bomb and leukemia

    Energy Technology Data Exchange (ETDEWEB)

    Ichimaru, M.; Tomonaga, M.; Amenomori, T.; Matsuo, T. (Nagasaki Univ. (Japan). School of Medicine)

    1991-12-01

    Characteristic features of the leukemia among atomic bomb survivors were studied. Dose estimates of atomic bomb radiation were based on T65D, but the new dosimetry system DS86 was used for some analyses. The ratio of a single leukemia type to all leukemias was highest for chronic myelogenous leukemia (CML) in Hiroshima, and the occurrence of CML was thought to be most characteristic to atomic bomb radiation induced leukemia. The threshold of CML occurrence in Hiroshima is likely to be between 0.5{approx}0.09 Gy. However, the threshold of acute leukemia appears to be nearly 1 Gy. In the distribution of acute myeloid leukemia (AML) subtypes by French-American-British classification, there was no M3 case in 1 Gy or more group, although several atypical AML cases of survivors were observed. Although aplastic anemia has not increased as a late effect of the atomic bomb radiation exposure, many atypical leukemia or other myeloproliferative diseases who had been diagnosed as aplastic anemia or its related diseases have been experienced among atomic bomb survivors. Chromosome study was conducted using colony forming cells induced by hemopoietic stem cells of peripheral blood of proximal survivors. Same chromosome aberrations were observed in colony forming cells and peripheral T-cells in several atomic bomb survivors. (author).

  14. Encrypted Jihad: Investigating the Role of Telegram App in Lone Wolf Attacks in the West

    Directory of Open Access Journals (Sweden)

    Ahmad Shehabat

    2017-10-01

    Full Text Available The study aims to capture links between the use of encrypted communication channel -Telegram and lone wolf attacks occurred in Europe between 2015-2016. To understand threads of ISIS communication on Telegram we used digital ethnography approach which consists of the self-observation of information flows on four of ISIS’s most celebrated telegram Channels. We draw on public sphere theory and coined the term terror socio-sphere 3.0 as the theoretical background of this study. The collected data is presented as screenshots to capture a visual evidence of ISIS communication threads. This study shows that ISIS Telegram channels play critical role in personal communication between potential recruits and dissemination of propaganda that encourage ‘lone wolves’ to carry attacks in the world at large. This study was limited to the number of the channels that have been widely celebrated.

  15. Investigation of Strouhal numbers of iced cable models of cable-supported bridges with respect to angle of wind attack

    Czech Academy of Sciences Publication Activity Database

    Górski, P.; Tatara, M.; Pospíšil, Stanislav; Kuznetsov, Sergeii; Marušić, A.

    2015-01-01

    Roč. 112, 2-B (2015), s. 417-432 ISSN 1897-628X R&D Projects: GA MŠk(CZ) LO1219; GA MPO(CZ) FR-TI3/654 Keywords : bridge cable * ice accretion * Strouhal number * angle of attack * vortex shedding frequency Subject RIV: JN - Civil Engineering http://suw.biblos.pk.edu.pl/resources/i5/i6/i6/i8/i4/r56684/GorskiP_InvestigationsStrouhal.pdf

  16. Bomb pulse biology

    Energy Technology Data Exchange (ETDEWEB)

    Falso, Miranda J. Sarachine [Center for Accelerator Mass Spectrometry, Mail Stop L-397, Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, CA 94551 (United States); Buchholz, Bruce A., E-mail: buchholz2@llnl.gov [Center for Accelerator Mass Spectrometry, Mail Stop L-397, Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, CA 94551 (United States)

    2013-01-15

    The past decade has seen an explosion in use of the {sup 14}C bomb pulse to do fundamental cell biology. Studies in the 1960s used decay counting to measure tissue turnover when the atmospheric {sup 14}C/C concentration was changing rapidly. Today bulk tissue measurements are of marginal interest since most of the carbon in the tissue resides in proteins, lipids and carbohydrates that turn over rapidly. Specific cell types with specialized functions are the focus of cell turnover investigations. Tissue samples need to be fresh or frozen. Fixed or preserved samples contain petroleum-derived carbon that has not been successfully removed. Cell or nuclear surface markers are used to sort specific cell types, typically by fluorescence-activated cell sorting (FACS). Specific biomolecules need to be isolated with high purity and accelerator mass spectrometry (AMS) measurements must accommodate samples that generally contain less than 40 {mu}g of carbon. Furthermore, all separations must not add carbon to the sample. Independent means such as UV absorbance must be used to confirm molecule purity. Approaches for separating specific proteins and DNA and combating contamination of undesired molecules are described.

  17. Molten sodium vanadate attack of yttria-stabilized zirconia: A raman spectroscopic investigation

    International Nuclear Information System (INIS)

    Hamilton, J.C.; Nayelberg, A.S.

    1983-01-01

    The authors used Raman spectroscopy to study the attack by molten Na 2 V 2 O 6 of ceramics used as thermal barrier coatings in combustion systems. These ZrO 2 -Y 2 O 3 ceramics were transformed from cubic/tetragonal to monoclinic structures during 9-hr salt immersion at 900 0 C, because of leaching of yttria from the ceramic in the near surface region (approx. =50 um). Raman spectroscopy is a powerful tool to study this behavior, since it can simultaneously probe both salt chemistry and ceramic structure

  18. Analysis of Al-Qaeda Terrorist Attacks to Investigate Rational Action

    Directory of Open Access Journals (Sweden)

    Daniel P. Hepworth

    2013-04-01

    Full Text Available Many studies have been conducted to demonstrate the collective rationality of traditional terrorist groups; this study seeks to expand this and apply collective rationality to Islamic terrorist groups. A series of statistical analyses were conducted on terrorist attacks carried out by Al-Qaeda and affiliated terrorist organization; these were then compared to two more conventional terrorist groups: the Euskadi Ta Askatasuna (ETA and the Liberation Tigers of Tamil Eelam (LTTE. When viewed through the context of the groups’ various motivations and objectives, the results of these analyses demonstrates collective rationality for those terrorist groups examined. 

  19. Statistical investigation into historical health examination records and cause of death among atomic bomb survivors in Nagasaki city

    International Nuclear Information System (INIS)

    Mori, Hiroyuki; Nakamura, Tsuyoshi; Mine, Mariko; Kondo, Hisayoshi; Okajima, Syunzo

    1980-01-01

    Changes in the annual health examination records were investigated and classified by cause of death. In males with cancer, there was noted an increased incidence of abnormal hemoglobin amount, erythrocyte sedimentation rate, and traces of urinary proteins 1 year to 3 years before death. However, the incidence of urinary protein traces was low compared with that in other diseases. In males with cerebral vascular diseases, there was a high incidence of hypertension. Urinary protein traces appeared from 4 years to 5 years before death. In females with cardiovascular diseases including hypertensive diseases and valvular diseases, the incidence of urinary protein traces increased from 4 years to 5 years prior to their death. Erythrocyte sedimentation rate was generally high in these cases. In males with liver cirrhosis, urinary urobilinogen amount was generally more than that in other diseases. This tendency also appeared in females with liver cirrhosis 6 years before death. The incidence of abnormal hemoglobin amount and erythrocyte sedimentation rate was high in males with liver cirrhosis, and that of abnormal erythrocyte sedimentation rate was high in females with liver corrhosis. (Ueda, J.)

  20. How Dangerous are 'Dirty Bombs'?

    International Nuclear Information System (INIS)

    Franic, Z.

    2003-01-01

    A radiological weapon (or a radiation weapon) is any weapon that is designed to spread radioactivity, either to kill, or to deny the use of an area (a modern version of salting the earth) and consists of a device (such as a nuclear or conventional explosive), which spreads radioactive material. Recently, it has been called 'dirty bombs'. This term refers especially to a weapon that would disperse radioactive material through conventional explosives. The term was put in focus in June 2002, when U. S. officials announced they had captured an al-Qaida terrorist in Chicago who was allegedly planning for such a device. Designed to produce radiation sickness in a military force or a civilian population instead of destroying a target, Iraq developed and tested radiation weapons in 1980s, during the war with Iran with intention to produce health effects that would be difficult to explain. The project was abandoned because a radiation levels low enough to escape detection were also insufficient to cause significant medical problems in the weeks following an attack. Radiological weapons are therefore widely considered to be militarily useless for a state-sponsored army and are not believed to have been deployed by any military forces. However, these weapons have been suggested as a possible terror weapon in order to create fear and panic in densely populated areas and havoc to local economies. They do not require weapons-grade materials, and common materials such as 1 37C s used in radiological medical equipment, could be used. Subsequent removal of urban radioactive contamination, i.e. cleanup efforts according to experiences from the radiological accident in a Brazilian city of Goiania could be long, difficult and costly. Therefore, the overall effects of exploded dirty bombs are hard to assess considering that: a) The health effects of low-level radiation are hotly contested. Namely, according to 'linear, no-threshold' dosimetric model, any increase over background is

  1. Atomic bomb and leukemia

    Energy Technology Data Exchange (ETDEWEB)

    Ichimaru, Michito; Tomonaga, Masao; Amenomori, Tatsuhiko; Matsuo, Tatsuki (Nagasaki Univ. (Japan). School of Medicine)

    1991-03-01

    Characteristic features of leukemia among atomic bomb survivors were studied. The ratio of a single leukemia type to all leukemias was highest for CML in Hiroshima, and the occurrence of CML was thought to be most characteristic for atomic bomb radiation induced leukemia. In the distribution of AML subtypes of FAB classification, there was no M3 cases in 1 Gy or more group, although several atypical AML cases of survivors were observed. Chromosome study was conducted using colony forming cells induced by hemopoietic stem cells of peripheral blood of proximal survivors. Same chromosome aberrations were observed in colony forming cells and peripheral blood of proximal survivors. (author).

  2. Pathology of atomic bomb casualties.

    Science.gov (United States)

    Iijima, S

    1982-01-01

    Thirty seven years ago, 6 August 1945 marks the date of the first atomic bombing never experienced in human history. It was dropped on Hiroshima and this was followed by a second bombing three days later on Nagasaki. The total deaths following exposure to the bomb by the end of 1945 totalled 140,000 (+/- 10,000) in Hiroshima and 70,000 (+/- 10,000) in Nagasaki. The present article described and outline of the physical effects of the atomic bomb and injury to the human body by exposure to the bomb.

  3. Investigation on circular asymmetry of geographical distribution in cancer mortality of Hiroshima atomic bomb survivors based on risk maps: analysis of spatial survival data

    International Nuclear Information System (INIS)

    Tonda, Tetsuji; Satoh, Kenichi; Otani, Keiko; Ohtaki, Megu; Sato, Yuya; Maruyama, Hirofumi; Kawakami, Hideshi; Tashiro, Satoshi; Hoshi, Masaharu

    2012-01-01

    While there is a considerable number of studies on the relationship between the risk of disease or death and direct exposure from the atomic bomb in Hiroshima, the risk for indirect exposure caused by residual radioactivity has not yet been fully evaluated. One of the reasons is that risk assessments have utilized estimated radiation doses, but that it is difficult to estimate indirect exposure. To evaluate risks for other causes, including indirect radiation exposure, as well as direct exposure, a statistical method is described here that evaluates risk with respect to individual location at the time of atomic bomb exposure instead of radiation dose. In addition, it is also considered to split the risks into separate risks due to direct exposure and other causes using radiation dose. The proposed method is applied to a cohort study of Hiroshima atomic bomb survivors. The resultant contour map suggests that the region west to the hypocenter has a higher risk compared to other areas. This in turn suggests that there exists an impact on risk that cannot be explained by direct exposure. (orig.)

  4. Atomic bombs and conspiracy theories

    International Nuclear Information System (INIS)

    Binnie, A.

    2001-01-01

    There have been a number of articles in the press concerning Australia's bid to get the atomic bomb. These articles are based on the recent publication of a book, 'Australia's Bid for the Bomb' by Wayne Reynolds. The book at first sight appears to be very well researched, with many archival references from a number of countries, and the hypotheses appear to be well supported and argued. Its major shortcoming is the way that the science and technology involved is presented. The author seems to have a complete lack of understanding of basic science and engineering principles, and the manner in which scientists and politicians communicate with each other. This paper will attempt to redress these shortcomings, I shall look at the way communities of scientists and politicians present their ideas to each other and to the public at large. By investigating the backgrounds to the establishment of the Snowy Mountains Scheme and the later establishment of the Australian Atomic Energy Commission, the author is able to explain how such a hypothesis ever saw the light of day

  5. An Investigation to Optimize the Layout of Protective Blast Barriers Using Finite Element Modelling

    Science.gov (United States)

    Lawrence, V.; Ngamkhanong, C.; Kaewunruen, S.

    2017-12-01

    The past has shown that the risk of terrorism is on the rise as can be seen in many events. Terrorist attacks such as the 2004 Madrid bombings, the 2005 London bombings, the 2013 Boston bombing and the 2017 Manchester bombings have shown the impact acts of terrorism has on the public. Nowadays, terrorist attack is likely to increase in the wider area in the future together with a higher density in train passengers. Previous researches into protective measures have been focused on the structure. However, the impacts of terrorist attack on human have not been fully investigated. The needs for protective measures for the public have never been greater. This research aims to investigate the optimum layout for protective blast barriers situated on a train station platform using finite element analysis. The 3-dimensional structure is modelled and analysed using LS-DYNA.The focus is placed on an island platform at Birmingham New Street Station, which is one deemed to be at high risk of terrorist threats. Two shapes of barriers were tested, straight and angled. A total of six models were created and tested against two scenarios. Scenario one is a bomb placed on the ground, scenario two is a bomb being carried. The results focus on the impact the pressure created from the blast has on a person’s lungs and head. Both can cause the most fatalities due to bombings. The results demonstrated that the shape of the barriers had no effect on the pressure. However, it can be concluded that an increase in the number of barriers, reduced the pressure below the critical amount for lung damage. Increasing the number of intervening objects between the bomb and target has a positive effect on the reduction of blast pressure. The insight into this study will help railway and structural engineers to establish strategic preventing methods to minimise catastrophic damage to and potential losses of the public.

  6. Heart Attack

    Science.gov (United States)

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  7. Leukemia among a-bomb survivors living in Hiroshima city, 1971-1978

    International Nuclear Information System (INIS)

    Kawakami, Masahito; Takahashi, Hiroshi; Ohkita, Takeshi; Hayakawa, Norihiko

    1980-01-01

    The death from leukemia among Hiroshima citizens from 1971 to 1978 was investigated. The total number of dead citizens was 241, and 64 of them were a-bomb survivors. Thirty-seven of a-bomb survivors were exposed to a-bomb within 2 km from hypocenter. Seventy-seven of remaining 177 citizens were born after the explosion of a-bomb, but they were not children of a-bomb survivors exposed directly to a-bomb. The mortality of a-bomb survivors exposed near the hypocenter was 1.67 (within 2 km) - 2.51 (within 1.5 km) times that of those exposed far from the hypocenter. The mortality of a-bomb survivors exposed within 1.5 km was significantly high. The death risk from leukemia was significantly high in women. The estimated exposure dose was over 1 rad in 25 of abovementioned 37 a-bomb survivors, and it was over 10 rad in 21 and over 100 rad in 10 of 25. Seven of 10 a-bomb survivors exposed over 100 rad were women. The age at the exposure was under 10 years in 1, teens in 1, twenties in 2, and over thirty in 6. The type of leukemia was acute in 8 and chronic in 2. Both types were myelogenous leukemia. Five of these 10 a-bomb survivors died after 1976. (Tsunoda, M.)

  8. Investigating the influence of special on-off attacks on challenge-based collaborative intrusion detection networks

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam For

    2018-01-01

    to exchange data with each other. Insider attacks are a great threat for such types of collaborative networks, where an attacker has the authorized access within the network. In literature, a challenge-based trust mechanism is effective at identifying malicious nodes by sending challenges. However...

  9. Perievent panic attacks and panic disorder after mass trauma: a 12-month longitudinal study.

    Science.gov (United States)

    Wood, Cristina M; Salguero, José M; Cano-Vindel, Antonio; Galea, Sandro

    2013-06-01

    Panic attacks frequently lead to psychopathological disorders, including panic disorder. Even though panic disorder is a highly comorbid and disabling mental health problem associated with stressful life or traumatic events, perievent panic attacks and their association with panic disorder have hardly been investigated as a central topic after mass trauma. Using data from a longitudinal population-based assessment of Madrid residents after the March 11, 2004 train bombings (N = 1,589), with assessments conducted 1, 6, and 12 months after the attacks, the rate of perievent panic attacks was 10.9%. Level of exposure, previous life stressors, and negative emotionality were associated with perievent panic attacks (β = .12, .15, and .10, respectively), which in turn mediated the relationship between exposure to the terrorist event and panic disorder in the following year. Previous life stressors (β = .15) and low social support (β = -.14) were directly associated with panic disorder during the subsequent year. The most vulnerable individuals who experienced perievent panic attacks were 3.7 times, 95% confidence interval [CI] = [2.1, 6.4], more likely to suffer from panic disorder in the following year. Results suggest that early identification of perievent panic attacks following mass trauma may be helpful for reducing panic disorder. Copyright © 2013 International Society for Traumatic Stress Studies.

  10. Aging studies in atomic bomb survivors

    International Nuclear Information System (INIS)

    Belsky, J.L.; Moriyama, I.M.; Fujita, Seiichiro; Kawamoto, Sadahisa.

    1980-01-01

    Though acceleration of aging induced by radiation could not be demonstrated in many investigations on delayed effects of ionizing radiation on a-bomb survivors, studies on acceleration of aging after the exposure to ionizing radiation in human and animals have been carried out. To investigate whether physiological function was related to the exposure to ionizing radiation, a series of examinations concerning age was carried out at the time of general health examinations at ABCC. Simple examinations concerning aging were carried out on 11,351 a-bomb survivors, but the result was essentially negative. If biological or physiological age was defined clearly, the results of functional test would be used as criterion of aging. (Tsunoda, M.)

  11. Investigation of the pathophysiological mechanisms of migraine attacks induced by pituitary adenylate cyclase-activating polypeptide-38

    DEFF Research Database (Denmark)

    Amin, Faisal Mohammad; Hougaard, Anders; Schytz, Henrik W

    2014-01-01

    samples (plasma PACAP38 and vasoactive intestinal polypeptide and serum tryptase), and vital signs (blood pressure, heart rate, respiratory frequency, and end-tidal pressure of CO2) was recorded before and up to 5 h after infusion. Twenty-two patients [mean age 24 years (range 19-36)] completed the study...... on both days. Sixteen patients (73%) reported migraine-like attacks after PACAP38 and four after vasoactive intestinal polypeptide (18%) infusion (P = 0.002). Three of four patients, who reported migraine-like attacks after vasoactive intestinal polypeptide, also reported attacks after PACAP38. Both...... the start of PACAP38 infusion only in those patients who later reported migraine attacks. Blood levels of vasoactive intestinal polypeptide and tryptase were unchanged after PACAP38 infusion. In conclusion, PACAP38-induced migraine was associated with sustained dilatation of extracranial arteries...

  12. Dirty bombs: assesment of radiological impacts

    International Nuclear Information System (INIS)

    Trifunovic, D.; Koukouliou, V.

    2009-01-01

    In some countries, regulatory control of radioactive sources, used extensively in medicine and industry, remains weak. Global concerns about the security and safety of radioactive sources escalated following the September 11 2001 terrorist attacks in the United States. There are fears that some radioactive sources could be used by terrorists as radiological dispersal devices (RDD's), or so called 'dirty bombs'. The radioactive material dispersed, depending on the amount and intensity, could cause radiation sickness for a limited number of people nearby if, for example, they inhaled large amounts of radioactive dust. But the most severe tangible impacts would likely be the economic costs and social disruption associated with the evacuation and subsequent clean-up of contaminated property. It has been shown that usage of realistic data in a first response decision making as to avoid inappropriate public reaction accompanied by economic and social consequences is necessary.(author)

  13. A dedicated investigation unit improves management of syncopal attacks (Syncope Study of Unselected Population in Malmo--SYSTEMA I).

    Science.gov (United States)

    Fedorowski, Artur; Burri, Philippe; Juul-Möller, Steen; Melander, Olle

    2010-09-01

    To investigate whether a systematic approach to unexplained syncopal attacks based on the European Society of Cardiology guidelines would improve the diagnostic and therapeutic outcomes. Patients presenting with transient loss of consciousness to the Emergency Department of Skåne University Hospital in Malmö were registered by triage staff. Those with established cardiac, neurological, or other definite aetiology and those with advanced dementia were excluded. The remaining patients were offered evaluation based on an expanded head-up tilt test protocol, which included carotid sinus massage, and nitroglycerine challenge if needed. Out of 201 patients registered over a period of 6 months, 129 (64.2%) were found to be eligible; of these, 101 (38.6% men, mean age 66.3 +/- 18.4 years) decided to participate in the study. Head-up tilt test allowed diagnoses in 91 cases (90.1%). Vasovagal syncope (VVS) was detected in 45, carotid sinus hypersensitivity (CSH) in 27, and orthostatic hypotension (OH) in 51 patients. Twelve patients with VVS and 15 with CSH also had OH, whereas 25 were diagnosed with OH only. In a multivariate logistic regression, OH was independently associated with age [OR (per year): 1.05, 95% CI 1.02-1.08, P = 0.001], history of hypertension (2.73, 1.05-7.09, P = 0.039), lowered estimated glomerular filtration rate (per 10 mL/min/1.73 m(2): 1.17, 1.01-1.33, P = 0.032), use of loop diuretics (10.44, 1.22-89.08, P = 0.032), and calcium-channel blockers (5.29, 1.03-27.14, P = 0.046), while CSH with age [(per year) 1.12, 1.05-1.19, P approach to patients presenting with unexplained syncopal attacks considerably increased diagnostic efficacy and accuracy. Potential syncope diagnoses have a tendency to overlap and show diversity in demographic, anamnestic, and pharmacological determinants.

  14. It is vital to highlight attacks on hospitals in conflict zones.

    Science.gov (United States)

    Earl, Geoff

    2012-10-10

    Well done for highlighting the bombing of two hospitals in Syria (news September 19). The Free Syrian Army claimed it carried out the attacks because the hospitals were being used by government troops.

  15. Black-hole bomb and superradiant instabilities

    International Nuclear Information System (INIS)

    Cardoso, Vitor; Dias, Oscar J.C.; Lemos, Jose P.S.; Yoshida, Shijun

    2004-01-01

    A wave impinging on a Kerr black hole can be amplified as it scatters off the hole if certain conditions are satisfied, giving rise to superradiant scattering. By placing a mirror around the black hole one can make the system unstable. This is the black-hole bomb of Press and Teukolsky. We investigate in detail this process and compute the growing time scales and oscillation frequencies as a function of the mirror's location. It is found that in order for the system black hole plus mirror to become unstable there is a minimum distance at which the mirror must be located. We also give an explicit example showing that such a bomb can be built. In addition, our arguments enable us to justify why large Kerr-AdS black holes are stable and small Kerr-AdS black holes should be unstable

  16. Experimental investigation of the effect of a passive porous coating on a hypersonic boundary layer stability on a sharp cone at an angle of attack

    Science.gov (United States)

    Lukashevich, S. V.; Morozov, S. O.; Shiplyuk, A. N.

    2018-03-01

    Experimental investigations are performed to determine the effect of the passive porous coating on the stability of the hypersonic boundary layer on the cone at small angles of attack. Measurements of the pressure disturbances on the cone surface showed that, the increase of the angle of attack leads to decrease of the second-mode amplitude, when the smooth cone side is the windward side. On the leeward side the amplitude of the disturbances increase with the angle of attack until the boundary layer is laminar. It was found that the ultrasonically absorptive coating leads to the energy decrease of the second-mode disturbances on both leeward and windward side of the sharp cone.

  17. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  18. Dr. Lytle Adams' incendiary "bat bomb" of World War II.

    Science.gov (United States)

    Christen, Arden G; Christen, Joan A

    2004-11-01

    On December 7, 1941, a 60-year old dentist from Irwin, Pennsylvania, Dr. Lytle S. Adams, was driving home from a vacation at Carlsbad Caverns in New Mexico. Hours earlier, he had been gripped with amazement as he witnessed millions of bats exiting the caves of Carlsbad. Listening to his car radio on his return trip, he was shocked to hear that Japan had just attacked Pearl Harbor. Dr. Adams, outraged over this travesty, began to mentally construct a plan for U.S. retaliation. As his thoughts returned to the countless bats that had awed him, he formed a tentative plan: millions of these small, flying mammals could be connected to tiny, time-fused incendiary bombs, and then released to land on the flimsily constructed structures which dotted the cities of Japan. Within a few minutes, the bombs would explode and enflame the entire urban areas. He postulated that these immeasurable numbers of fires, spreading their devastation over such vast areas within Japanese cities would result in the enemy's speedy surrender. This article documents the futile efforts of Dr. Adams, his team and the U.S. government to develop and employ an effective, incendiary bat bomb. The recently developed atom bomb, a far more deadly weapon was used in its place.

  19. A synthetic medical and sociological study of A-bomb exposed twin, 7

    International Nuclear Information System (INIS)

    Watanabe, Shoji; Satow, Yukio; Kyo, Taiichi

    1984-01-01

    The status of A-bomb exposure and family or relative relationship were investigated in seven twin pairs exposed to A-bomb (14 survivors). The survivors ranged in age between 4 and 24 years when they were exposed to A-bomb. Twins' relationship was comparatively strong. Both of the twins who were exposed to A-bomb tended to be closely connected with each other because of the fearful experience of A-bomb exposure and the subsequent hard social life. Even though one of the pair was not exposed to A-bomb, he (she) was likely to continue to help the other for a long time to restore from the disaster. (Namekawa, K.)

  20. Investigation of Load Prediction on the Mexico Rotor Using the Technique of Determination of the Angle of Attack

    DEFF Research Database (Denmark)

    Yang, Hua; Shen, Wen Zhong; Sørensen, Jens Nørkær

    2012-01-01

    ). The extracted airfoil data are put into a BEM code, and the calculated axial and tangential forces are compared to both computations using BEM with Glauert's and SHEN's tip loss correction models and experimental data. The comparisons show that the present method of determination of angle of attack is correct......Blade element moment (BEM) is a widely used technique for prediction of wind turbine aerodynamics performance, the reliability of airfoil data is an important factor to improve the prediction accuracy of aerodynamic loads and power using a BEM code. The method of determination of angle of attack...

  1. [Investigation of the presence of human metapneumovirus in patients with chronic obstructive pulmonary disease and asthma and its relationship with the attacks].

    Science.gov (United States)

    Ilvan, Ahmet; Aslan, Gönül; Serin, Mehmet Sami; Calıkoğlu, Mukadder; Yılmaz, Fatma Mehtap; Tezcan, Seda; Taş, Dilaver; Ayrık, Cüneyt; Uygungül, Evren; Sezer, Ogün; Emekdaş, Gürol

    2013-10-01

    Human metapneumovirus (hMPV), an enveloped RNA virus classified in Paramyxoviridae family, was first characterized in 2001 from children with acute respiratory tract infection. Recent studies have suggested hMPV to play a role in chronic obstructive pulmonary disease (COPD) and asthma attacks. The aims of this study were to investigate the frequency of hMPV in patients with COPD and asthma, its effects on the severity of the attacks and the relationship between demographical and clinical factors. A total of 123 patients, including 66 with COPD (45 were in attack and 21 were stable) and 57 with asthma (33 were in attack and 24 were under control) diagnosed according to the criteria of Global Initiative for Chronic Obstructive Lung Disease and the Global Strategy for Asthma Management and Prevention, respectively, were included in the study. Nasopharyngeal lavage samples collected from all of the patients have been evaluated for the presence of hMPV-RNA by using a reverse transcriptase-polymerase chain reaction (RT-PCR) targeting F gene region of the virus. hMPV-RNA positivity rates in patients with COPD and asthma were observed as 30.3% (20/66) and 31.6% (18/57), respectively, and the difference between the groups were not statistically significant (p= 1.00). When patients were compared according to their disease status, hMPV was detected in 31.1% (14/45) of patients with COPD attack and 28.6% of stable patients (p> 0.05). These rates were found as 36.4% (12/33) and 25% (6/24) in patients with asthma attack and controlled asthma, respectively (p> 0.05). Although the virus detection rates in patients with COPD and asthma attacks (26/78; 33.3%) were higher than the patients with stable/controlled disease (12/45; 26.7%), the difference was not found as statistically significant (p= 0.57). The detection rate of hMPV-RNA was 26.1% in patients who can be treated at home and hospital without any need of intensive care and mechanical ventilation, while this rate was 36

  2. Dynamic Finite Element Investigation of Wave Attack on Sea Dikes : A Coupled Approach using Plate and Volume Elements

    NARCIS (Netherlands)

    Tan, S.

    2016-01-01

    Approximately 400 kilometres of Dutch sea dikes are protected by bituminous concrete revetments to prevent damage from erosion and repeated wave attacks during storms. The numerical analysis of sea dikes subjected to cyclic wave loading needs to consider the behaviour of the bituminous concrete

  3. Heart Attack

    Science.gov (United States)

    ... pain Fatigue Heart attack Symptoms & causes Diagnosis & treatment Advertisement Mayo Clinic does not endorse companies or products. ... a Job Site Map About This Site Twitter Facebook Google YouTube Pinterest Mayo Clinic is a not- ...

  4. Tuberculosis among atomic bomb survivors

    International Nuclear Information System (INIS)

    Hamada, Tadao; Matsushita, Hiroshi.

    1980-01-01

    Effects of atomic bomb on tuberculosis among atomic bomb survivors necropsied after 1956 when Atomic Bomb Hospital was opened were observed statistically and the following results were obtained. The morbidity of tuberculosis in the group exposed within 2 km from the hypocenter was higher than that of the control group, but there was not a significant difference between the both groups. The morbidity of all types of tuberculosis was significantly higher in the group exposed within 2 km from the hypocenter than in the control group. The morbidity of tuberculosis tended to decrease in both exposed and non-exposed groups with time. However, the morbidity of miliary or active tuberculosis has tended to rise in the exposed since 1975. The morbidity in young a-bomb survivors exposed within 2 km was higher than that in those of other groups, but there was not a difference in the morbidity among the aged. The higher the rate of complication of active tuberculosis with stomach cancer or acute myelocytic leukemia or liver cirrhosis, the nearer the places of exposure were to the hypocenter. Out of 26 patients with miliary tuberculosis, 6 were suspected to have leukemia while they were alive and were suggested to have leukemoid reaction by autopsy. They all were a-bomb survivors, and 4 of them were exposed within 2 km from the hypocenter. (Tsunoda, M.)

  5. Neutron bomb and European defense

    International Nuclear Information System (INIS)

    Sweet, W.

    1980-01-01

    France's development of the controversial neutron bomb is in line with the US goal of flexible response to a Soviet threat in Europe. US neutron bomb production is on a standby basis pending agreement among the North Atlantic Treaty Organization (NATO) members for deployment. Controversy over the bomb centers on its anti-personnel nature, which many see as immoral in comparison with weapons that primarily damage property. Opponents also see it as lowering the nuclear threshold and increasing the chance of nuclear war. Supporters view the bomb as a tactical weapon to be used on a limited scale as a last resort. If Germany's Chancellor Schmidt fails to negotiate a limit to European nuclear arms deployment with the Soviet Union, neutron-bomb production in the US and France will most likely proceed. The prospects for including European nuclear weapons in the Strategic Arms Limitation Talks (SALT) III are jeopardized by the Soviet invasion of Afghanistan and the failure of an early SALT II ratification. 17 references

  6. Neutron bomb and European defense

    Energy Technology Data Exchange (ETDEWEB)

    Sweet, W.

    1980-08-15

    France's development of the controversial neutron bomb is in line with the US goal of flexible response to a Soviet threat in Europe. US neutron bomb production is on a standby basis pending agreement among the North Atlantic Treaty Organization (NATO) members for deployment. Controversy over the bomb centers on its anti-personnel nature, which many see as immoral in comparison with weapons that primarily damage property. Opponents also see it as lowering the nuclear threshold and increasing the chance of nuclear war. Supporters view the bomb as a tactical weapon to be used on a limited scale as a last resort. If Germany's Chancellor Schmidt fails to negotiate a limit to European nuclear arms deployment with the Soviet Union, neutron-bomb production in the US and France will most likely proceed. The prospects for including European nuclear weapons in the Strategic Arms Limitation Talks (SALT) III are jeopardized by the Soviet invasion of Afghanistan and the failure of an early SALT II ratification. 17 references. (DCK)

  7. Medicine and the bomb

    International Nuclear Information System (INIS)

    Smith, J.; Smith, T.

    1981-01-01

    In the last of four articles giving a medical view of nuclear war, the attitudes towards civil defence and the psychological effects of nuclear war are examined. The general training and information programmes on civil defence in the West are briefly discussed particularly in relation to fallout shelters. Psychological reactions to the threat of attack, the discomforts of being confined in a fallout shelter, the large numbers of dead and injured who will not be rescued, an eventual emergence into a society where normal services and supplies are disrupted may well disable otherwise healthy survivors and hamper their efforts at recovery. (U.K.)

  8. Medical and sociological study on the A-bombed twins, 3

    International Nuclear Information System (INIS)

    Satow, Yukio; Okamoto, Naomasa; Watanabe, Shoji; Ohkita, Takeshi; Kurihara, Minoru

    1980-01-01

    Three A-bomb exposed and nonexposed pairs of monoxygotic twins were investigated. In two pairs of them, environmental factors had no apparent influence, and genetic factors were dominant. In the other one pair, one of which was a A-bomb survivor exposed at 1.5 km from the explosion center, environmental factors and various effects on them. (Ueda, J.)

  9. Peace and the Atomic Bomb

    Energy Technology Data Exchange (ETDEWEB)

    Bradbury, Norris E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Meade, Roger Allen [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    1948-12-02

    A little over three years after assuming the directorship of the Los Alamos Scientific Laboratory, Norris Bradbury returned to his alma mater, Pomona College, and delivered one of his first extended speeches regarding the atomic bomb. Bradbury noted that although the atomic bomb had brought a “peace of kind,” ending World War II, the bomb also had become, without much thought, a “factor in the political, military, and diplomatic thinking of the world.” Bradbury hoped his speech, given to both the faculty and student body of Pomona, would give his audience a foundation on which to assess and understand the new world the bomb had ushered into existence. Bradbury’s talk was quickly printed an distributed by Pomona College and, later, reprinted in The Physical Review (Volume 75, No. 8, 1154-1160, April 15, 1949). It is reprinted here, for a third time, as a reminder of the early days of Los Alamos and its role in international affairs. "Slightly more that three years ago, this country brought to an end the most catastrophic war in history. The conflict had been characterized by an unremitting application of science to the technology of destruction. The final use of the atomic bomb, however, provided a climax so striking that the inevitable nature of future wars was illustrated with the utmost clarity. Peace of a kind followed the first military use of atomic weapons, but international understanding did not, and the atomic bomb became a factor in the political, military, and diplomatic thinking of the world. Where do we now stand in all this? What are the costs and the rewards? Where are we going? These are some of the things that I would like to discuss with you this morning."

  10. [Forensic-medical assessment of terroristic chemical attacks].

    Science.gov (United States)

    Babakhanian, R B; Bushuev, E S

    2005-01-01

    By potential damage, chemical terroristic attacks are much more dangerous than terroristic bombing. To fight chemical terrorism it is necessary to create the system of medical-environmental defense of the population. In line with emergency medicine, forensic medical service is a very important element of the antiterroristic defense. The activity of forensic-medical experts in the field of terroristic chemical attack is analysed.

  11. Development of the experimental setup for investigation of latching of superconducting single-photon detector caused by blinding attack on the quantum key distribution system

    Directory of Open Access Journals (Sweden)

    Elezov M.S.

    2017-01-01

    Full Text Available Recently bright-light control of the SSPD has been demonstrated. This attack employed a “backdoor” in the detector biasing scheme. Under bright-light illumination, SSPD becomes resistive and remains “latched” in the resistive state even when the light is switched off. While the SSPD is latched, Eve can simulate SSPD single-photon response by sending strong light pulses, thus deceiving Bob. We developed the experimental setup for investigation of a dependence on latching threshold of SSPD on optical pulse length and peak power. By knowing latching threshold it is possible to understand essential requirements for development countermeasures against blinding attack on quantum key distribution system with SSPDs.

  12. About Heart Attacks

    Science.gov (United States)

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  13. Cyber Attacks, Attribution, and Deterrence: Three Case Studies

    Science.gov (United States)

    2015-05-23

    Protocol PBS Public Broadcasting Service SCADA Supervisory Control and Data Acquisition vii Illustrations Figures 1 Martin Libicki’s...events are non-violent and are just updated versions of sabotage, espionage, or subversion.34 As a result, law enforcement authorities should...era of the precision guided e- bomb. Stuxnet attacked supervisory control and data acquisition ( SCADA ) systems controlling Iranian uranium

  14. Heart Attack

    Science.gov (United States)

    ... Pressure, tightness, pain, or a squeezing or aching sensation in your chest or arms that may spread to your neck, jaw or back Nausea, indigestion, heartburn or abdominal pain Shortness of breath Cold sweat Fatigue Lightheadedness or sudden dizziness Heart attack ...

  15. Heart attack

    Science.gov (United States)

    ... part in support groups for people with heart disease . Outlook (Prognosis) After a heart attack, you have a higher ... P, Bonow RO, Braunwald E, eds. Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine . 10th ed. Philadelphia, PA: Elsevier Saunders; 2014: ...

  16. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  17. Thermal dynamics of bomb calorimeters

    Science.gov (United States)

    Lyon, Richard E.

    2015-12-01

    The thermal dynamics of bomb calorimeters are modeled using a lumped heat transfer analysis in which heat is released in a pressure vessel/bomb immersed in a stirred water bath that is surrounded by a static air space bounded by an insulated (static) jacket, a constant/controlled temperature jacket (isoperibol), or a changing temperature (adiabatic) jacket. The temperature history of the water bath for each of these boundary conditions (methods) is well described by the two-term solution for the calorimeter response to a heat impulse (combustion), allowing the heat transfer coefficients and thermal capacities of the bomb and water bath to be determined parametrically. The validated heat transfer model provides an expression for direct calculation of the heat released in an arbitrary process inside a bomb calorimeter using the temperature history of the water bath for each of the boundary conditions (methods). This result makes possible the direct calculation of the heat of combustion of a sample in an isoperibol calorimeter from the recorded temperature history without the need for semi-empirical temperature corrections to account for non-adiabatic behavior. Another useful result is that the maximum temperature rise of the water bath in the static jacket method is proportional to the total heat generated, and the empirical proportionality constant, which is determined by calibration, accounts for all of the heat losses and thermal lags of the calorimeter.

  18. Thermal dynamics of bomb calorimeters.

    Science.gov (United States)

    Lyon, Richard E

    2015-12-01

    The thermal dynamics of bomb calorimeters are modeled using a lumped heat transfer analysis in which heat is released in a pressure vessel/bomb immersed in a stirred water bath that is surrounded by a static air space bounded by an insulated (static) jacket, a constant/controlled temperature jacket (isoperibol), or a changing temperature (adiabatic) jacket. The temperature history of the water bath for each of these boundary conditions (methods) is well described by the two-term solution for the calorimeter response to a heat impulse (combustion), allowing the heat transfer coefficients and thermal capacities of the bomb and water bath to be determined parametrically. The validated heat transfer model provides an expression for direct calculation of the heat released in an arbitrary process inside a bomb calorimeter using the temperature history of the water bath for each of the boundary conditions (methods). This result makes possible the direct calculation of the heat of combustion of a sample in an isoperibol calorimeter from the recorded temperature history without the need for semi-empirical temperature corrections to account for non-adiabatic behavior. Another useful result is that the maximum temperature rise of the water bath in the static jacket method is proportional to the total heat generated, and the empirical proportionality constant, which is determined by calibration, accounts for all of the heat losses and thermal lags of the calorimeter.

  19. What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response.

    Directory of Open Access Journals (Sweden)

    Jeannette Sutton

    Full Text Available Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials' Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events.

  20. Pros and cons on ''Hitlers' bomb''. Studies on nuclear research in Germany

    International Nuclear Information System (INIS)

    Karlsch, R.; Petermann, H.

    2007-01-01

    This book reveals a sensation: Under supervision of the SS German scientists tested 1944/45 nuclear bombs on Ruegen and in Thuringia. During this period several hundred prisoners of war and prisoners died. Besides proofs for nuclear weapon testing the author also found a draft for a patent on plutonium bombs and discovered the first functioning German atom reactor in the environs of Berlin. The succeeding book titled above enlarges the spectra of contributions from Saenger PLan to attack New York, researches on minimization of critical mass, the attempt to calculate TNT-equivalence as the presentation of important acteurs occuring during the researches. (GL)

  1. Allometric relationships of the dentition of the great White Shark, Carcharodon carcharias, in forensic investigations of shark attacks.

    Science.gov (United States)

    Nambiar, P; Bridges, T E; Brown, K A

    1991-06-01

    As a result of a systematic morphometric study of shark dentitions, a system of notation for describing the location of shark teeth has been developed and is proposed as a standard to be adopted for use in similar studies in the future. The macroscopic morphology of White Shark teeth has been characterised in order to gain quantitative data which might assist in identification of these sharks from bite marks on victims or objects or from shark carcasses. Using these data, a nomogram has been developed which can be used to estimate the body length of a White Shark from measurements of tooth or bite mark morphology. An example of the forensic application of such allometric data is provided as it applied to a recent fatal attack on a diver by a White Shark.

  2. The aftermath of terrorism: posttraumatic stress and functional impairment after the 2011 Oslo bombing.

    Science.gov (United States)

    Solberg, Øivind; Blix, Ines; Heir, Trond

    2015-01-01

    In the present study we wanted to investigate the link between exposure, posttraumatic stress symptomatology, and functional impairment in the aftermath of terrorism. Posttraumatic stress symptomatology and functional impairment related to the Oslo bombing 22nd of July, 2011, in directly and indirectly exposed individuals (N = 1927) were assessed together with demographics, exposure, peri-traumatic reactions, and event centrality approximately 1 year after the attack. Directly and indirectly exposed individuals qualifying for posttraumatic stress disorder (PTSD) reported similar peri-traumatic reactions, event centrality, and functional impairment. However, clusters within the PTSD symptomatology were differentially associated with impairment as a function of their exposure. In the directly exposed group, all clusters within the PTSD symptomatology were associated with impairment in function, while only emotional numbing was associated with impairment within the indirectly exposed group. Considering that terror attacks frequently involve directly exposed individuals and a larger population of indirectly exposed individuals, this finding is of importance, especially in the design of intervention programs and the development of treatment policies.

  3. Wind-Tunnel Investigation of the Low-Speed Static Stability and Control Characteristics of a Model of the Bell MX-776 (RASCAL) in Combined Angle of Attack and Sideslip

    Science.gov (United States)

    Letko, William

    1949-01-01

    An investigation has been made in the Langley stability tunnel to determine the low-speed static stability and control characteristics of a model of the Bell MX-776. The results show the model to be longitudinally unstable in the angle-of-attack range around zero angle of attack and to become stable at moderate angles of attack. The results of the present investigation agree reasonably well with results obtained in other facilities at low speed. The present pitching-moment results at low Mach numbers also agree reasonably well with unpublished results of tests of the model at supersonic Mach numbers (up to Mach number 1.86). Unpublished results at moderate and high subsonic speeds, however, indicate considerably greater instability at low angles of attack than is indicated by low-speed results. The results of the present tests also showed that the pitching-moment coefficients for angles of attack up to 12deg remained fairly constant with sideslip angle up to 12deg. The elevators tested produced relatively large pitching moments at zero angle of attack but, as the angle of attack was increased, the elevator effectiveness decreased. The rate of decrease of elevator effectiveness with angle of attack was less for 8deg than for 20deg elevator deflection. Therefore although 8deg deflection caused an appreciable change in longitudinal trim angle and trim lift coefficient a deflection of 20deg caused only a small additional increase in trim angle and trim lift coefficient.

  4. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  5. Microstructural characterization of pipe bomb fragments

    International Nuclear Information System (INIS)

    Gregory, Otto; Oxley, Jimmie; Smith, James; Platek, Michael; Ghonem, Hamouda; Bernier, Evan; Downey, Markus; Cumminskey, Christopher

    2010-01-01

    Recovered pipe bomb fragments, exploded under controlled conditions, have been characterized using scanning electron microscopy, optical microscopy and microhardness. Specifically, this paper examines the microstructural changes in plain carbon-steel fragments collected after the controlled explosion of galvanized, schedule 40, continuously welded, steel pipes filled with various smokeless powders. A number of microstructural changes were observed in the recovered pipe fragments: deformation of the soft alpha-ferrite grains, deformation of pearlite colonies, twin formation, bands of distorted pearlite colonies, slip bands, and cross-slip bands. These microstructural changes were correlated with the relative energy of the smokeless powder fillers. The energy of the smokeless powder was reflected in a reduction in thickness of the pipe fragments (due to plastic strain prior to fracture) and an increase in microhardness. Moreover, within fragments from a single pipe, there was a radial variation in microhardness, with the microhardness at the outer wall being greater than that at the inner wall. These findings were consistent with the premise that, with the high energy fillers, extensive plastic deformation and wall thinning occurred prior to pipe fracture. Ultimately, the information collected from this investigation will be used to develop a database, where the fragment microstructure and microhardness will be correlated with type of explosive filler and bomb design. Some analyses, specifically wall thinning and microhardness, may aid in field characterization of explosive devices.

  6. Nutritional survey of atomic bomb survivors, 1

    International Nuclear Information System (INIS)

    Murakami, Fumiyo; Tanigawa, Junko; Ito, Chikako

    1978-01-01

    136 cases in which mild anemia was recognized but stomach disease was not recognized by the examination for a-bomb survivors, were investigated concerning living conditions, the habit of food, and the intake amount of nutrition, and the following results were obtained. 1. The mean intake amount of nutritive substances in a-bomb survivors almost reached the level as compared to the necessary amount of nutritive substances in control. 2. Shortage in intake of protein and iron which seemed to be a factor of occurrence of anemia (protein: 50% in men and 19.7% in women, iron: 25% in men and 22.5% in women), much and frequent intake of confectioneries and luxuries, and the rate of going without meal (33.3% of men went without meal one to 6 times a week) were recongized in each case of anemia with high rate. These tendency was marked in men. 3. Anemia was recognized in some of women, although they took all nutritive substances. This seemed to be caused by physiological loss of iron. Accordingly, it was desirable to take an excess amount of iron. (Tsunoda, M.)

  7. Sociological and socio-psycho-historical problems of A-bomb exposed twin

    International Nuclear Information System (INIS)

    Watanabe, Shoji

    1983-01-01

    The atomic bombing of Hiroshima brought many casualities on human society, and collapsed human communities. The purpose of this study is to make mainly on pairs of monozygotic twins one of whom was exposed and the other was not, or both of whom were exposed, a general socio-psycho-historical investigations through a twin control study to find whether the bombing, which can be considered to cause major environmental changes, has had any psychological effects on the individuals. Due to the limited sample of atomic bomb exposed twins, in numbers available for study, it is necessary to have an understanding for their condions of the living and identity they have developed from the numerous mental stress they suffered, and rapid socio-cultural changes they experienced, including for changes in life from birth until the atomic bombing and aftermath of the disaster. As the result of this study, by depth interview, projective psychological research and research on socio-psycho-history of exposed twin and the nonexposed before the A-bomb and aftermath of disaster, the following were obtained: a) Although at the age of four and eight they exposed, they still keep it in clear memory of the damage and suffering in the minds. b) The damage and suffereng of the family who belonged were relatively small, the effects of their psychological sufferings continued even after these thirtyseven years. c) In the aftermath of the A-bomb disaster, the psychological bond showed strengthen through crises and following social distress. d) During the long period since the bombing, those who did not experienced A-bombing, have shown high degree of support and co-operation on their familial and social role to their counterpart. e) Even though their social or medical effects of A-bombing are relatively limited, if their spouse or close relative suffer psychological stress caused by A-bomb, they too suffer from their similar experiences. (J.P.N.)

  8. Pancreatic exocrine secretion in atomic bomb survivors

    International Nuclear Information System (INIS)

    Hiraoka, Masataka; Kawanishi, Masahiro; Ohtaki, Megu

    1989-01-01

    This study was designed to examine the effect of A-bombing on pancreatic exocrine secretion in 6 A-bomb survivors (an average age of 57 years) and the age- and sex-matched non-exposed 6 persons (an average age of 58 years). Six A-bomb survivors consisted of: three who had been directly exposed to A-bombing, one who had entered the city within 3 days after bombing, one who had worked in caring for A-bomb survivors, and one who had later entered the city. Caerulein-Secretin test revealed no significant difference in the total secretion of lipase, maximum bicarbonate, amylase output, or lipase output between the exposed and non-exposed groups. The concentration of lipase ten min after stimulation was significantly decreased in the exposed group than the control group. This suggests that radiation may be responsible for abnormality in the ability of pancreatic exocrine secretion. (N.K.)

  9. Investigating the psychological effects of the Mongolian invasion Attack on the Iranian's 7th century society: with a perspective on Nafthat-al-Masdoor

    Directory of Open Access Journals (Sweden)

    Ahmad Amiri Khorasani

    2016-07-01

    Full Text Available Iran has witnessed many wars and battles through its long history yet , the Mongolian attack may perhaps have been the most destructive and brutal one. In general, every war has its own price and is accompanied with deconstructions. Despite the materialistic and environmental( orterrain eliminations and savage decimates which will take a long time to recover, every war has its own disturbing psychological effects on the social member's psyche. This can have harmful effects such as mental illness of individuals and the psychological sickness of the entire society. This can also negatively affect the culture and this destructiveness can remain for ages leading to the sufferance of generations. The Mongolian attack is one of such massively deconstructing wars which have led to Iran's cultural, moral, social and individual's mental complaints hence it is necessary to be reviewed and investigated. Through a library investigation on Nafthat-al-Masdoor by Zeydari Nasavi, the present study proved that this war has resulted in the spread of fear, distrust, and stress, isolation, feeling of insecurity, and excessive belief and reliance on Fate.

  10. Anatomy of the Lockerbie bombing: Libya’s role and reactions to al-Megrahi’s release.

    Directory of Open Access Journals (Sweden)

    K. J. Ani

    2015-04-01

    Full Text Available Despite its long historical antecedents, terrorism is amongst the growing realities of the national history of contemporary sovereign states. With this emergence, destabilizing influence, and internationalization, terrorism has made the associated security challenge a major diplomatic headache for all key international actors and diplomats. This paper, which adopts a theoretical approach, assesses claims that Ghadafi’s Libya championed state-sponsored terrorism. It reviews the Lockerbie bombing and the conviction of al-Megrahi by the court in Netherland as well as his release from Scottish prison on compassionate grounds. It examines Libya’s use of available diplomatic tools and channels not only to prevent Abdelbaset Ali Mohammed al-Megrahi from facing justice but also to attain Ghadafi’s political and economic interests. This article documents the political communication that followed his release and calls for increased diplomatic investigations of the Lockerbie terrorist attack. Finally, the paper beckons on Libya’s new leaders and the leaderships of USA and Scotland to engage in a progressive multilateral strategic cooperation to unravel further facts on the Lockerbie bombing while promoting the current international “war” against terrorism

  11. Outline on populations of Nagasaki A-bomb survivors and sex ratio in their children

    International Nuclear Information System (INIS)

    Yoshikawa, Isao; Inoue, Akira; Shiomi, Toshio

    1978-01-01

    On the basis of file delivered together with A-bomb surrivor's health Cards in Nagasaki, statistical management was performed on a mass of A-bomb survivors. The number of A-bomb survivors in a mass was 97,032. A family investigation by census registration was performed on 2,547 of A-bomb survivor group (the distance from the center of explosion recorded on cards was within 1.5 km) and 2,791 of its control group. As to 2,547 of A-bomb survivor group, each exposure place was determined, the distance from the center of explosion was measured again, and exposure dose was presumed. The mean exposure dose of A-bomb survivor group was 577 rad in male, and 681 rad in female. By adding A-bomb survivor group to the control group, 4,452 pairs of marriage were confirmed by census registration, and the number of their children was 10,073. With respect to changes of sex ratio, in case of exposed mother, it was expected theoretically that the number of male would decrease together with an decrease of dose, but an opposite change was recognized in a result of the investigation. A result in case of exposed father showed an increase of the male number although not significantly and a change towards the expected direction. (Tsunoda, M.)

  12. Heisenberg's war. The secret history of the German bomb

    International Nuclear Information System (INIS)

    Powers, T.

    1993-01-01

    The history of Second World War Germany's 'Uranium Project', which often is referred to as the 'myth of the German atomic bomb', has been attracting the mind's of secret service men, futurologists, historians and journalists since after the end of the war it has become possible to lift the veil of secrecy. Powers book adds another one to the many investigations published since them. His approach to the piece of history starts with Heisenberg's visit to the U.S.A. in summer 1939, describes the plans of the German Heereswaffenamt pursued with the Uranium Project, and their counterpart on the side of the Allied Forces where German scientists, as immigrants in England and in the U.S.A., were doing their best to launch research for the development of an atomic bomb. The end of this 'competition' is marked by the internment of the ten German scientists and bomb specialists in Fall Hall. The leading story of the book centers on the small group of scientists around Heisenberg, who cleverly 'torpedoed' the development of the German atomic bomb in the years from 1939 until 1944. (HP) [de

  13. The bomb and the men

    International Nuclear Information System (INIS)

    Kroh, Aleksandra

    2011-01-01

    Since 1945, more than 2000 nuclear weapon tests have been performed in the world, with a perfect knowledge of the irradiation risks. This book tells this story. The one of the men who designed the bombs, who used and improved them. It tells also the story of these men who were injured by nuclear weapons and those who were directly impacted by the fallouts of these tests. Finally, the book does not forget to mention the men who voluntarily dissimulated the ravages of nuclear weapons before discretely recognizing them and thinking of repairing the damage

  14. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  15. Surveys right after the atomic bombing and a relief squad

    Energy Technology Data Exchange (ETDEWEB)

    Mine, Mariko [Nagasaki Univ. (Japan). School of Medicine

    1998-12-01

    An outline of four survey reports right after the atomic bombing in Nagasaki and Hiroshima is introduced. The report of Manhattan District Atomic Bomb Investigating Groups: The subjects of this survey were 900 inpatients in Nagasaki (for 16 days from September 20) and Hiroshima (for 5 days from October 3). Two hundreds and forty-nine patients (16%) died. In cases died without injury, the severe symptoms were alopecia, purpura, hemorrhage, oral cavity and pharynx lesion, vomiting, diarrhea and fever. The residual radioactivity measured at six weeks later was 6-25 roentgen in Hiroshima and 30-110 roentgen in Nagasaki (Nishiyama riverhead area). These values were lower than the predicted value from the clinical consequence. The report of Joint Commission for the Investigation of the Atomic Bomb: Following the above survey, about 6500 subjects were investigated both in Nagasaki and Hiroshima. Incidence of alopecia was investigated by shielded situation at a spot of 2.1 to 2.5 km from a blast center. It was 7.2% of outdoors (shielded: 7.3%, non-shielded: 17.4%) and 2.9% of indoors. The report of the Special Committee for Atomic Bomb Casualty Investigation and Research of the Scientific Research Council of Japan: General part of the report consists of medical part and physical part, and reports from each university were classified and listed in the supplement. Survey of Nagasaki Medical College (not in public): About 8000 subjects were investigated from October to December. Data were gathered up about lethality, time of death, injury and radiation sickness, etc. There was also autograph of a relief squad of the Nagasaki Medical College. (K.H.)

  16. Uranium tetrafluoride reduction closed bomb. Part I: Reduction process general conditions

    International Nuclear Information System (INIS)

    Anca Abati, R.; Lopez Rodriguez, M.

    1961-01-01

    General conditions about the metallo thermic reduction in small bombs (250 and 800 gr. of uranium) has been investigated. Factors such as kind and granulometry of the magnesium used, magnesium excess and preheating temperature, which affect yields and metal quality have been considered. magnesium excess increased yields in a 15% in the small bomb, about the preheating temperature, there is a range between which yields and metal quality does not change. All tests have been made with graphite linings. (Author) 18 refs

  17. Pros and cons on ''Hitlers' bomb''. Studies on nuclear research in Germany; Fuer und Wider ''Hitlers Bombe''. Studien zur Atomforschung in Deutschland

    Energy Technology Data Exchange (ETDEWEB)

    Karlsch, R.; Petermann, H. (eds.)

    2007-07-01

    This book reveals a sensation: Under supervision of the SS German scientists tested 1944/45 nuclear bombs on Ruegen and in Thuringia. During this period several hundred prisoners of war and prisoners died. Besides proofs for nuclear weapon testing the author also found a draft for a patent on plutonium bombs and discovered the first functioning German atom reactor in the environs of Berlin. The succeeding book titled above enlarges the spectra of contributions from Saenger PLan to attack New York, researches on minimization of critical mass, the attempt to calculate TNT-equivalence as the presentation of important acteurs occuring during the researches. (GL)

  18. Outline of developing projects of atomic bomb in Japan and USA

    International Nuclear Information System (INIS)

    Fukui, Shuji

    2007-01-01

    The content of the title connecting with the World War II is described hoping that younger researchers of nuclear physics could know some of the facts that scientists and the military of Japan and USA, respectively, had have developing projects of atomic bomb by fission reaction, although there are no official documents of those in Japan, even if there are some unofficial documents that are uncertain partly in Japan. Described are a chronological table, the content of research and development of atomic bombs, Japan's experiments by Kikuchi Laboratory of Osaka Imperial University and Nishina Laboratory of RIKEN, as well as the USA's action such as production of fissile nuclide, Pu-239 and U-235, selection of the site to fabricate atomic bomb, investigation the state of research and development of atomic bombs in Germany, Italy and Japan. (S.Y.)

  19. Effects of radiation on aging in atomic bomb survivors

    International Nuclear Information System (INIS)

    Okajima, Shunzo; Miyajima, Junko; Ichimaru, Michito

    1980-01-01

    Effect of radiation on aging was studied for 122 female a-bomb survivors exposed to more than 100 rad. Correlations of grades of external appearances, Physiological functions, and hematological features with age and radiation were investigated. Several parameters were used for multiple regression analysis, including hair loss, skin elasticity, grip strength, blood pressure, potassium content etc. The comparison of the estimated age of the exposed group and unexposed one showed no statistically significant difference. (Nakanishi, T.)

  20. Requirements for estimation of doses from contaminants dispersed by a 'dirty bomb' explosion in an urban area

    International Nuclear Information System (INIS)

    Andersson, K.G.; Mikkelsen, T.; Astrup, P.; Thykier-Nielsen, S.; Jacobsen, L.H.; Hoe, S.C.; Nielsen, S.P.

    2009-01-01

    The ARGOS decision support system is currently being extended to enable estimation of the consequences of terror attacks involving chemical, biological, nuclear and radiological substances. This paper presents elements of the framework that will be applied in ARGOS to calculate the dose contributions from contaminants dispersed in the atmosphere after a 'dirty bomb' explosion. Conceptual methodologies are presented which describe the various dose components on the basis of knowledge of time-integrated contaminant air concentrations. Also the aerosolisation and atmospheric dispersion in a city of different types of conceivable contaminants from a 'dirty bomb' are discussed.

  1. The birth of the atomic bomb

    International Nuclear Information System (INIS)

    Olivier, Louis

    2016-01-01

    In this article, the author proposes an overview of fifty years of researches and works which resulted in the fabrication and use of an atomic bomb. Thus, he evokes the discovery of radioactivity, experiments made by Rutherford, the discovery of nuclear fission induced uranium bombardment by slow neutrons, the discovery of a possibility of chain reaction with a very low critical mass, the first works on the development of a bomb in the USA and United-Kingdom, and finally the Manhattan project and the realisation of the first bombs, tests, and their use in Hiroshima and Nagasaki

  2. Radiation therapy among atomic bomb survivors, Hiroshima and Nagasaki

    International Nuclear Information System (INIS)

    Pinkston, J.A.; Antoku, Shigetoshi; Russell, W.J.

    1980-10-01

    In the continuing evaluations of atomic bomb survivors for late radiation effects, not only doses from the A-bombs but those from other radiation sources must be considered, for the latter may be concomitantly acting factors causing bias among these investigations. In the present study, among 73 Hiroshima and 22 Nagasaki Adult Health Study (AHS) subjects who reported receiving radiation therapy, from 1970 through 1979, the medical records of 72 and 20, respectively, were reviewed, and 41 Hiroshima and 14 Nagasaki subjects were confirmed to have received radiation therapy. The data obtained in the present study were pooled with those of the previous investigation on radiation therapy exposures of AHS subjects prior to 1970. A total of 190 subjects have been documented as receiving radiation therapy and their doses were estimated. Energies used in treatments and diseases treated are discussed. Malignancies developed subsequent to radiation therapy in seven cases; five after treatment for malignancies and two after treatment for benign diseases. Neoplasms of 12 AHS subjects may have been induced by earlier radiation therapy; 5 in the earlier study and 7 in the present one. These investigations underscore the need for continued documentation of exposures to ionizing radiation for medical reasons, especially from sources incurring relatively high doses. Bias in assessments of late radiation effects among A-bomb survivors can thus be avoided. (author)

  3. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks...

  4. Micronucleus in A-bomb survivors and in thorotrast patients

    Energy Technology Data Exchange (ETDEWEB)

    Tanaka, K.; Kawakami, M.; Izumi, T.; Shigeta, C.; Takahashi, H.; Ohkita, T. (Hiroshima Univ. (Japan). Research Inst. for Nuclear Medicine and Biology)

    1980-11-01

    Micronucleus and Howell-Jolly (H-J) bodies in bone marrow and in peripheral blood were investigated for 31 a-bomb survivors, and 21 thorotrast injected patients with 7 controls. The rate of micronucleus in myeloerythroblast was 0.263% for a-bomb survivors and 0.288% for thorotrast patients, which were higher than the controls, 0.050%. Correlations of micronucleus appearance with the incidence of chromosome aberrations and with estimated exposure dose were observed, suggesting that the micronucleus appearance could be an indicator of radiation damage. Also the micronucleus appearance in routine examinations could suggest the presence of chromosome aberrations. In the case of thorotrast patients H-J bodies appeared in high rate.

  5. Neuropsychiatric and psychologic effects of A-bomb radiation

    International Nuclear Information System (INIS)

    Yamada, Michiko; Sasaki, Hideo

    1992-01-01

    Few studies have assessed the influences of A-bombing from both psychiatric and psychologic points of view. This chapter deals with the knowledge of neuropsychiatric and psychologic influences of A-bombing. Many A-bomb survivors were exposed not only to radiation but also to rapid environmental alterations, such as death of family members and destruction of living. In addition, they suffered from sequelae and anxiety. Naturally, these were considered to cause psychological disturbance including autonomic imbalance and neurosis. Psychological survey, made immediately after A-bombing, is presented, with special attention to behavioral patterns in 54 A-bomb survivors by dividing them into 5 stimulation groups. Radiation syndrome occurring early after exposure and leukemia or cancer occurring later were referred to as 'Genbaku-sho' (A-bomb disease). A-bomb survivors' physically eventful conditions tended to induce mental anxiety or the contrary. Depression and phobia seemed to have correlated with physical conditions. In addition to 'A-bomb disease', mass media, dealing with 'A-bomb neurosis,' 'marriage in A-bomb survivors,' 'suicide in A-bomb survivors,' 'A-bomb survivors orphan,' and 'lonely old A-bomb survivors,' had a great impact on A-bomb survivors. For in uterus exposed and infantile A-bomb survivors, there was no significant difference between the exposed and non-exposed groups, although the incidence of eye tremor and sleeping disorder is found to be higher in the in uterus exposed group than the control group. (N.K.)

  6. 750 Pound M117 Bomb Transportability Tests

    National Research Council Canada - National Science Library

    Meyer, William

    1999-01-01

    The US Army Defense Ammunition Center (DAC) Validation Engineering Division (SIOAC-DEV) was tasked by the US Army Pacific, Fort Shafter, HI to conduct transportability tests on modified 750 pound bombs...

  7. BOMB BLAST: PATTERN AND NATURE OF INJURIES

    OpenAIRE

    Brahmaji Master; Chandra Sekhar; Rangaiah

    2015-01-01

    Bomb blast cause injury on large groups of people by multiple mechanisms. Bomb blast injuries differ from the conventional description of trauma complexity. Primary injuries are caused by blast wave and over pressure. Secondary injuries are caused by flyin g debris and cause shrapnel wounds. Tertiary injuries are caused by blast wind due to forceful impact and quaternary injuries are caused by other vectors like heat, radiation etc. Combined injuries, especially blast and...

  8. Boosting Belligerence: How the July 7, 2005, London Bombings Affected Liberals' Moral Foundations and Prejudice.

    Science.gov (United States)

    Van de Vyver, Julie; Houston, Diane M; Abrams, Dominic; Vasiljevic, Milica

    2016-02-01

    Major terrorist events, such as the recent attacks in Ankara, Sinai, and Paris, can have profound effects on a nation's values, attitudes, and prejudices. Yet psychological evidence testing the impact of such events via data collected immediately before and after an attack is understandably rare. In the present research, we tested the independent and joint effects of threat (the July 7, 2005, London bombings) and political ideology on endorsement of moral foundations and prejudices among two nationally representative samples (combined N = 2,031) about 6 weeks before and 1 month after the London bombings. After the bombings, there was greater endorsement of the in-group foundation, lower endorsement of the fairness-reciprocity foundation, and stronger prejudices toward Muslims and immigrants. The differences in both the endorsement of the foundations and the prejudices were larger among people with a liberal orientation than among those with a conservative orientation. Furthermore, the changes in endorsement of moral foundations among liberals explained their increases in prejudice. The results highlight the value of psychological theory and research for understanding societal changes in attitudes and prejudices after major terrorist events. © The Author(s) 2015.

  9. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  10. Chromosome survey for children of A-bomb survivors

    International Nuclear Information System (INIS)

    Awa, Akio

    1992-01-01

    To investigate chromosomes from children of A-bomb survivors, cytogenetic survey has been started in 1967 by the ABCC and completed in 1985 by the succeeding RERF. This paper is designed to overview the cytogenetic survey and to discuss the cytogenetic effects of A-bomb radiation. A cohort of 16,298 children of A-bomb survivors, which were collected from mortality survey population in 1974, was enrolled in this survey and was divided into two groups: the proximally exposed group (n=8,322, whose parents exposed to estimated doses of 0.01 Gy or more within 2,000 m from the hypocenter) and the distally exposed group (n=7,976, those exposed to 0.005 Gy or less far from 2,500 m or not in the city). Three chromosomal aberrations were identified: sex chromosome aberrations consisting mainly of XYY, XXY, and mosaic; structural abnormality of autosomes consisting mainly of translocation and inversion; and trisomy of autosomes. Overall, the incidence of chromosomal aberrations was higher in the distally exposed group (6.39%) than the proximally exposed group (5.17%). According to the type of chromosomal aberrations, the incidences of both sex chromosomes and structural abnormality of autosomes were slightly higher in the distally exposed group (0.30% and 0.34%) than the proximally exposed group (0.23% and 0.28%). Trisomy of autosomes was identified in only one child in the proximally exposed group. These findings failed to demonstrate the rationale for the cytogenetic effects of A-bomb radiation; however, cytogenetic risk of radiation has not been denied completely. (N.K.)

  11. Ellerman bombs and UV bursts: reconnection at different atmospheric layers?

    Science.gov (United States)

    Hansteen, V. H.; Ortiz-Carbonell, A. N.; Rouppe van der Voort, L.

    2017-12-01

    The emergence of magnetic flux through the photosphere and into the outer solar atmosphere produces, amongst many other phenomena, the appearance of Ellerman bombs (EBs) in the photosphere. EBs are observed in the wings of H(alpha) and are highly likely to be due to reconnection in the photosphere, below the chromospheric canopy. However, signs of the reconnection process are also observed in several other spectral lines, typical of the chromosphere or transition region. An example are the UV bursts observed in the transition region lines of Si IV. In this work we analyze high cadence coordinated observations between the 1-m Swedish Solar Telescope and the IRIS spacecraft in order to study the possible relationship between reconnection events at different layers in the atmosphere, and in particular, the timing history between them. High cadence, high resolution H-alpha images from the SST provide us with the positions, timings and trajectories of Ellerman bombs in an emerging flux region. Simultaneous co-aligned IRIS slit-jaw images at 1400 and 1330 A and detailed Si IV spectra from the fast spectrograph raster allow us to study the transition region counterparts of those photospheric Ellerman bombs. Our main goal is to study whether there is a temporal relationship between the appearance of an EB and the appearance of a UV burst. Eventually we would like to investigate whether reconnection happens at discrete heights, or as a reconnection sheet spanning several layers at the same time.

  12. The story of an A-bomb by Oppenheimer

    Energy Technology Data Exchange (ETDEWEB)

    Song, Eun Yeong

    2005-06-15

    This book concentrates on an A-bomb by Oppenheimer. It is divided into eleven class, which are exile of excellent scientists, uranium atomic fission, situation the U.S. and Germany I, situation the U.S. and Germany II, air strike in pearl Harbor, plan for development of an A-bomb, military action to blow up heavy water plant, select on spot to drop an A-bomb, surrender and drop for an A-bomb and science of an A-bomb. This book is written to explain an A-bomb with form of storytelling.

  13. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  14. NeoBOMB1, a GRPR-Antagonist for Breast Cancer Theragnostics: First Results of a Preclinical Study with [67Ga]NeoBOMB1 in T-47D Cells and Tumor-Bearing Mice

    Directory of Open Access Journals (Sweden)

    Aikaterini Kaloudi

    2017-11-01

    Full Text Available Background: The GRPR-antagonist-based radioligands [67/68Ga/111In/177Lu]NeoBOMB1 have shown excellent theragnostic profiles in preclinical prostate cancer models, while [68Ga]NeoBOMB1 effectively visualized prostate cancer lesions in patients. We were further interested to explore the theragnostic potential of NeoBOMB1 in GRPR-positive mammary carcinoma, by first studying [67Ga]NeoBOMB1 in breast cancer models; Methods: We investigated the profile of [67Ga]NeoBOMB1, a [68Ga]NeoBOMB1 surrogate, in GRPR-expressing T-47D cells and animal models; Results: NeoBOMB1 (IC50s of 2.2 ± 0.2 nM and [natGa]NeoBOMB1 (IC50s of 2.5 ± 0.2 nM exhibited high affinity for the GRPR. At 37 °C [67Ga]NeoBOMB1 strongly bound to the T-47D cell-membrane (45.8 ± 0.4% at 2 h, internalizing poorly, as was expected for a radioantagonist. [67Ga]NeoBOMB1 was detected >90% intact in peripheral mouse blood at 30 min pi. In mice bearing T-47D xenografts, [67Ga]NeoBOMB1 specifically localized in the tumor (8.68 ± 2.9% ID/g vs. 0.6 ± 0.1% ID/g during GRPR-blockade at 4 h pi. The unfavorably high pancreatic uptake could be considerably reduced (206.29 ± 17.35% ID/g to 42.46 ± 1.31% ID/g at 4 h pi by increasing the NeoBOMB1 dose from 10 pmol to 200 pmol, whereas tumor uptake remained unaffected. Notably, tumor values did not decline from 1 to 24 h pi; Conclusions: [67Ga]NeoBOMB1 can successfully target GRPR-positive breast cancer in animals with excellent prospects for clinical translation.

  15. Health effects of atomic-bomb radiation

    International Nuclear Information System (INIS)

    Nakamura, Nori

    2000-01-01

    This review described carcinogenic and genetic effects of A-bomb radiation. Effects have been investigated on 120,000 exposed people for their life span, 20,000 for health examinations, 3,000 people exposed in the womb and 80,000 second-generations of the exposed people. Epidemiological data revealed the presence of carcinogenic effects: Cancer death amounted to 9% from 1950 to 1990. However, carcinogenic mechanism is unknown yet. Genetic effects have been studied from the points of lesion at birth, sex ratio, chromosome aberration, biochemical test and mortality rate of children of exposed people and, although the effects have been experimentally shown in animals, are not observed in those children. This may be derived from the fact that there are few people who were exposed to such a high dose as used experimentally (0.2 Sv exposure to people within 2.5 km diameter-area from the explosion point vs >3 Sv in animals). Data are presented in Research Foundation home page. (K.H.)

  16. Breast cancer in atomic bomb survivors

    International Nuclear Information System (INIS)

    Tokunaga, Masayoshi; Tokuoka, Shoji; Land, C.E.

    1986-01-01

    Thirty eight years after the atomic bombings, studies of the Radiation Effects Research Foundation (RERF) on the extended Life Span Study (LSS) sample have continued to provide important information on radiation carcinogenesis. The third breast cancer survey among this sample revealed 564 cases during the period 1950 - 80, of which 412 were reviewed microscopically. The following statements reflect the conclusions from the current investigation; 1) the relationship between radiation dose and breast cancer incidence was consistent with linearity and did not differ markedly between the Hiroshima and Nagasaki survivors, 2) a dose-related breast cancer risk was observed among women who were in their first decade of life at the time of exposure, 3) the relative risk of radiation-induced breast cancer decreased with increasing age at exposure, 4) the pattern over time of age-specific breast cancer incidence is similar for exposed and control women (that is, exposed women have more breast cancer than control women but the excess risk closely follows normal risk as expressed by age-specific population rates), and 5) radiation-induced breast cancer appears to be morphologically similar to other breast cancer. (author)

  17. Breast cancer in atomic bomb survivors

    International Nuclear Information System (INIS)

    Tokunga, M.; Land, C.E.; Tokuoka, S.

    1986-01-01

    Thirty eight years after the atomic bombings, studies of the Radiation Effects Research Foundation (RERF) on the extended Life Span Study (LSS) sample have continued to provide important information on radiation carcinogenesis. The third breast cancer survey among this sample revealed 564 cases during the period 1950-80, of which 412 were reviewed microscopically. The following statements reflect the conclusions from the current investigation; 1) the relationship between radiation dose and breast cancer incidence was consistent with linearity and did not differ markedly between the Hiroshima and Nagasaki survivors, 2) a dose-related breast cancer risk was observed among women who were in their first decade of life at the time of exposure, 3) the relative risk of radiationinduced breast cancer decreased with increasing age at exposure, 4) the pattern over time of age-specific breast cancer incidence is similar for exposed and control women (that is, exposed women have more breast cancer than control women but the excess risk closely follows normal risk as expressed by age-specific population rates), and 5) radiation-induced breast cancer appears to be morphologically similar to other breast cancer

  18. MAGNETIC FLUX CANCELLATION IN ELLERMAN BOMBS

    Energy Technology Data Exchange (ETDEWEB)

    Reid, A.; Mathioudakis, M.; Nelson, C. J.; Henriques, V. [Astrophysics Research Centre, School of Mathematics and Physics, Queen’s University Belfast, BT7 1NN, Northern Ireland (United Kingdom); Doyle, J. G. [Armagh Observatory, College Hill, Armagh, BT61 9DG (United Kingdom); Scullion, E. [Trinity College Dublin, College Green, Dublin 2 (Ireland); Ray, T., E-mail: areid29@qub.ac.uk [Dublin Institute for Advanced Studies, 31 Fitzwilliam Place, Dublin 2 (Ireland)

    2016-06-01

    Ellerman Bombs (EBs) are often found to be co-spatial with bipolar photospheric magnetic fields. We use H α imaging spectroscopy along with Fe i 6302.5 Å spectropolarimetry from the Swedish 1 m Solar Telescope (SST), combined with data from the Solar Dynamic Observatory , to study EBs and the evolution of the local magnetic fields at EB locations. EBs are found via an EB detection and tracking algorithm. Using NICOLE inversions of the spectropolarimetric data, we find that, on average, (3.43 ± 0.49) × 10{sup 24} erg of stored magnetic energy disappears from the bipolar region during EB burning. The inversions also show flux cancellation rates of 10{sup 14}–10{sup 15} Mx s{sup −1} and temperature enhancements of 200 K at the detection footpoints. We investigate the near-simultaneous flaring of EBs due to co-temporal flux emergence from a sunspot, which shows a decrease in transverse velocity when interacting with an existing, stationary area of opposite polarity magnetic flux, resulting in the formation of the EBs. We also show that these EBs can be fueled further by additional, faster moving, negative magnetic flux regions.

  19. Media’s role in broadcasting acute stress following the Boston Marathon bombings

    Science.gov (United States)

    Holman, E. Alison; Garfin, Dana Rose; Silver, Roxane Cohen

    2014-01-01

    We compared the impact of media vs. direct exposure on acute stress response to collective trauma. We conducted an Internet-based survey following the Boston Marathon bombings between April 29 and May 13, 2013, with representative samples of residents from Boston (n = 846), New York City (n = 941), and the remainder of the United States (n = 2,888). Acute stress symptom scores were comparable in Boston and New York [regression coefficient (b) = 0.43; SE = 1.42; 95% confidence interval (CI), −2.36, 3.23], but lower nationwide when compared with Boston (b = −2.21; SE = 1.07; 95% CI, −4.31, −0.12). Adjusting for prebombing mental health (collected prospectively), demographics, and prior collective stress exposure, six or more daily hours of bombing-related media exposure in the week after the bombings was associated with higher acute stress than direct exposure to the bombings (continuous acute stress symptom total: media exposure b = 15.61 vs. direct exposure b = 5.69). Controlling for prospectively collected prebombing television-watching habits did not change the findings. In adjusted models, direct exposure to the 9/11 terrorist attacks and the Sandy Hook School shootings were both significantly associated with bombing-related acute stress; Superstorm Sandy exposure wasn't. Prior exposure to similar and/or violent events may render some individuals vulnerable to the negative effects of collective traumas. Repeatedly engaging with trauma-related media content for several hours daily shortly after collective trauma may prolong acute stress experiences and promote substantial stress-related symptomatology. Mass media may become a conduit that spreads negative consequences of community trauma beyond directly affected communities. PMID:24324161

  20. Media's role in broadcasting acute stress following the Boston Marathon bombings.

    Science.gov (United States)

    Holman, E Alison; Garfin, Dana Rose; Silver, Roxane Cohen

    2014-01-07

    We compared the impact of media vs. direct exposure on acute stress response to collective trauma. We conducted an Internet-based survey following the Boston Marathon bombings between April 29 and May 13, 2013, with representative samples of residents from Boston (n = 846), New York City (n = 941), and the remainder of the United States (n = 2,888). Acute stress symptom scores were comparable in Boston and New York [regression coefficient (b) = 0.43; SE = 1.42; 95% confidence interval (CI), -2.36, 3.23], but lower nationwide when compared with Boston (b = -2.21; SE = 1.07; 95% CI, -4.31, -0.12). Adjusting for prebombing mental health (collected prospectively), demographics, and prior collective stress exposure, six or more daily hours of bombing-related media exposure in the week after the bombings was associated with higher acute stress than direct exposure to the bombings (continuous acute stress symptom total: media exposure b = 15.61 vs. direct exposure b = 5.69). Controlling for prospectively collected prebombing television-watching habits did not change the findings. In adjusted models, direct exposure to the 9/11 terrorist attacks and the Sandy Hook School shootings were both significantly associated with bombing-related acute stress; Superstorm Sandy exposure wasn't. Prior exposure to similar and/or violent events may render some individuals vulnerable to the negative effects of collective traumas. Repeatedly engaging with trauma-related media content for several hours daily shortly after collective trauma may prolong acute stress experiences and promote substantial stress-related symptomatology. Mass media may become a conduit that spreads negative consequences of community trauma beyond directly affected communities.

  1. 40 years of terrorist bombings - A meta-analysis of the casualty and injury profile.

    Science.gov (United States)

    Edwards, D S; McMenemy, L; Stapley, S A; Patel, H D L; Clasper, J C

    2016-03-01

    Terrorists have used the explosive device successfully globally, with their effects extending beyond the resulting injuries. Suicide bombings, in particular, are being increasingly deployed due to the devastating effect of a combination of high lethality and target accuracy. The aim of this study was to identify trends and analyse the demographics and casualty figures of terrorist bombings worldwide. Analysis of the Global Terrorism Database (GTD) and a PubMed/Embase literature search (keywords "terrorist", and/or "suicide", and/or "bombing") from 1970 to 2014 was performed. 58,095 terrorist explosions worldwide were identified in the GTD. 5.08% were suicide bombings. Incidents per year are increasing (Pterrorist attacks. Overall 32 deaths and 180 injuries per incident were seen, however significantly more deaths occurred in explosions associated with a BC. Comparing OS and CS no difference in the deaths per incident was seen, 14.2(SD±17.828) and 15.63 (SD±10.071) respectively. However OS explosions resulted in significantly more injuries, 192.7 (SD±141.147), compared to CS, 79.20 (SD±59.8). Extremity related wounds were the commonest injuries seen (32%). Terrorist bombings continue to be a threat and are increasing particularly in the Middle East. Initial reports, generated immediately at the scene by experienced coordination, on the type of detonation (suicide versus non-suicide), the environment of detonation (confined, open, building collapse) and the number of fatalities, and utilising the Kill:Wounded ratios found in this meta-analysis, can be used to predict the number of casualties and their likely injury profile of survivors to guide the immediate response by the medical services and the workload in the coming days. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Colorectal cancer among atomic bomb survivors

    International Nuclear Information System (INIS)

    Nakatsuka, Hirofumi; Ezaki, Haruo.

    1986-01-01

    Studies on autopsied and surgical cases of colorectal cancer in Hiroshima and Nagasaki atomic bomb (A-bomb) survivors have not shown a relationship to radiation. In a recent epidemiologic study made on a fixed population at the Radiation Effects Research Foundation (RERF), the risk of colon cancer was found to increase significantly with increasing radiation dose in both Hiroshima and Nagasaki, and also in both males and females. The dose effect for the cities and sexes combined was especially pronounced for cancer of the sigmoid colon. The effect of radiation was found to vary by age at the time of the bomb (ATB) and the effect was remarkable among those under age 20 ATB. The risk of rectal cancer was not found to increase significantly with radiation and the distribution of histological types for cancer of either the colon or rectum was unrelated to radiation dose. The effect of A-bomb exposure on the postoperative survival rate for colorectal cancer patients was studied. No difference by radiation dose could be demonstrated. In Japan, the incidence of colorectal cancer, and of colon cancer in particular, has been increasing. Therefore, close attention should be paid to changes occurring in A-bomb survivors. (author)

  3. Colorectal cancer among atomic bomb survivors

    International Nuclear Information System (INIS)

    Nakatsuka, H.; Ezaki, H.

    1986-01-01

    Studies on autopsied and surgical cases of colorectal cancer in Hiroshima and Nagasaki atomic bomb (A-bomb) survivors have not shown a relationship to radiation. In a recent epidemiologic study made on a fixed population at the Radiation Effects Research Foundation (RERF), the risk of colon cancer was found to increase significantly with increasing radiation dose in both Hiroshima and Nagasaki, and also in both males and females. The dose effect for the cities and sexes combined was especially pronounced for cancer of the sigmoid colon. The effect of radiation was found to vary by age at the time of the bomb (ATB) and the effect was remarkable among those under age 20 ATB. The risk of rectal cancer was not found to increase significantly with radiation and the distribution of histological types for cancer of either the colon or rectum was unrelated to radiation dose. The effect of A-bomb exposure on the postoperative survival rate for colorectal cancer patients was studied. No difference by radiation dose could be demonstrated. In Japan, the incidence of colorectal cancer, and of colon cancer in particular, has been increasing. Therefore, close attention should be paid to changes occuring in A-bomb survivors

  4. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  5. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle becomes ...

  6. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  7. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  8. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  9. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  10. Thermal analysis of pyrotechnic mixture-fireworks, atom-bomb

    International Nuclear Information System (INIS)

    Rajendran, Jeya; Thanulingam, T.L.

    2008-01-01

    Sound level produced from two varieties of sound producing fireworks of atom-bomb, cake bomb and thunder bomb were measured. The pyrotechnic mixture, KNO 3 /S/Al(H 3 BO 3 ) of compositions 57.5/19.9/22.1(0.5)% very much similar to commercial atom-bomb were taken and five cake bomb and seven thunder bomb with different net weight of chemicals were manufactured specifically for analysis. Cake bomb with 1g pyrotechnic mixture and thunder bomb with 2g pyrotechnic mixture produce -3 . Ignition temperature of the mixture is above the melting point of the metallic fuel, Al (660 deg C) and self propagating decomposition occurred at high temperature. The pyrotechnic mixture, KNO 3 /S/Al(H 3 BO 3 ) is a safe mixture from accidental factor, static electricity. DSC studies indicate slight formation of potassium nitrite with evolution of NO above 400 deg C. (author)

  11. AFSC/REFM: Bomb-produced age validation study

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Fish age validation with bomb-produced radiocarbon (14C) requires a known-age Delta14C reference chronology spanning the era of a marine increase in bomb-produced...

  12. Investigating Effect of Olfactory Stimulation by Vanilla on the Rate of Apnea Attacks in Neonates with Apnea of Prematurity: A Randomized Clinical Trial

    Directory of Open Access Journals (Sweden)

    Sakineh Yaghoubi

    2017-12-01

    Full Text Available Background Apnea of prematurity (AOP is a developmental disorder that affects the premature newborns frequently. One of the new non-drug methods for controlling apnea attacks is olfactory stimulation. The aim of this study was to determine the effect of olfactory stimulation by vanilla on the rate of apnea attacks in neonates with AOP. Materials and Methods: This study is a single-blind randomized clinical trial study. The study samples included a total of 40 premature neonates with AOP who were admitted to the neonatal Intensive care unit (NICU of Shahid Sadoughi hospital in Yazd, Iran, in 2016 and were assigned randomly in experimental (n=20, and control (n=20 groups. The experimental group was exposed to cotton impregnated with 2ml of vanillin extractfor 24 hours. The number of apnea attacks, heart rate, and arterial oxygen saturation (SaO2 level were measured before, during and after intervention for three consecutive days. Data analysis was performed using statistical analysis in SPSS version 22.0 software. Results: The results showed that there was no significant difference between the two groups in terms of mean number of apnea attacks (p>0.05. However, there was a significant difference between in the experimental group on the first day (2.84 ± 1.25, and second day (1.63 ± 1.01 in terms of the mean number of attacks. Also, there was a significant difference between the mean heart rate and SaO2 level in both the experimental and control groups (p

  13. A-bomb radiation effects digest

    International Nuclear Information System (INIS)

    Shigematsu, Itsuzo; Akiyama, Mitoshi; Sasaki, Hideo; Ito, Chikako; Kamada, Nanao.

    1993-01-01

    This publication is the digest of the book 'Genbaku Hoshasen no Jintai Eikyo (Effects of A-bomb Radiation on the Human Body)' (365p.), published in Japanese by Hiroshima International Council for Medical Care of the Radiation-Exposed. Following a brief description on the damage of the atomic bomb, the subjects of malignant tumors, endocrine and metabolic deseases, ocular lesions, dermatologic effects, prenatal exposure, chromosoal aberrations, mutations, sensitivity to radiation, immune function, genetic effects and other effects of radiation are summarized. (J.P.N.)

  14. Ultrasonic Device Would Open Pipe Bombs

    Science.gov (United States)

    El-Raheb, Michael S.; Adams, Marc A.; Zwissler, James G.

    1991-01-01

    Piezoelectric ultrasonic transducer, energized by frequency generator and power supply, vibrates shell of pipe bomb while hardly disturbing explosive inner material. Frequency-control circuitry senses resonance in shell and holds generator at that frequency to induce fatigue cracking in threads of end cap. In addition to disarming bombs, ultrasonically induced fatigue may have other applications. In manufacturing, replaces some machining and cutting operations. In repair of equipment, cleanly and quickly disassembles corroded parts. In demolition of buildings used to dismember steel framework safely and controllably.

  15. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  16. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    Science.gov (United States)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  17. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  18. What Is a Heart Attack?

    Science.gov (United States)

    ... Research Home / Heart Attack Heart Attack Also known as Myocardial infarction Leer en español ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  19. Estimation of health hazards resulting from a radiological terrorist attack in a city

    International Nuclear Information System (INIS)

    Andersson, K.G.; Mikkelsen, T.; Astrup, P.; Thykier-Nielsen, S.; Nielsen, S.P.; Jacobsen, L. H.; Schou-Jensen, L.; Hoe, S.C.

    2008-01-01

    In recent years, the concern for protection of urban populations against terror attacks involving radiological, biological or chemical substances has attracted increasing attention. It sets new demands to decision support and consequence assessment tools, where the focus has traditionally been on accidental exposure. The aim of the present study was to illustrate issues that need to be considered in evaluating the radiological consequences of a 'dirty bomb' explosion. This is done through a worked example of simplified calculations of relative dose contributions for a specific 'dirty bomb' scenario leading to atmospheric dispersion of 90 Sr contamination over a city area. Also, the requirements of atmospheric dispersion models for such scenarios are discussed. (authors)

  20. Trusted Communication in SDN OpenFlow Channel : Investigating Assumed Trusted Communication between SDN Controller and Switch and Possible Attack Scenarios

    OpenAIRE

    Haapajärvi, Marika

    2017-01-01

    Originally the subject of the research was Software Defined Networking (SDN) and particularly the threats towards the architecture and the SDN controller. However, during the research, it became evident that the protocol under research, OpenFlow itself had features which may turn into threats under the hands of a malicious actor outside the SDN network. The features may have vulnerabilities that may transform into threats should an attacker gain access to the SDN network. The verification ...

  1. Experimental investigation of effect of flow attack angle on thermohydraulic performance of air flow in a rectangular channel with discrete V-pattern baffle on the heated plate

    Directory of Open Access Journals (Sweden)

    Raj Kumar

    2016-05-01

    Full Text Available In this work, the effect of angle of attack ( α a of the discrete V-pattern baffle on thermohydraulic performance of rectangular channel has been studied experimentally. The baffle wall was constantly heated and the other three walls of the channel were kept insulated. The experimentations were conducted to collect the data on Nusselt number ( N u b and friction factor ( f b by varying the Reynolds number (Re = 3000–21,000 and angle of attack ( α a from 30° to 70°, for the kept values of relative baffle height ( H b / H = 0 . 50 , relative pitch ratio ( P b / H = 1 . 0 , relative discrete width ( g w / H b = 1 . 5 and relative discrete distance ( D d / L v = 0 . 67 . As compared to the smooth wall, the V-pattern baffle roughened channel enhances the Nusselt number ( N u b and friction factor ( f b by 4.2 and 5.9 times, respectively. The present discrete V-pattern baffle shapes with angle of attack ( α a of 60° equivalent to flow Reynolds number of 3000 yields the greatest thermohydraulic performance. Discrete V-pattern baffle has improved thermal performance as compared to other baffle shapes’ rectangular channel.

  2. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  3. MK-82 bomb characterization for the sympathetic detonation study

    Energy Technology Data Exchange (ETDEWEB)

    Lucht, R.A.; Hantel, L.W.

    1988-01-01

    Optical, radiographic, and electronic pin techniques were used to evaluate the fragmentation of tail- and side-initiated MK-82 MOD 1 general purpose bombs. They were found to contain large voids, randomly located from bomb to bomb, in the Tritonal explosive fill. Characteristics of the void-side performance of the bomb were found to be as much as 10% different from the nonvoid side and were much less reproducible than the characteristics of the nonvoid side. The data collected will be useful in evaluating sympathetic detonation mitigation systems designed for use with the bombs. 12 figs., 3 tabs.

  4. Future population of atomic bomb survivors in Nagasaki.

    Science.gov (United States)

    Yokota, Kenichi; Mine, Mariko; Shibata, Yoshisada

    2013-01-01

    The Nagasaki University Atomic Bomb Survivor Database, which was established in 1978 for elucidating the long-term health effects of the atomic bombing, has registered since 1970 about 120,000 atomic bomb survivors with a history of residence in Nagasaki city. Since the number of atomic bomb survivors has steadily been decreasing, prediction of future population is important for planning future epidemiologic studies, and we tried to predict the population of atomic bomb survivors in Nagasaki city from 2008 to 2030. In addition, we evaluated our estimated population comparing with the actual number from 2008 to 2011.

  5. Religion and support for suicide attacks.

    Science.gov (United States)

    Ginges, Jeremy; Hansen, Ian; Norenzayan, Ara

    2009-02-01

    In four studies carried out across different cultural, religious, and political contexts, we investigated the association between religion and popular support for suicide attacks. In two surveys of Palestinians and one cognitive priming experiment with Israeli settlers, prayer to God, an index of religious devotion, was unrelated to support for suicide attacks. Instead, attendance at religious services, thought to enhance coalitional commitment, positively predicted support for suicide attacks. In a survey of six religions in six nations, regular attendance at religious services positively predicted a combination of willing martyrdom and out-group hostility, but regular prayer did not. Implications for understanding the role of religion in suicide attacks are discussed.

  6. Development of A-bomb survivor dosimetry

    International Nuclear Information System (INIS)

    Kerr, G.D.

    1995-01-01

    An all important datum in risk assessment is the radiation dose to individual survivors of the bombings in Hiroshima and Nagasaki. The first set of dose estimates for survivors was based on a dosimetry system developed in 1957 by the Oak Ridge National Laboratory (ORNL). These Tentative 1957 Doses (T57D) were later replaced by a more extensive and refined set of Tentative 1965 Doses (T65D). The T65D system of dose estimation for survivors was also developed at ORNL and served as a basis for risk assessment throughout the 1970s. In the late 1970s, it was suggested that there were serious inadequacies with the T65D system, and these inadequacies were the topic of discussion at two symposia held in 1981. In early 1983, joint US- Japan research programs were established to conduct a thorough review of all aspects of the radiation dosimetry for the Hiroshima and Nagasaki A-bomb survivors. A number of important contributions to this review were made by ORNL staff members. The review was completed in 1986 and a new Dosimetry System 1986 (DS86) was adopted for use. This paper discusses the development of the various systems of A-bomb survivor dosimetry, and the status of the current DS86 system as it is being applied in the medical follow-up studies of the A-bomb survivors and their offspring

  7. Bomb apologetics: Farm Hall, August 1945

    Energy Technology Data Exchange (ETDEWEB)

    Bernstein, J. [Professor of Physics at Stevens Institute of Technology in Hoboken New Jersey (United States); Cassidy, D. [Professor at Hofstra University, in Hempstead, New York (United States)

    1995-08-01

    On hearing the news from Hiroshima, the incredulous internees came up with a self-serving story to explain their failures in nucleus research: To keep Hitler from winning, they had deliberately not developed the atomic bomb. {copyright} 1995 {ital American} {ital Institute} {ital of} {ital Physics}.

  8. Bomb apologetics: Farm Hall, August 1945

    International Nuclear Information System (INIS)

    Bernstein, J.; Cassidy, D.

    1995-01-01

    On hearing the news from Hiroshima, the incredulous internees came up with a self-serving story to explain their failures in nucleus research: To keep Hitler from winning, they had deliberately not developed the atomic bomb. copyright 1995 American Institute of Physics

  9. Hurricane Ike versus an Atomic Bomb

    Science.gov (United States)

    Pearson, Earl F.

    2013-01-01

    The destructive potential of one of nature's most destructive forces, the hurricane, is compared to one of human's most destructive devices, an atomic bomb. Both can create near absolute devastation at "ground zero". However, how do they really compare in terms of destructive energy? This discussion compares the energy, the…

  10. Health risks of atomic bomb survivors

    International Nuclear Information System (INIS)

    Yoshimoto, Y.; Soda, M.; Mabuchi, K.

    1992-01-01

    At the Atomic Bomb Casualty Commission and its successor organization, the Radiation Effects Research Foundation, mortality and morbidity surveys have been continually carried out on about 1,800 persons exposed in utero to the atomic bombings of Hiroshima and Nagasaki. Although the effect of radiation exposure was marked enough to permit observation of a dose-response relationship in the 30 known cases of severe mental retardation among the in utero-exposed, the association between in utero exposure and cancer risk is still uncertain. Based on data for all cancers from 1950 through 1984 for the in utero-exposed, the excess risk per 10,000 person-year-Gy was 6.57 and the relative risk at 1 Gy was 3.77. For the recent years 1985-89, there was no evident excess of cancer risk. During the remaining lifetime, it seems unlikely that any great excess of leukemia will appear. As for the risk of solid tumors, further follow up is in progress. The 1950-89 findings for cancer risk among the in utero-exposed will be compared with cancer risk among A-bomb survivors who were less than 10 years old at the time of the bombings. (author)

  11. William Hayes and His Pallanza Bomb Shell

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 16; Issue 10. William Hayes and His Pallanza Bomb Shell. R Jayaraman. General Article Volume 16 Issue 10 October 2011 pp 911-921. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/016/10/0911-0921 ...

  12. The 'secureplan' bomb utility: A PC-based analytic tool for bomb defense

    International Nuclear Information System (INIS)

    Massa, R.J.

    1987-01-01

    This paper illustrates a recently developed, PC-based software system for simulating the effects of an infinite variety of hypothetical bomb blasts on structures and personnel in the immediate vicinity of such blasts. The system incorporates two basic rectangular geometries in which blast assessments can be made - an external configuration (highly vented) and an internal configuration (vented and unvented). A variety of explosives can be used - each is translated to an equivalent TNT weight. Provisions in the program account for bomb cases (person, satchel, case and vehicle), mixes of explosives and shrapnel aggregates and detonation altitudes. The software permits architects, engineers, security personnel and facility managers, without specific knowledge of explosives, to incorporate realistic construction hardening, screening programs, barriers and stand-off provisions in the design and/or operation of diverse facilities. System outputs - generally represented as peak incident or reflected overpressure or impulses - are both graphic and analytic and integrate damage threshold data for common construction materials including window glazing. The effects of bomb blasts on humans is estimated in terms of temporary and permanent hearing damage, lung damage (lethality) and whole body translation injury. The software system has been used in the field in providing bomb defense services to a number of commercial clients since July of 1986. In addition to the design of siting, screening and hardening components of bomb defense programs, the software has proven very useful in post-incident analysis and repair scenarios and as a teaching tool for bomb defense training

  13. Sulfur activation at the Little Boy-Comet Critical Assembly: a replica of the Hiroshima bomb

    International Nuclear Information System (INIS)

    Kerr, G.D.; Emery, J.F.; Pace, J.V. III.

    1985-04-01

    Studies have been completed on the activation of sulfur by fast neutrons from the Little Boy-Comet Critical Assembly which replicates the general features of the Hiroshima bomb. The complex effects of the bomb's design and construction on leakage of sulfur-activation neutrons were investigated both experimentally and theoretically. Our sulfur activation studies were performed as part of a larger program to provide benchmark data for testing of methods used in recent source-term calculations for the Hiroshima bomb. Source neutrons capable of activating sulfur play an important role in determining neutron doses in Hiroshima at a kilometer or more from the point of explosion. 37 refs., 5 figs., 6 tabs

  14. The current mortality rates of a-bomb survivors in Nagasaki-city

    International Nuclear Information System (INIS)

    Okajima, Shunzo; Mine, Mariko; Nakamura, Tsuyoshi; Mori, Hiroyuki; Kondo, Hisayoshi

    1980-01-01

    The causes of death for 9814 a-bomb survivors in Nagasaki-city from '70 to '76 were investigated. The mortality rates of the survivors in the aged group were slightly lower than those of both unexposed citizens in Nagasaki and the national average. No difference of the mortality ratios with respect to sex and the distance from a-bomb at exposure was observed. For the cause of death, the cerebrovascular diseases came next to malignant neoplasms in the a-bomb survivors, which order was reverse in the non-exposed population. The mortality rate of the cerebrovascular diseases in the survivors was lower than the expected value. The mortality rate of survivors due to neoplasms was slightly higher than the national average, although almost the same as that of unexposed citizens in Nagasaki. (Nakanishi, T.)

  15. Foreign bodies radiographically-demonstrated in atomic bomb survivors

    International Nuclear Information System (INIS)

    Tamura, Shozo; Onitsuka, Hideo; Lee, K.; Shimizu, Yukiko; Russell, W.J.

    1978-01-01

    The prevalence of roentgenologically-detected foreign bodies among atomic bomb (A-bomb) survivors was studied as an indicator of the A-bomb blast effects. Acupuncture was studied as an indicator of A-bomb-related abnormalities for which it was administered. All Adult Health Study subjects' roentgenograms demonstrating foreign bodies were reviewed. The frequency of glass and metal, and acupuncture needles were analyzed by distance from hypocenters, sex, age, body sites involved; and the subjects' shielding at the times of the A-bombs. The presence of glass fragments correlated closely with distance from hypocenter, heavy shielding from the A-bombs, and with adulthood, and they were more frequent in the chest than hand and wrist. Metal foreign bodies were more frequent in the hand and wrist than in the chest, and not associated with distance from hypocenter or heavy shielding. The prevalence of acupuncture needles increased with age, but did not correlate with A-bomb dose. (author)

  16. Effort-Reward Imbalance and Post-Traumatic Stress After a Workplace Terror Attack.

    Science.gov (United States)

    Hem, Camilla; Nielsen, Morten Birkeland; Hansen, Marianne Bang; Heir, Trond

    2016-04-01

    Following adverse work conditions, health consequences can be explained by an imbalance between the effort made and the reward received. We investigated the association between extra effort, perceived reward, and post-traumatic stress disorder (PTSD). The Effort-Reward Imbalance Model was used to examine whether extra effort at work in the aftermath of a workplace-related terrorist attack affected the risk of PTSD and the effects of reward for extra effort from a leader or colleagues. Cross-sectional data were collected 10 months after a terrorist attack in Norway in 2011. Out of 3520 Ministry employees invited, 1927 agreed to participate. Employees reported any extra effort performed as a result of the bomb explosion and any reward received from a leader or colleagues. PTSD was assessed with the PTSD Checklist. Employees who reported extra effort displayed increased risk for PTSD (odds ratio [OR]=1.71, 95% confidence interval [CI]: 1.15-2.55, P=0.008). Perceived reward for extra effort from a leader was associated with lower risk for PTSD (OR=0.39, 95% CI: 0.23-0.64, P<0.001) but not perceived reward from colleagues. Extra effort may increase the risk of PTSD, but reward from a leader may mitigate this effect. The Effort-Reward Imbalance Model appears to be an appropriate approach that may contribute to understanding of the etiology of work-related PTSD.

  17. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    Science.gov (United States)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  18. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    International Nuclear Information System (INIS)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-01-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment

  19. Kleptographic Attacks on ECDSA

    Directory of Open Access Journals (Sweden)

    Nadezhda Anatolievna Chepick

    2014-12-01

    Full Text Available This paper presents secretly trapdoor with universal protection (SETUP attacks on the elliptic curve digital signature algorithm ECDSA. It allows a malicious manufacturer of black-box cryptosystems to implement these attacks to get access to user’s private key. The attacker can obtain user’s private key. The way ECDSA can be used for encryption and key exchange is also described.

  20. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  1. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  2. Characterising the light output from Argon bombs by two simultaneous diagnostic techniques

    CSIR Research Space (South Africa)

    Olivier, M

    2013-01-01

    Full Text Available The light output from Argon-bombs was investigated by means of ultra high speed photography (Cordin Model 550-32 camera) and locally developed photodiode sensors. Tubes of various sizes were inflated with Argon gas, and were detonated on one side...

  3. Long-term health and wellbeing of people affected by the 2002 Bali bombing.

    Science.gov (United States)

    Stevens, Garry J; Dunsmore, Julie C; Agho, Kingsley E; Taylor, Melanie R; Jones, Alison L; van Ritten, Jason J; Raphael, Beverley

    2013-03-18

    To examine the physical and mental health status of individuals directly affected by the 2002 Bali bombing, 8 years after the incident. Cross-sectional study of people directly exposed to and/or bereaved by the 2002 Bali bombing who had participated in a New South Wales Health therapeutic support program. Telephone interviews were conducted during July - November 2010. The sample was weighted to reflect the population of interest, registered participants in the program (n = 115). Self-rated physical health, personal resilience (Connor-Davidson Resilience Scale), past-03 psychological distress and daily functioning (Kessler Psychological Distress Scale), and traumatic stress-related symptoms (Primary Care PTSD Screen). Of 81 individuals contacted, 55 responded (68%). Mean age of respondents was 50 years (range, 20-73 years), 32 were female, and seven were physically injured in the bombing. Most (45/55) reported good physical health, but 12 were experiencing high or very high levels of psychological distress. Being injured in the attack was associated with current functional impairment (P = 0.04) and very high levels of distress (P = 0.005). Lower distress was associated with perceived family support (P> = 0.03) and being in a marital or de facto relationship (P = 0.02). Complicated grief factors were consistently associated with high psychological distress, traumatic stress-related symptoms and lower personal resilience. Eight years after the bombing, directly affected individuals had good physical health but relatively high rates of psychological distress. Marital or de facto relationships and perceived family support appear to be protective factors against long-term distress. Bereavement factors were the strongest correlates of trauma symptoms and distress. Outreach and screening programs incorporating complicated grief items may be useful in the longer-term support of such individuals.

  4. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses such

  5. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  6. Mortality of atomic bomb survivors in Nagasaki

    International Nuclear Information System (INIS)

    Mine, Mariko; Honda, Sumihisa; Kondo, Hisayoshi; Yokota, Kenichi; Tomonaga, Masao; Okumura, Yutaka

    1999-01-01

    We analyzed the risk in 2,743 atomic bomb survivors by using a new dosimetry system. From the database, we selected 2,743 exposed persons and a total of three times 2,743 age-matched controls who were living far from the center of the A-bomb radiation in Nagasaki at the time of the explosion and who were still alive in 1971. The mortalities from all causes for male subjects exposed were slightly lower than, or almost equal to, those of unexposed persons. Death from cancer, however, increased in both sexes after all levels of irradiation except in males exposed to 0.01-0.49 Gy. In males, the risk was showed significant reduction in death from all diseases other than cancer classified according to 0.31-0.40 Gy. (author)

  7. Redesigning the rotating-bomb combustion calorimeter

    International Nuclear Information System (INIS)

    Flores, Henoc; Mentado, Juan; Amador, Patricia; Torres, Luis Alfonso; Campos, Myriam; Rojas, Aaron

    2006-01-01

    In order to obtain reliable data of the standard enthalpy of combustion of compounds containing sulfur or halogen atoms, a new calorimetric rotating-bomb system has been set up. Around a platinum lining Parr 1004 C combustion bomb, an isoperibolic calorimeter has been designed, constructed and tested. The calorimeter was calibrated by using standard benzoic acid and the resulting equivalent in energy was ε(calor)=(14321.2+/-2.4)J.K -1 . Combustion measurements using thianthrene were made in order to verify the accuracy of the device, leading to the value of Δ c u o =-(33462.9+/-5.7)J.g -1 , in agreement with the recommended one

  8. Terror, tortur og den tikkende bombe

    DEFF Research Database (Denmark)

    Dige, Morten

    2012-01-01

    The so-called "war on terror" has renewed the interest in torture in practice as well as in theory. The philosophical debate about possible justifications for torture has to a large extent revolved about the ticking bomb scenario: would it be justified to torture a terrorist in order to prevent a...... of torture. Finally, I offer an explanation of what it means to regard the prohibition of torture as absolute....

  9. The Bali bombing: civilian aeromedical evacuation.

    Science.gov (United States)

    Tran, Minh D; Garner, Alan A; Morrison, Ion; Sharley, Peter H; Griggs, William M; Xavier, Colin

    2003-10-06

    After the Bali bombing on 12 October 2002, many injured Australians required evacuation to Darwin, and then to burns units around Australia. Many patients were evacuated from Denpasar by Qantas, with assistance from staff of civilian medical retrieval services. The transport of patients from Darwin to specialist burns units involved a coordinated response of civilian and military services. Some issues in responding to such disasters were identified, and a national coordinating network could improve future responses.

  10. Cued Panic Attacks in Body Dysmorphic Disorder

    Science.gov (United States)

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  11. Influence on social life of atomic bomb, chapter 3

    International Nuclear Information System (INIS)

    Anon.

    1979-01-01

    Atomic bombs, for the first time in human history, were dropped on Hiroshima in August 6, and on Nagasaki on August 9, 1945. Though the powers of these bombs were far small as compared with those of present day nuclear weapons, the atomic bombs claimed many lives instantaneously, damaged human bodies, and destroyed all objects, annihilating the urban areas. Even today, the dreadful consequences of the bombings still remain in both body and mind of the victims. Meanwhile, the experiences of atomic bomb disasters are fading constantly. In order to maintain the vivid information, in Part 3 ''Influence on social life'', the following matters are described: relations of the atomic bombings to society; destroyed societies such as disruption of regional societies and loss of wealth; life of the sufferers such as occupation, marriage, hardships of life, orphans, livelihood variation, and suffering of foreigners; and mental process of the sufferers. (J.P.N.)

  12. Why the USA dropped atomic bombs on Japanese cities

    International Nuclear Information System (INIS)

    Bernstein, B.

    1997-01-01

    Why did the USA use atomic bombs on Japanese cities? Because, by summer 1945, the earlier morality that said you should not kill non-combatants had been chipped away, then eroded, and ultimately destroyed by World War II. After Hitler's viciousness, after the Japanese rape of Nanjing, after the killings in Manila, after the savagery through Asia, after Dresden, after Hamburg, after Tokyo, Osaka, Kobe, Nagoya - over sixty Japanese cities had been bombed before Hiroshima, Hiroshima was inevitable, easy, comfortable, virtually automatic. The transformation was not the use of bomb, but the bombing of non-combatants - massively, intentionally. There was probably a desire to revenge, as well. In addition, there was an expectation that the bombs used on japan would also intimidate the Soviet Union but that was not crucial. Any nation that had the capacity would have used the bomb in righteousness and comfort, self-conceived dignity, amid popular applause from its electorate people

  13. On the anti-neutron bomb movement in the Netherlands

    International Nuclear Information System (INIS)

    Hoek, T. van.

    1978-01-01

    The author reports on activities of the Dutch activists group Stop the neutron bomb in his country: Collection of signatures, statements made by about a hundred well-known theologians, two-thirds majority in parliament against the production and emplacement of the neutron bomb, International Forum 1978 in Amsterdam with mass demonstrations. President Carter is said to have been forced to delay the production of the neutron bomb temporarily by means of this international pressure. (HSCH) [de

  14. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  15. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  16. 36Cl bomb peak: comparison of modeled and measured data

    Directory of Open Access Journals (Sweden)

    A. Eichler

    2009-06-01

    Full Text Available The extensive nuclear bomb testing of the fifties and sixties and the final tests in the seventies caused a strong 36Cl peak that has been observed in ice cores world-wide. The measured 36Cl deposition fluxes in eight ice cores (Dye3, Fiescherhorn, Grenzgletscher, Guliya, Huascarán, North GRIP, Inylchek (Tien Shan and Berkner Island were compared with an ECHAM5-HAM general circulation model simulation (1952–1972. We find a good agreement between the measured and the modeled 36Cl fluxes assuming that the bomb test produced global 36Cl input was ~80 kg. The model simulation indicates that the fallout of the bomb test produced 36Cl is largest in the subtropics and mid-latitudes due to the strong stratosphere-troposphere exchange. In Greenland the 36Cl bomb signal is quite large due to the relatively high precipitation rate. In Antarctica the 36Cl bomb peak is small but is visible even in the driest areas. The model suggests that the large bomb tests in the Northern Hemisphere are visible around the globe but the later (end of sixties and early seventies smaller tests in the Southern Hemisphere are much less visible in the Northern Hemisphere. The question of how rapidly and to what extent the bomb produced 36Cl is mixed between the hemispheres depends on the season of the bomb test. The model results give an estimate of the amplitude of the bomb peak around the globe.

  17. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  18. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  19. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  20. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  1. Facial Dog Attack Injuries

    OpenAIRE

    Lin, Wei; Patil, Pavan Manohar

    2013-01-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to succe...

  2. Relationship between epidemiological factors and mortality among atomic bomb survivors, Hiroshima and Nagasaki

    International Nuclear Information System (INIS)

    Nagai, Masanori

    1980-01-01

    In 1965, mail survey on environmental and individual factors was performed for 11,724 male a-bomb survivors, with the age of 40 to 69, selected from the group subjected to joint JNIH-ABCC investigation of life span in a-bomb survivors. During 10 years after the mail survey, 2,834 died. The aim of this mail survey was to clarify the relationship between the mortality and specific environmental, social, and economic factors. There was a relationship between high mortality and low social and economical condition for all causes of death combined, cerebral vascular diseases, all malignant neoplasms, and gastric cancer. Smoking was a significant risk factor to all causes of death combined, ischemic heart diseases, all malignant neoplasms, gastric, tracheal, bronchial, and lung cancers. The mortality due to cardiovascular diseases was significantly higher in a-bomb survivors with heavy weight. The mortality due to all causes of death combined, all malignant neoplasms, lung, and gastric cancer tended to become higher in a-bomb survivors who got married early. (Tsunoda, M.)

  3. The Japanese aerial attack on Hanford Engineer Works

    Science.gov (United States)

    Clark, Charles W.

    The day before the Pearl Harbor attack, December 6, 1941, the University of Chicago Metallurgical Laboratory was given four goals: design a plutonium (Pu) bomb; produce Pu by irradiation of uranium (U); extract Pu from the irradiated U; complete this in time to be militarily significant. A year later the first controlled nuclear chain reaction was attained in Chicago Pile 1 (CP-1). In January 1943, Hanford, WA was chosen as the site of the Pu factory. Neutron irradiation of 238U was to be used to make 239Pu. This was done by a larger version of CP-1, Hanford Reactor B, which went critical in September 1944. By July 1945 it had made enough Pu for two bombs: one used at the Trinity test in July; the other at Nagasaki, Japan in August. I focus on an ironic sidelight to this story: disruption of hydroelectric power to Reactor B by a Japanese fire balloon attack on March 10, 1945. This activated the costly coal-fired emergency backup plant to keep the reactor coolant water flowing, thwarting disaster and vindicating the conservative design of Hanford Engineer Works. Management of the Hanford Engineer Works in World War II, H. Thayer (ASCE Press 1996).

  4. Crowdsourcing Intelligence to Combat Terrorism: Harnessing Bottom-Up Collection to Prevent Lone-Wolf Terror Attacks

    Science.gov (United States)

    2015-03-01

    doesn’t require a lot pre-operational surveillance and is only happening in the mind of the offender , from an intelligence standpoint, from a...but were not members of 55 Bob Drogin and April Choi, “ Teen Held in Alleged Portland Bomb Plot,” Los Angeles Times, November 28, 2010, http...car-bomb-cops-evacuate-heart-nyc-potential- terrorist-attack-article-1.444423. 75 Pat Pheifer, “Waseca Teen Accused in School Shooting Plot had been

  5. The Manhattan Project: Making the atomic bomb

    Energy Technology Data Exchange (ETDEWEB)

    Gosling, F.G.

    1994-09-01

    This article is a short history of the origins and development of the American atomic bomb program during World War II. Beginning with the scientific developments of the pre-war years, the monograph details the role of US government in conducting a secret, nationwide enterprise that took science from the laboratory and into combat with an entirely new type of weapon. The monograph concludes with a discussion of the immediate postwar period, the debate over the Atomic Energy Act of 1946, and the founding of the Atomic Energy Commission.

  6. Hans Bethe : Des etoiles a la bombe

    Science.gov (United States)

    Bonnet-Bidaud, J. M.

    1996-06-01

    Il comprit le premier comment brillent les etoiles. Il fut aussi de cette poignee de scientifiques qui, dans le secret de Los Alamos, mirent au point la tristement celebre bombe atomique. Hans Bethe est l'un des derniers geants qui auront marque la physique de ce siecle d'une empreinte indelebile. C'est dans le bureau 01 du prestigieux laboratoire Kellog de l'institut Caltech qu'il a bien voulu retracer pour nous son impressionnante carriere, et revenir sur les motivations qui ont guide ses pas.

  7. Organ dose estimates for the Japanese atomic-bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Kerr, G.D.

    1978-10-01

    Recent studies concerning radiation risks to man by the Committee on Biological Effects of Ionizing Radiation of the National Academy of Sciences-National Research Council and the United Nations Scientific Committee on the Effects of Atomic Radiation have emphasized the need for estimates of dose to organs of the Japanese atomic-bomb survivors. Shielding of internal organs by the body has been investigated for fission-weapon gamma rays and neutrons, and ratios of mean absorbed dose in a number of organs to survivors' T65D assignments of tissue kerma in air are provided for adults. Ratios of mean absorbed dose to tissue kerma in air are provided also for the thyroid and active bone marrow of juveniles. These organ dose estimates for juveniles are of interest in studies of radiation risks due to an elevated incidence of leukemia and thyroid cancer in survivors exposed as children compared to survivors exposed as adults.

  8. Organ dose estimates for the Japanese atomic-bomb survivors

    International Nuclear Information System (INIS)

    Kerr, G.D.

    1978-10-01

    Recent studies concerning radiation risks to man by the Committee on Biological Effects of Ionizing Radiation of the National Academy of Sciences-National Research Council and the United Nations Scientific Committee on the Effects of Atomic Radiation have emphasized the need for estimates of dose to organs of the Japanese atomic-bomb survivors. Shielding of internal organs by the body has been investigated for fission-weapon gamma rays and neutrons, and ratios of mean absorbed dose in a number of organs to survivors' T65D assignments of tissue kerma in air are provided for adults. Ratios of mean absorbed dose to tissue kerma in air are provided also for the thyroid and active bone marrow of juveniles. These organ dose estimates for juveniles are of interest in studies of radiation risks due to an elevated incidence of leukemia and thyroid cancer in survivors exposed as children compared to survivors exposed as adults

  9. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  10. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight... upon receiving information that an act or suspected act of air piracy has been committed, the aircraft...

  11. Radiographic study for sympathetic detonation of 500-lb bombs

    Energy Technology Data Exchange (ETDEWEB)

    Lucht, R.A.

    1989-01-01

    Flash radiography have determined the size and velocity vectors in the near field of fragments from tail- and side-initiated MK 82 MOD 1, general-purpose bombs. Excellent radiographs have been acquired from nine separate tests. Unlike arena tests, the radiographs were taken 75 to 125 cm from the case and show that the fragments peel off the case in long strips. A major concern in the design and execution of the experiments was the protection of the 450-kV x-ray heads and the film cassettes from fragments and blast produced by the 500-lb bombs. The velocity and size data, along with optical and electronic pin data, were used to characterize the fragments of the donor bomb in a donor-acceptor sympathetic detonation system study. The bombs were found to contain large shrink voids, randomly located from bomb to bomb, in the explosive Tritonal fill. Characteristics of the fragments from the void side if the bomb were found to be as much as 10% different from the nonvoid side and were much less reproducible than the fragments characteristics of the nonvoid side. The data collected will be useful in evaluating sympathetic detonation mitigation systems designed for use with the bombs. Such mitigation systems may be required for mass storage methods to meet the evolving insensitive munition requirements. 13 refs., 7 figs.

  12. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  13. Collaborative Attack vs. Collaborative Defense

    Science.gov (United States)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  14. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  15. Autoantibodies and immunoglobulins among atomic bomb survivors

    International Nuclear Information System (INIS)

    Fujiwara, Saeko; Akahoshi, Masazumi; Kodama, Kazunori; Shimaoka, Katsutaro; Akiyama, Mitoshi; Carter, R.L.; Yamakido, Michio

    1994-01-01

    The purpose of this study was to determine if exposure to atomic bomb radiation affects immune responsiveness, such as the occurrence of autoantibodies and levels of immunoglobulins. Rheumatoid factor, antinuclear antibody, antithyroglobulin antibody, anti-thyroid-microsomal antibody and immunoglobulin levels (IgG, IgM, IgA and IgE) were measured among 2,061 individuals exposed to atomic bomb radiation in Hiroshima and Nagasaki whose estimated doses ranged from 0 to 5.6 Gy. The prevalence and titers of rheumatoid factor were found to be increased in the individuals exposed to higher radiation doses. The IgA level in females and the IgM level in both sexes increased as radiation dose increased, although the effects of radiation exposure were not large. No effect of radiation was found on the prevalence of antinuclear antibody, antithyroglobulin antibody and anti-thyroid-microsomal antibody or on the levels of IgG and IgE. 32 refs., 2 figs., 3 tabs

  16. Symptoms of Depression in Israeli Adolescents Following a Suicide Bombing: The Role of Gender

    Science.gov (United States)

    Barile, John P.; Grogan, Kathryn E.; Henrich, Christopher C.; Brookmeyer, Kathryn A.; Shahar, Golan

    2012-01-01

    This report investigated the potential role of gender in moderating the effects of terror attack exposure on depression symptoms in middle school students from Dimona, Israel (N = 90). Specifically, the effects of three aspects of terror attacks were investigated: physical exposure, relational exposure, and media exposure. Ninety early adolescents…

  17. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  18. Neutron and gamma ray calculation for Hiroshima-type atomic bomb

    Energy Technology Data Exchange (ETDEWEB)

    Hoshi, Masaharu; Endo, Satoru; Takada, Jun [Hiroshima Univ. (Japan). Research Inst. for Radiation Biology and Medicine; Iwatani, Kazuo; Oka, Takamitsu; Shizuma, Kiyoshi; Fujita, Shoichiro; Hasai, Hiromi

    1998-03-01

    We looked at the radiation dose of Hiroshima and Nagasaki atomic bomb again in 1986. We gave it the name of ``Dosimetry System 1986`` (DS86). We and other groups have measured the expose dose since 1986. Now, the difference between data of {sup 152}Eu and the calculation result on the basis of DS86 was found. To investigate the reason, we carried out the calculations of neutron transport and neutron absorption gamma ray for Hiroshima atomic bomb by MCNP3A and MCNP4A code. The problems caused by fast neutron {sup 32}P from sulfur in insulator of pole. To correct the difference, we investigated many models and found agreement of all data within 1 km. (S.Y.)

  19. Depression After Heart Attack

    Science.gov (United States)

    ... Heart Attack? Redford B. Williams Download PDF https://doi.org/10.1161/CIRCULATIONAHA.110.017285 Circulation. 2011; 123: ... e639-e640 , originally published June 27, 2011 https://doi.org/10.1161/CIRCULATIONAHA.110.017285 Citation Manager Formats ...

  20. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  1. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. Copyright © 2013 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  2. Cumulative exposure to prior collective trauma and acute stress responses to the Boston marathon bombings.

    Science.gov (United States)

    Garfin, Dana Rose; Holman, E Alison; Silver, Roxane Cohen

    2015-06-01

    The role of repeated exposure to collective trauma in explaining response to subsequent community-wide trauma is poorly understood. We examined the relationship between acute stress response to the 2013 Boston Marathon bombings and prior direct and indirect media-based exposure to three collective traumatic events: the September 11, 2001 (9/11) terrorist attacks, Superstorm Sandy, and the Sandy Hook Elementary School shooting. Representative samples of residents of metropolitan Boston (n = 846) and New York City (n = 941) completed Internet-based surveys shortly after the Boston Marathon bombings. Cumulative direct exposure and indirect exposure to prior community trauma and acute stress symptoms were assessed. Acute stress levels did not differ between Boston and New York metropolitan residents. Cumulative direct and indirect, live-media-based exposure to 9/11, Superstorm Sandy, and the Sandy Hook shooting were positively associated with acute stress responses in the covariate-adjusted model. People who experience multiple community-based traumas may be sensitized to the negative impact of subsequent events, especially in communities previously exposed to similar disasters. © The Author(s) 2015.

  3. Medical Effects of a Transuranic "Dirty Bomb".

    Science.gov (United States)

    Durakovic, Asaf

    2017-03-01

    The modern military battlefields are characterized by the use of nonconventional weapons such as encountered in the conflicts of the Gulf War I and Gulf War II. Recent warfare in Iraq, Afghanistan, and the Balkans has introduced radioactive weapons to the modern war zone scenarios. This presents the military medicine with a new area of radioactive warfare with the potential large scale contamination of military and civilian targets with the variety of radioactive isotopes further enhanced by the clandestine use of radioactive materials in the terrorist radioactive warfare. Radioactive dispersal devices (RDDs), including the "dirty bomb," involve the use of organotropic radioisotopes such as iodine 131, cesium 137, strontium 90, and transuranic elements. Some of the current studies of RDDs involve large-scale medical effects, social and economic disruption of the society, logistics of casualty management, cleanup, and transportation preparedness, still insufficiently addressed by the environmental and mass casualty medicine. The consequences of a dirty bomb, particularly in the terrorist use in urban areas, are a subject of international studies of multiple agencies involved in the management of disaster medicine. The long-term somatic and genetic impact of some from among over 400 radioisotopes released in the nuclear fission include somatic and transgenerational genetic effects with the potential challenges of the genomic stability of the biosphere. The global contamination is additionally heightened by the presence of transuranic elements in the modern warzone, including depleted uranium recently found to contain plutonium 239, possibly the most dangerous substance known to man with one pound of plutonium capable of causing 8 billion cancers. The planning for the consequences of radioactive dirty bomb are being currently studied in reference to the alkaline earths, osteotropic, and stem cell hazards of internally deposited radioactive isotopes, in particular

  4. Foreign bodies radiographically-demonstrated in atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Tamura, S.; Onitsuka, H.; Lee, K.; Shimizu, Y.; Russell, W.J.

    1978-08-25

    The prevalence of roentgenologically-detected foreign bodies among atomic bomb (A-bomb) survivors was studied as an indicator of the A-bomb blast effects. Acupuncture was studied as an indicator of A-bomb-related abnormalities for which it was administered. All Adult Health Study subjects' roentgenograms demonstrating foreign bodies were reviewed. The frequency of glass and metal, and acupuncture needles were analyzed by distance from hypocenters, sex, age, body sites involved; and the subjects' shielding at the times of the A-bombs. The presence of glass fragments correlated closely with distance from hypocenter, heavy shielding from the A-bombs, and with adulthood, and they were more frequent in the chest than hand and wrist. Metal foreign bodies were more frequent in the hand and wrist than in the chest, and not associated with distance from hypocenter or heavy shielding. The prevalence of acupuncture needles increased with age, but did not correlate with A-bomb dose.

  5. BIRD ATTACK OCULAR INJURIES.

    Science.gov (United States)

    Tabatabaei, Seyed Ali; Soleimani, Mohammad; Behrouz, Mahmoud Jabbarvand

    2017-03-29

    To report 30 patients with bird attack-related eye injuries. This study was performed among patients coming to Farabi Eye Hospital, Tehran, Iran, from 2010 to 2015 with a history of bird attack causing eye injury. The inclusion criteria were a history of bird attack by pecking causing eye injury and having treatment and follow-up record for at least 6 months after treatment. The primary eye examinations included a full ophthalmic examination including evaluation of uncorrected visual acuity and best-corrected visual acuity (BCVA), anterior segment slit lamp biomicroscopy, and photography. For all patients with penetrating injury, primary repair was undertaken. Thirty patients (10 females and 20 males) with a mean age of 23.3 ± 18.5 years entered the study. The most common zone of injury was zone 1 (P < 0.001), and lensectomy was not needed in majority of patients (P < 0.001). The most common bird causing the injury was mynah (P < 0.001). Those patients with baseline BCVA of less than 20/200 or those with endophthalmitis had statistically worse final BCVA after treatment. Patients attacked by mynah bird had significantly better pretreatment uncorrected visual acuity and BCVA. The most common bird causing the eye injury among the sample of patients from Iran was mynah, which differs with previous studies indicating the rooster attack as the most common cause of eye injury. The authors also found that the most common zone of injury was zone 1, and the presence of endophthalmitis and lower baseline BCVA were significant risk factors for worse visual outcomes.

  6. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  7. Aging studies in atomic bomb survivors

    International Nuclear Information System (INIS)

    Belsky, J.L.; Moriyama, I.M.; Fujita, Shoichiro; Kawamoto, Sadahisa.

    1979-07-01

    Although the studies of the effect of ionizing radiation on atomic bomb survivors have not produced any evidence of radiation-induced aging, there have been studies on experimental animals and man which suggest accelerated aging after exposure to ionizing radiation. To determine if certain physiologic functions could be related to exposure to ionizing radiation, a battery of age-related tests was given at the time of the physical examinations at ABCC. Some 11,351 persons were given these non-invasive age-related tests. The results were essentially negative. Until a satisfactory operational definition of biologic or physiologic age is developed, the administration of functional tests as a measure of aging does not seem justified. (author)

  8. Preleukemic state in atomic bomb survivors

    International Nuclear Information System (INIS)

    Mikami, Motoko

    1980-01-01

    Hematology data before onset of leukemia were available for 55 of the 1462 acute leukemia cases (as of the end of June 1976) collected by RERF. Among these, 8 showed preleukemic state and 2 were polycythemia. In content, preleukemic state comprised anemia, leukopenia and morphological abnormalities of RBC, platelets and WBC. Leukemia cases presenting preleukemic state were, by type, mostly erythroleukemia and monocytic leukemia. Preleukemic state was not necessarily frequent among cases of leukemia in A-bomb survivors exposed to high dose. The prevalence of the 5 items, prescribed as preleukemic state, i.e., anemia (female =50%), and relative monocytosis (>=10%), could not be said to be high in the survivors exposed to high dose. Anemia in males and leukopenia in males and females were increased significantly with age. Leukemia prevalence was significantly high especially in those cases that had presented leukopenia, relative neutropenia or relative lymphocytosis among the 5 items prescribed as preleukemic state. (author)

  9. Leukemia and lymphoma in atomic bomb survivors

    International Nuclear Information System (INIS)

    Finch, S.C.

    1984-01-01

    Leukemia has been observed to increase with increasing radiation dose in the A-bomb survivors of Hiroshima and Nagasaki. The first radiation-related cases occurred 3 to 5 years following exposure. The peak incidence years were about 7 to 8 years following exposure and the leukemogenic effect has decreased since that time, but it may last for 40 years or longer in the most heavily exposed persons. A bimodal susceptibility pattern was observed, with peaks following exposure during childhood and after age 50. Latent periods for the development of acute leukemia were shortest in the younger exposed persons. Both acute and chronic forms of leukemia occurred in exposed persons at younger ages in life than normally is expected. The most common types of radiation-induced leukemia were acute and chronic granulocytic in adults and children, and acute lymphocytic in children. The highest radiation-related leukemia risk was for chronic granulocytic leukemia following childhood exposure

  10. Chain reaction. History of the atomic bomb

    International Nuclear Information System (INIS)

    Mania, Hubert

    2010-01-01

    Henri becquerel tracked down in 1896 a strange radiation, which was called radioactivity by Marie Curie. In the following centuries German scientists Max Planck, Albert Einstein and Werner Heisenberg presented fundamental contributions to understand processes in the atomic nucleus. At Goettingen, center of the international nuclear physics community, the American student J. Robert Oppenheimer admit to this physical research. In the beginning of 1939 the message of Otto Hahns' nuclear fission electrified researchers. The first step, unleashing atomic energy, was done. A half year later the Second World War begun. And suddenly being friend with and busily communicating physicians were devided into hostile power blocs as bearers of official secrets. The author tells in this exciting book the story of the first atomic bomb as a chain reaction of ideas, discoveries and visions, of friendships, jealousy and intrigues of scientists, adventurers and genius. (orig./GL)

  11. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  12. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  13. 34 A systematic literature review of the pre-hospital lessons identified following mass casualty deliberate bombing incidents.

    Science.gov (United States)

    Cooke, Thomas; Chesters, Adam; Grier, Gareth

    2017-12-01

    Since the end of World War II, there has been an emergence of explosives used amongst civilian populations resulting in mass-casualty incidents. The development of pre-hospital medical systems, worldwide, has resulted in an increased response at these incidents. However, information about the pre-hospital medical response is sparse and not collated. This review aimed to collect and appraise the literature on the pre-hospital management of mass-casualty bombing incidents. The primary objective was to identify and discuss the common themes highlighted as problems in the pre-hospital medical response. The secondary objectives reviewed the injury patterns in victims and psychological impacts on pre-hospital responders. A systematic literature search on the PubMed, SCOPUS and Web of Science databases took place. It included literature published from the 1 st of January 2000 to April 3rd 2017, with the last search performed on April 3rd 2017. Literature was included if it offered description, analysis, reflection or review of the bombing incidents.emermed;34/12/A884-a/F1F1F1Figure 1The minimum number of recorded deaths and injuries from 11 deliberate mass casualty bombing incidents (note: two simultaneous marauding terrorist firearm attack and bombing incidents excluded)emermed;34/12/A884-a/F2F2F2Figure 2Percentage of included literature identifying the following themes as problems in the pre-hospitals medical response RESULTS: 1345 articles were found, with 54 included in analysis. 13 mass-casualty bombing incidents were described. Two of these included marauding terrorist firearm attacks (MTFA). In the 11 bombing-only incidents the death of 592-642 people and injury of 3,842-5229 more is described, with a further 301 deaths and 604 injuries from bombings with MTFA attacks. Quality appraisal showed a variation in reporting among incidents and a lack of uniform reporting. Functioning and reliable communication, alongside regular training exercises with other emergency

  14. Radiological preparedness in the case of a terrorist attack or an accident

    International Nuclear Information System (INIS)

    Cizmek, A.

    2005-01-01

    During the Cold War, every information about weapons of mass destruction was treated as top secret, regardless of whether the information concerned friend or foe. The most serious threat in our post Cold War era are terrorist radiological dispersal devices. Dirty nukes are what you may choose to build if you're unable to create a real nuclear bomb, i.e. one whose explosion is based on a nuclear reaction. A dirty bomb is a conventional explosive salted with radioactive isotopes in order to spew out that nuclear material and contaminate a wide area. The military usefulness of such devices have always been in dispute. In fact, the TNT in such a bomb may still be more dangerous than the nuclear material. Its destructive power would really depend on the size of the conventional bomb, and the volume and nature of nuclear material. This paper addresses the possibilities of decontamination and preparedness in the case of a terrorist attack or accident.(author)

  15. Planning guidance for emergency response to a hypothetical nuclear attack on Riyadh, Saudi Arabia

    Science.gov (United States)

    Shubayr, Nasser Ali M.

    The threat of nuclear attack will remain imminent in an ever-advancing society. Saudi Arabia is not immune to this threat. This dissertation establishes planning guidance for response to a nuclear attack on Riyadh, the capital of Saudi Arabia, based on a hypothetical scenario of a nuclear detonation. A case scenario of a one-megaton thermonuclear bomb detonated at ground level over Riyadh is used to support the thesis. Previous nuclear tests and the Hiroshima and Nagasaki bombings have been used to present possible effects on Riyadh. US planning guidance and lessons learned from the Chernobyl and Fukushima nuclear plants accidents have been used to develop the emergency response guidance. The planning guidance outlines a rapid response to the nuclear detonation. Four damage zones have been identified; severe damage zone, moderate damage zone, light damage zone and dangerous fallout zone. Actions that are recommended, and those that should be avoided, have been determined for each zone. Shelter/ evacuation evaluation for blast-affected and fallout-affected areas is the basis for the recommendation that shelter in place is the best decision for the first hours to days after the attack. Guidelines for medical care response and population monitoring and decontamination are included to reduce the early and long-term effects of the attack. Recommendations to the Saudi Arabian authorities have been made to facilitate suitable preparedness and response for such an event.

  16. Gender Differences in Posttraumatic Stress Symptoms after a Terrorist Attack: A Network Approach.

    Science.gov (United States)

    Birkeland, Marianne S; Blix, Ines; Solberg, Øivind; Heir, Trond

    2017-01-01

    Background: Posttraumatic stress symptoms are more prevalent in women than in men. To improve our understanding of gender differences in PTSD, detailed knowledge about the underlying symptom networks and gender specific symptom profiles is needed. Objective: We aimed to describe the gender differences in levels of individual posttraumatic stress symptoms after a terrorist attack, as well as identify possible gender differences in associations between posttraumatic stress symptoms. Method: This study used survey data from ministerial employees directly ( n = 190) and indirectly ( n = 1,615) exposed to the 2011 Oslo bombing. Data was collected approximately 10 months after the event. In order to investigate gender differences in levels of symptoms, we used bootstrapped means and standard deviations. Network analyses were conducted to identify gender differences in the associations between posttraumatic stress symptoms. Results: Women reported higher levels of all symptoms, and the strongest effect sizes were found for symptoms of re-experiencing, and anxious and dysphoric arousal. Among individuals with considerable levels of posttraumatic stress symptoms, women reported higher levels of physiological cue activity and exaggerated startle response. No significant gender differences in the networks of posttraumatic stress were found. Conclusions: The present results find no indication that the gender difference in prevalence of PTSD can be explained by differences in associations between symptoms. In order to determine if this finding can be applied to other participants and circumstances, future studies should seek to replicate this study in both community and clinical samples.

  17. Clinical survey of blood dyscrasias among Hiroshima A-bomb survivors by periodical health examination, (6)

    International Nuclear Information System (INIS)

    Abe, Tsutomu; Dohy, Hiroo; Okita, Hajime

    1980-01-01

    Serum ferritin was determined in A-bomb survivors, and its significance was evaluated. A low-ferritin group included many of the females under the age of 50, who mostly had iron deficient anemia. A high-ferritin group included many older-aged A-bomb survivors who had secondary anemia due to hemochromatosis, paroxismal nocturnal hemoglobinuria (PNH), and multiple myeloma. Secondary anemia due to hemochromatosis, PNH, leukemia, and sideroblastic anemia was detected in those who were old and had underlying moderate or severe anemia with a high ferritin level. As the results of this investigation, blood examination combined with serum ferritin determination is valuable for diagnosis of anemia and detection of underlying diseases. (Ueda, J.)

  18. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

    of Investigative Data Mining (IDM). In addition, we present iMiner Information Harvesting System and describe how intelligence agencies could be benefited from detecting hierarchy in non-hierarchical terrorist networks.  In this paper we present results of detection of hidden hierarchy of Riyadh Bombing Terrorist...

  19. Heart Attack Coronary Artery Disease

    Science.gov (United States)

    ... our e-newsletter! Aging & Health A to Z Heart Attack Coronary Artery Disease, Angina Basic Facts & Information What ... and oxygen supply; this is what causes a heart attack. If the damaged area is small, however, your ...

  20. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... supply blood and oxygen to the heart. A heart attack can occur if a blood clot stops the ...

  1. What Is a Heart Attack?

    Science.gov (United States)

    ... to help prevent your first heart attack. Heart-Healthy Lifestyle Changes A heart-healthy lifestyle can help prevent ... blood to flow to the heart muscle. Heart-Healthy Lifestyle Changes Treatment for a heart attack usually includes ...

  2. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  3. Lung cancer incidence among A-bomb survivors in Hiroshima and Nagasaki, 1950 - 80

    International Nuclear Information System (INIS)

    Yamamoto, Tsutomu; Kopecky, K.J.; Fujikura, Toshio; Tokuoka, Shoji; Monzen, Tetsuo; Nishimori, Issei; Nakashima, Eiji; Kato, Hiroo.

    1987-05-01

    The incidence of lung cancer during 1950 - 80 in a cohort of Japanese atomic bomb survivors and controls was investigated. A total of 1,057 cases were identified; 608 of these diagnoses were based on some form of histopathologic examination, and 442 were confirmed by the present investigators. The distributions of histological types varied significantly between the sexes (p < .001), with adenocarcinoma more frequent among women and epidermoid and small cell carcinoma more frequent among men. The distributions of primary sites did not differ significantly between the sexes. The relative risk (RR) of lung cancer increased significantly with A-bomb radiation dose (p < .0001); based on tentative 1965 dose estimates as revised in 1978 (T65DR) and a linear RR model, the estimated RR at 100 rad (± SE) is 1.41 ± 0.09. Among Hiroshima survivors the women experienced radiation-related excess RR nearly twice as great as men (p = .06). RR increased with decreasing age at the time of bombing (p = .07), and after allowing for this effect, there was no significant evidence that RR varied systematically with attained age. Small cell carcinoma displayed somewhat greater sensitivity to radiation than did adenocarcinoma or epidermoid carcinoma; however the variation between the histology-specific RR functions was not statistically significant (p = .44). (author)

  4. Some hematological disorders among atomic bomb survivors. Presidential Address

    International Nuclear Information System (INIS)

    Watanabe, Susumu

    1977-01-01

    Focusing on their hematological disorders, the late radiation effects among Hiroshima and Nagasaki A-bomb survivors, including cytogenetic and cytological studies, are summarized and discussed. Because of personal research experience, the data were concentrated on the Hiroshima survivors

  5. Accident in science history. Hitler's atomic bomb

    International Nuclear Information System (INIS)

    Popp, Manfred

    2016-01-01

    Up to now the historical explanation for the fact that NS Germany did not develop an atomic bomb was that there was enough scientific and technical knowledge but not enough resources. Recent historical research showed that the German scientists in the ''Uranverein'' did not know the cross section of U-235 and had no possibility to measure these cross sections. There exist only very few documents dealing with the bomb. The bomb was treated as a special case of a reactor. Obviously the German scientists did not know he bomb technology. It seems that the project was not success-oriented because the scientists expected to be sent to the front in case of a project stop.

  6. Teaching and Learning Multiple Perspectives: The Atomic Bomb.

    Science.gov (United States)

    Doppen, Frans H.

    2000-01-01

    Explores how historical empathy can give students a richer understanding of the past, focusing on the development of the students' historical understanding through an analysis of 18 documents on President Truman's decision to use the atomic bomb against Japan. (CMK)

  7. Perfection and the Bomb: Nuclear Weapons, Teleology, and Motives.

    Science.gov (United States)

    Brummett, Barry

    1989-01-01

    Uses Kenneth Burke's theory of perfection to explore the vocabularies of nuclear weapons in United States public discourse and how "the Bomb" as a God term has gained imbalanced ascendancy in centers of power. (MS)

  8. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  9. Detection of de novo single nucleotide variants in offspring of atomic-bomb survivors close to the hypocenter by whole-genome sequencing.

    Science.gov (United States)

    Horai, Makiko; Mishima, Hiroyuki; Hayashida, Chisa; Kinoshita, Akira; Nakane, Yoshibumi; Matsuo, Tatsuki; Tsuruda, Kazuto; Yanagihara, Katsunori; Sato, Shinya; Imanishi, Daisuke; Imaizumi, Yoshitaka; Hata, Tomoko; Miyazaki, Yasushi; Yoshiura, Koh-Ichiro

    2018-03-01

    Ionizing radiation released by the atomic bombs at Hiroshima and Nagasaki, Japan, in 1945 caused many long-term illnesses, including increased risks of malignancies such as leukemia and solid tumours. Radiation has demonstrated genetic effects in animal models, leading to concerns over the potential hereditary effects of atomic bomb-related radiation. However, no direct analyses of whole DNA have yet been reported. We therefore investigated de novo variants in offspring of atomic-bomb survivors by whole-genome sequencing (WGS). We collected peripheral blood from three trios, each comprising a father (atomic-bomb survivor with acute radiation symptoms), a non-exposed mother, and their child, none of whom had any past history of haematological disorders. One trio of non-exposed individuals was included as a control. DNA was extracted and the numbers of de novo single nucleotide variants in the children were counted by WGS with sequencing confirmation. Gross structural variants were also analysed. Written informed consent was obtained from all participants prior to the study. There were 62, 81, and 42 de novo single nucleotide variants in the children of atomic-bomb survivors, compared with 48 in the control trio. There were no gross structural variants in any trio. These findings are in accord with previously published results that also showed no significant genetic effects of atomic-bomb radiation on second-generation survivors.

  10. Effects of A-bomb radiation on the human body

    International Nuclear Information System (INIS)

    Shigematsu, Itsuzo; Akiyama, Mitoshi; Sasaki, Hideo; Ito, Chikato; Kamada, Nanao

    1992-01-01

    This publication consists of contributions by 39 authors in Hiroshima who are active in the forefront of research, diagnosis and treatment concerning atomic bomb survivors. Following a brief description on the damage of the atomic bomb, the subjects of malignant tumors, endocrine and metabolic diseases, ocular lesions, dermatologic effects, prenatal exposure, chromosomal aberrations, mutations, sensitivity to radiation, immune function, genetic effects and other effects of radiation are described. All of the 45 chapters are indexed individually. (J.P.N.)

  11. Details of Nazis' A-Bomb program surface

    CERN Multimedia

    Glanz, J

    2002-01-01

    Werner Heisenberg, leader of the Nazi atomic bomb program, revealed the projects existence to Niels Bohr in a meeting in Copenhagen in 1941. But contrary to several historical accounts of the meeting, Heisenberg never expressed moral qualms about building a bomb for Hitler nor hinted that he might be willing to sabotage the project, according to secret documents cited in a London newspaper yesterday (2 pages).

  12. Hitlers' bomb. The secret story of Germanys' nuclear weapon tests

    International Nuclear Information System (INIS)

    Karlsch, R.

    2005-01-01

    This book reveals a sensation: Under supervision of the SS German scientists tested 1944/45 nuclear bombs on Ruegen and in Thuringia. During this period several hundred prisoners of war and prisoners died. Besides proofs for nuclear weapon testing the author also found a draft for a patent on plutonium bombs and discovered the first functioning German atom reactor in the environs of Berlin. (GL) [de

  13. Trash can bomb can fall into the hands of terrorists

    CERN Multimedia

    2001-01-01

    Leading scientists from CERN described how if terrorists were able to get their hands on plutonium or uranium, they would be able to manufacture a 'trash can' nuclear bomb simply by inserting the radioactive material into a normal bomb. Once detonated a large area could be contaminated leading to the immediate deaths of many with many more future casualties due to cancers caused by the radiation.

  14. Perception of threat and safety at work among employees in the Norwegian ministries after the 2011 Oslo bombing.

    Science.gov (United States)

    Nissen, Alexander; Birkeland Nielsen, Morten; Solberg, Øivind; Bang Hansen, Marianne; Heir, Trond

    2015-01-01

    Terrorism can heighten fears and undermine the feeling of safety. Little is known, however, about the factors that influence threat and safety perception after terrorism. The aim of the present study was to explore how proximity to terror and posttraumatic stress reactions are associated with perceived threat and safety after a workplace terrorist attack. A cross-sectional questionnaire survey was administered to employees in 14 of 17 Norwegian ministries 9-10 months after the 2011 bombing of the government headquarters in Oslo (n = 3520). About 198 of 1881 employees completing the survey were at work when the bomb exploded. Regression analysis showed that this high-exposed group had elevated perceived threat (β = 0.36; 95% CI = 0.19 to 0.53) and reduced perceived safety (β = -0.42; 95% CI = -0.62 to -0.23) compared to a reference group of employees not at work. After adjusting for posttraumatic stress reactions, however, proximity to the explosion no longer mattered, whereas posttraumatic stress was associated with both high perceived threat (β = 0.55; 95% CI = 0.48 to 0.63) and low perceived safety (β = -0.71; 95% CI, -0.80 to -0.63). Terror-exposed employees feel more threatened and less safe after a workplace terrorist attack, and this is closely linked to elevated levels of posttraumatic stress reactions.

  15. Mental health status of A-bomb survivors in Nagasaki

    International Nuclear Information System (INIS)

    Nakane, Hideyuki

    2012-01-01

    The most survivors of disaster usually recover with few or no lasting effects on their mental health. However, in some portions of survivors, distress lasts long. The atomic bomb detonated to Nagasaki in August 1945 instantaneously destroyed almost all areas of the city, resulting in a total of ca. 73,884 deaths by the end of 1945 and about 74,909 injured people. Since the A-bomb survivors reached over 60 years of age, their mental health as well as physical health has become of great concern. Some studies on their mental health conditions have been carried out in Japan. I give an outline about a precedent study on mental health of the A-bomb survivors in this report. The mental health studies of the A-bomb survivors who paid attention to a being bombed experience, stigmatization, long-term outcome, recovery are necessary. The improvement of wide appropriate support system for the A-bomb survivors is expected in future. (author)

  16. Foreign bodies radiographically demonstrated in atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Tamura, S.; Onitsuka, H.; Lee, K.K.; Shimizu, Y.; Russell, W.J.

    1978-02-01

    The prevalence of roentgenologically-detected foregin bodies among atomic bomb survivors was studied as an indicator of the A-bomb blast effects. Acupuncture was studied as an indicator of possible A-bomb-related abnormalities for which it was administered. All available roentgenograms of Adult Health Study (AHS) subjects which demonstrated foreign bodies were reviewed. The frequency of glass and metal foreign bodies and of acupuncture needles was analyzed in detail. Analyses were made by distance from the hypocenter, sex, age, body sites involved, and shielding at the time of the A-bomb (ATB). The presence of glass fragments correlated closely with distance from the hypocenter, with heavy shielding from the A-bombs, and with adulthood, and they were more frequent in the chest than in the hand and wrist. On the contrary, metal foreign bodies were more frequent in the hand and wrist than in the chest, and were not associated with distance from hypocenter or heavy shielding. The prevalence of acupuncture needles increased with age, but did not correlate with A-bomb dose.

  17. Mental health for elder A-bomb survivors

    International Nuclear Information System (INIS)

    Mine, Mariko; Honda, Sumihisa; Hata, Tomoko

    1994-01-01

    A pilot study was made, based on an interview survey, to improve mental hygiene in A-bomb survivors. The study consisted of General Health Questionnaire (GHQ) 12 items, Composite International Diagnostic Interview (CIDI), Social Disabilities Schedule (SDS), and General Health Questionnaire (GHQ) 30 items. A majority of the subjects were those aged in their fifties, sixties, and seventies. Eighty A-bomb survivors answered GHQ 12 items, consisting of 7, 17, and 41 who were exposed at <2.0 km, 2.0-2.9 km, and ≥3.0 km from the hypocenter, respectively, and 15 who entered the city early after A-bombing. Thirty-three A-bomb survivors answered CIDI. According to the distance from the hypocenter, the corresponding figures were 2, 10, 15, and 6 A-bomb survivors. The survey for GHQ 12 items revealed that more A-bomb survivors exposed nearer the hypocenter suffered from mental problems. In the survey for CIDI, the most common complaints were found to be physical expression disorder (n=9) and chronic pain (n=8), followed by hypochondria (n=4), panic disorder (n=2), and anxiery (n=one). According to the SDS survey, 85% were judged as having no mental disorder, and the remaining 15% as having merely mild or moderate disorder. (N.K.)

  18. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  19. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  20. [The aftermath of the fascist air attacks on military ambulance trains and mobile units].

    Science.gov (United States)

    Ponomarenko, V N; Gorenkov, V M

    1995-05-01

    The article summarizes the archive data concerning the results of the bombing attacks and machine-gun fire of fascist aviation against hospital trains and sanitary trains (HT & ST). During the war period 349 HT & ST have suffered air attacks (including 95 organic HT, 111 temporary HT, and 143 ST). In the result of these attacks the losses among the medical personnel of HT & ST were 1682 wounded and 833 killed. As for sick and wounded who were being evacuated by these HT & ST 3040 of them were repeatedly wounded, 2017 were killed or burned by fire in railway medical carriages. These data testifies the flagrant transgression by fascists of international agreements on the neutrality of sanitary transport and its personnel.

  1. Why 159°?: a story about the dropping of the Hiroshima atom bomb

    Science.gov (United States)

    Prunty, Sean L.

    2015-04-01

    This paper presents an analysis of the evasive manoeuvre undertaken by the pilot of the Enola Gay aircraft following the dropping of the first uranium bomb. The pilot was instructed to make a 159° turn following the bomb’s release in order to acquire the greatest distance from the point at which the bomb explodes. Accordingly, the objective here is to investigate why the angle should be exactly 159°. The optimum flight-path to maximize the distance from the detonation point is analysed by considering the escape or exit angle taken by the aircraft following a turning-manoeuvre that points it directly away from the detonation site. A range of escape angles are predicted based on the requirement to exit the turning radius prior to detonation. By using information that appeared in a historical account of the event regarding the manoeuvre undertaken by the pilot following the release of the bomb, an estimate is made of the escape angle. Despite the fact that the result shows reasonable agreement with the value of 159°, some uncertainty is expressed as to the close coincidence obtained. In addition, the location of the aircraft and the time of arrival of the shock wave following detonation are also briefly discussed.

  2. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  3. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  4. Quantitative Method for Network Security Situation Based on Attack Prediction

    Directory of Open Access Journals (Sweden)

    Hao Hu

    2017-01-01

    Full Text Available Multistep attack prediction and security situation awareness are two big challenges for network administrators because future is generally unknown. In recent years, many investigations have been made. However, they are not sufficient. To improve the comprehensiveness of prediction, in this paper, we quantitatively convert attack threat into security situation. Actually, two algorithms are proposed, namely, attack prediction algorithm using dynamic Bayesian attack graph and security situation quantification algorithm based on attack prediction. The first algorithm aims to provide more abundant information of future attack behaviors by simulating incremental network penetration. Through timely evaluating the attack capacity of intruder and defense strategies of defender, the likely attack goal, path, and probability and time-cost are predicted dynamically along with the ongoing security events. Furthermore, in combination with the common vulnerability scoring system (CVSS metric and network assets information, the second algorithm quantifies the concealed attack threat into the surfaced security risk from two levels: host and network. Examples show that our method is feasible and flexible for the attack-defense adversarial network environment, which benefits the administrator to infer the security situation in advance and prerepair the critical compromised hosts to maintain normal network communication.

  5. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  6. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  7. ELLERMAN BOMBS WITH JETS: CAUSE AND EFFECT

    Energy Technology Data Exchange (ETDEWEB)

    Reid, A.; Mathioudakis, M. [Astrophysics Research Centre, School of Mathematics and Physics, Queen’s University Belfast, BT7 1NN, Northern Ireland (United Kingdom); Scullion, E.; Gallagher, P. [School of Physics, Trinity College Dublin, Dublin 2 (Ireland); Doyle, J. G. [Armagh Observatory, College Hill, Armagh, BT61 9DG (United Kingdom); Shelyag, S., E-mail: areid29@qub.ac.uk [Monash Centre for Astrophysics, School of Mathematical Sciences, Monash University, Clayton, Victoria, 3800 (Australia)

    2015-05-20

    Ellerman Bombs (EBs) are thought to arise as a result of photospheric magnetic reconnection. We use data from the Swedish 1 m Solar Telescope to study EB events on the solar disk and at the limb. Both data sets show that EBs are connected to the foot points of forming chromospheric jets. The limb observations show that a bright structure in the Hα blue wing connects to the EB initially fueling it, leading to the ejection of material upwards. The material moves along a loop structure where a newly formed jet is subsequently observed in the red wing of Hα. In the disk data set, an EB initiates a jet which propagates away from the apparent reconnection site within the EB flame. The EB then splits into two, with associated brightenings in the inter-granular lanes. Micro-jets are then observed, extending to 500 km with a lifetime of a few minutes. Observed velocities of the micro-jets are approximately 5–10 km s{sup −1}, while their chromospheric counterparts range from 50 to 80 km s{sup −1}. MURaM simulations of quiet Sun reconnection show that micro-jets with properties similar to those of the observations follow the line of reconnection in the photosphere, with associated Hα brightening at the location of increased temperature.

  8. Atomic bomb survivor data: utilization and analysis

    International Nuclear Information System (INIS)

    Prentice, R.L.; Thompson, D.J.

    1984-01-01

    There were several motivations for organizing the SIMS Conference reported in this monograph. Risk assessment and its methods have been subjects of several SIMS Conferences in the recent past, and focusing these newer, more powerful methods on the largest human experience of exposure to ionizing radiation seemed an appropriate sequel. There was also the conviction that the data resources of the Radiation Effects Research Foundation (RERF), generated through the mortality and medical follow-up of large samples of the survivors of the atomic bombs dropped on Hiroshima and Nagasaki, were being under utilized, and that a conference and its proceedings would create interest in exploiting this resource. The time seemed ripe for gathering a small group of current RERF scientists, veteran US statisticians and epidemiologists, and others with more recent entry into the field of radiation biology to consider long range plans for maximizing the output of information not only on the long term effects of ionizing radiation on man but on new knowledge of the determinants of health and disease that can be learned by study of the records of this cohort. This seemed particularly appropriate at this time while intensive joint Japanese-US efforts are underway to provide a new, more accurate dosimetry for use in these studies. Finally, there was a hope that an ad hoc forum of this type would provide not only a summary of current statistical and epidemiologic activities at RERF, but a useful critique of their scope and quality

  9. The Potentialities of the Atomic Bomb

    Energy Technology Data Exchange (ETDEWEB)

    Meade, Roger Allen [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bradbury, Norris E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-07

    In January 1949, Norris Bradbury gave a lecture at the National War College which summarized the progress Los Alamos had made since the end of the war. The transcript of the talk was filed and forgotten until it surfaced fifty years later. It is, perhaps, one of the best summaries of the state of the United States nuclear weapons program in 1949. It is also evidence of how Bradbury saw the future of atomic weapons. It is presented in full, with minor editing, and begins as follows: Since the first use of an atomic bomb on August 5 [sic], 1945, over the city of Hiroshima, Japan, there has been a continual flood of speculation and discussion concerning the effect of this new weapon on military technology. Much of this speculation and discussion has been intelligent and fruitful; much, I regret to say, has had neither of these characteristics. The enormity of the device, in terms of potential destruction and loss of life, and the practical necessity to surround the technical facts with full security restrictions have only combined to make the problem more difficult. At the same time, it is imperative that policymaking personnel in charge of long range national planning know the basic facts concerning atomic weapons and have these facts in a reasonable perspective. This document describes these potentialities in detail.

  10. Characterizing the Performance of Pipe Bombs.

    Science.gov (United States)

    Oxley, Jimmie C; Smith, James L; Bernier, Evan T; Sandstrom, Fredrick; Weiss, Gregory G; Recht, Gunther W; Schatzer, David

    2018-01-01

    Pipe bombs of steel or PVC fragment in reproducible patterns when similarly configured. The power of the explosion correlates with number, mass, and size of the fragments recovered, where a large number of small, low-mass fragments indicate a high-power event and vice versa. In discussing performance, describing pipe fragmentation pattern by fragment weight distribution mapping (FWDM) or fragment surface area distribution mapping (FSADM) was useful. When fillers detonated, detonation velocities of ~4.4 mm/μs were measured. In such cases, side walls of the pipe were thrown first; the average fragment velocity was ~1000 km/s. In deflagrations, the end cap was first thrown; fragment velocities were only ~240 km/s. Blast overpressures varied; at 10 feet, 2 × 12 inch steel pipes containing ~550 g of detonable mixture produced overpressures of 5-6 psi; similar nondetonating pipes produced less than 2 psi. Maximum fragment throw distances were 250-300 m, with an average of ~100 m. © 2017 American Academy of Forensic Sciences.

  11. Infectious diseases in atomic bomb survivors

    International Nuclear Information System (INIS)

    Hamada, Tadao; Ishida, Sadamu; Matsushita, Hiroshi.

    1976-01-01

    Incidences of various infectious diseases in 986 autopsy cases at Hiroshima Atomic Bomb Hospital and Hiroshima Red Cross Hospital from 1965 to 1975 were compared according to the distance from the explosion place, and the following results were obtained. There was not a significant difference at incidences of most infectious diseases between each exposured group and not-exposured group. Incidence of old tuberculosis focus was a little higher in exposured groups, but incidences of main lesions such as tuberculosis, active tuberculosis, and miliary tuberculosis were lower in exposured groups and effect of exposure was negative. Out of urinary tract infections, the nearer the distance to the explosion place was, the higher incidence of cistitis in female was. Incidence of cystitis of female was higher than that of male in the group exposured near to the explosion place. With respect to stomach cancer, leukemia, malignant lymphoma, and cerebrovascular disorder, the nearer the distance to the explosion place was, the higher incidences of various infectious diseases were. (Tsunoda, M.)

  12. Simulating an Exploding Fission-Bomb Core

    Science.gov (United States)

    Reed, Cameron

    2016-03-01

    A time-dependent desktop-computer simulation of the core of an exploding fission bomb (nuclear weapon) has been developed. The simulation models a core comprising a mixture of two isotopes: a fissile one (such as U-235) and an inert one (such as U-238) that captures neutrons and removes them from circulation. The user sets the enrichment percentage and scattering and fission cross-sections of the fissile isotope, the capture cross-section of the inert isotope, the number of neutrons liberated per fission, the number of ``initiator'' neutrons, the radius of the core, and the neutron-reflection efficiency of a surrounding tamper. The simulation, which is predicated on ordinary kinematics, follows the three-dimensional motions and fates of neutrons as they travel through the core. Limitations of time and computer memory render it impossible to model a real-life core, but results of numerous runs clearly demonstrate the existence of a critical mass for a given set of parameters and the dramatic effects of enrichment and tamper efficiency on the growth (or decay) of the neutron population. The logic of the simulation will be described and results of typical runs will be presented and discussed.

  13. Sources of Radioactive Isotopes for Dirty Bombs

    Science.gov (United States)

    Lubenau, Joel

    2004-05-01

    From the security perspective, radioisotopes and radioactive sources are not created equal. Of the many radioisotopes used in industrial applications, medical treatments, and scientific research, only eight, when present in relatively large amounts in radioactive sources, pose high security risks primarily because of their prevalence and physical properties. These isotopes are americium-241, californium-252, cesium-137, cobalt-60, iridium-192, radium-226, plutonium-238, and strontium-90. Except for the naturally occurring radium-226, nuclear reactors produce the other seven in bulk commercial quantities. Half of these isotopes emit alpha radiation and would, thus, primarily pose internal threats to health; the others are mainly high-energy gamma emitters and would present both external and internal health hazards. Therefore, the response to a "dirty bomb" event depends on what type of radioisotope is chosen and how it is employed. While only a handful of major corporations produce the reactor-generated radioisotopes, they market these materials to thousands of smaller companies and users throughout the world. Improving the security of the high-risk radioactive sources will require, among other efforts, cooperation among source suppliers and regulatory agencies.

  14. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  15. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  16. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  17. An operated case with post-traumatic epilepsy following atomic bombing injury

    Energy Technology Data Exchange (ETDEWEB)

    Morioka, Takato; Nishio Shunji; Muraishi; Mitsuteru; Hisada, Kei; Takase, Keiichirou; Matsukado, Koichiro; Sasaki, Masayuki; Fukui, Masashi [Kyushu Univ., Fukuoka (Japan). Graduate School of Medicine; Ohta, Michiya

    1999-12-01

    The case was 54-years-old man who was bombed at 4-years old 1.5 km apart from the center of explosion in Hiroshima, and had intractable epilepsy after 10 years or more. He suffered from systemic convulsion from 18 years old and took anti-convulsant drugs from 23 years old. The frequency of seizure increased from once a half year to thrice 2 months for these 3-4 years. The attack mainly occurred at night, and it was generalized tonicoclonic convulsion accompanied with unconsciousness and urinary incontience. Valproate (1,800 mg) and clonazepam (1 mg) failed to control the attack, and then he was referred to author's hospital. By CT scanning, MRI and HMPAO-SPECT, the area around the ossified lesion in the right frontal lobe was considered the focus of the epilepsy, and the focus was removed on June 4, 1998. No neurodegeneration and convulsive seizure occurred after surgery. The ossified lesion was confirmed to be bone tissue containing osteoblasts from histological findings and was accompanied by severe gliosis to the brain surface. A large number of active astrocytes were found around the nerve cells in the cortex showing spine-like wave focus, but there were no significant changes in blood vessels in the brain. (K.H.)

  18. Behavioral response of people in Belgrade to the bombing campaign during 1999

    Directory of Open Access Journals (Sweden)

    Đurić Marija

    2013-01-01

    Full Text Available Introduction. In contrast to numerous reports on long-term psychological consequences of disasters, the literature addressing the acute impact of intentional collective disaster is limited. Objective. This research aimed to examine the impact of the bombing campaign on the behavior of people living in Belgrade during the air attacks in 1999. Methods. The questionnaire was designed and administered to 231 participants. Psychological distress symptoms were assessed using the Symptom Checklist-Revised (SCL-90-R. Results. Participants reported fear and anger as dominant feelings, and the majority of them complained about sleep disturbance, body weight change, and loss of interest for sexual activity. Regression analysis of the scores of the SCL-90-R revealed significant effects of the duration of living under the stress of air attacks, age and gender of the participants and living in the risky areas of the city, upon the scores on Anxiety and Depression dimension. Conclusion. The results of the study contributed to our understanding of the processes through which individuals pass during a long lasting bombardment. It can be beneficial for mental health services in evaluating which actions of care and support could be most suitable. [Projekat Ministarstva nauke Republike Srbije, br. 45005

  19. Colorectal cancer incidence among atomic bomb survivors, 1950-80

    International Nuclear Information System (INIS)

    Nakatsuka, Hirofumi; Shimizu, Yukiko; Yamamoto, Tsutomu

    1992-01-01

    Colorectal cancer incidence in the Life Span Study (LSS) sample during 1950-80 was investigated. A total of 730 incidence cases of colorectal cancer were confirmed from a variety of sources. Sixty-two percent of the cancers were microscopically verified and 12% were ascertained through death certificate only. The risk of colon cancer increased significantly with intestinal dose, but no definite increase of risk was observed for rectal cancer. Relative risk at 1 Sv and excess risk per 10 4 PY-Sv for colon cancer are 1.80 (90% confidence interval 1.37-2.36) and 0.36 (90% confidence interval 0.06-0.77) respectively. City and sex did not significantly modify the dose-response of colon cancer, but the risk decreased with age at the time of bombings (ATB). The relative risk of colon cancer does not vary substantially over time following exposure. A non-linear dose response did not significantly improve the fit. Further, the anatomic location of the tumors indicate that the cecum and ascending, transverse and descending, and sigmoid colon seem equally sensitive to radiation. No difference in the distribution of tumor histological types could be observed by radiation dose. (author)

  20. Colorectal cancer incidence among atomic bomb survivors, 1950-80

    International Nuclear Information System (INIS)

    Hirofumi Nakatsuka; Yukiko Shimizu; Tsutomu Yamamoto; Ichiro Sekine; Haruo Ezaki; Eiichi Tahara; Makoto Takahashi; Takatoshi Shimoyama; Nobuo Mochinaga; Masao Tomita; Ryoichi Tsuchiya; Land, Charles E.

    1992-10-01

    Colerectal cancer incidence in the LSS sample during 1950-80 was investigated. A total of 730 incidence cases of colorectal cancer were confirmed from a variety of sources. Sixty-two percent of the cancers were microscopically verified and 12% were ascertained through death certificate only. The risk of colon cancer increased significantly with intestinal dose, but no definite increase of risk was observed for rectal cancer. Relative risk at 1 Sv and excess risk per 10 4 PY-Sv for colon cancer are 1.80 (90% confidence internal 1.37-2.36) and 0.36 (90% confidence interval 0.06-0.77) respectively. City and sex did not significantly modify the dos-response of colon cancer, but the risk decreased with age at the time of bombings (ATB). The relative risk of colon cancer does not vary substantially over time following exposure. A non-linear dose response did not significantly improve the fit. Further, the anatomic location of the tumors indicate that the cecum and ascending, transverse and descending, and sigmoid colon seem equally sensitive to radiation. No difference in the distribution of tumor histological types could be observed by radiation dose. (author)

  1. FINE-SCALE PHOTOSPHERIC CONNECTIONS OF ELLERMAN BOMBS

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Heesu; Chae, Jongchul; Song, Donguk; Cho, Kyuhyoun; Kwak, Hannah [Astronomy Program, Department of Physics and Astronomy, Seoul National University, Seoul 08826 (Korea, Republic of); Lim, Eun-Kyung; Kim, Yeon-Han [Korea Astronomy and Space Science Institute, Daejeon 34055 (Korea, Republic of); Yurchyshyn, Vasyl B, E-mail: yang83@snu.ac.kr [Big Bear Solar Observatory, Big Bear City, CA 92314-9672 (United States)

    2016-10-01

    We investigate the photospheric and magnetic field structures associated with Ellerman bombs (EBs) using the 1.6 m New Solar Telescope at Big Bear Solar Observatory. The nine observed EBs were accompanied by elongated granule-like features (EGFs) that showed transverse motions prior to the EBs with an average speed of about 3.8 km s{sup −1}. Each EGF consisted of a sub-arcsecond bright core encircled by a dark lane around its moving front. The bright core appeared in the TiO broadband filter images and in the far wings of the H α and Ca ii 8542 Å lines. In four EBs, the bi-directional expanding motion of the EGFs was identified in the TiO images. In those cases, the EGFs were found to be accompanied by an emerging flux (EF). In four other EBs, the EGF developed at the edge of a penumbra and traveled in the sunspot’s radial direction. The EGFs in these cases were identified as a moving magnetic feature (MMF). Our results show a clear connection among the magnetic elements, photospheric features, and EBs. This result suggests that the EBs result from magnetic reconnection forced by EFs or MMFs that are frequently manifested by EGFs.

  2. Pattern association--a key to recognition of shark attacks.

    Science.gov (United States)

    Cirillo, G; James, H

    2004-12-01

    Investigation of a number of shark attacks in South Australian waters has lead to recognition of pattern similarities on equipment recovered from the scene of such attacks. Six cases are presented in which a common pattern of striations has been noted.

  3. Is Einstein the Father of the Atomic Bomb

    Science.gov (United States)

    Lustig, Harry

    2009-05-01

    Soon after the American atomic bombs were dropped on Hiroshima and Nagasaki, the notion took hold in the popular mind that Albert Einstein was ``the father of the bomb.'' The claim of paternity rests on the belief that E=mc2 is what makes the release of enormous amounts of energy in the fission process possible and that the atomic bomb could not have been built without it. This is a misapprehension. Most physicists have known that all along. Nevertheless in his reaction to the opera Dr. Atomic, a prominent physicist claimed that Einstein's discovery that matter can be transformed into energy ``is precisely what made the bomb possible.'' In fact what makes the fission reaction and one of its applications,the atomic bomb, possible is the smaller binding energies of fission products compared to the binding energies of the nuclei that undergo fission.The binding energies of nuclei are a well understood consequence of the numbers and arrangements of protons and neutrons in the nucleus and of quantum-mechanical effects. The realization that composite systems have binding energies predates relativity. In the 19th century they were ascribed to potential and other forms of energy that reside in the system. With Einstein they became rest mass energy. While E=mc2 is not the cause of fission, measuring the masses of the participants in the reaction does permit an easy calculation of the kinetic energy that is released.

  4. Clinical study of aplastic anemia among A-bomb survivors

    International Nuclear Information System (INIS)

    Oguma, Nobuo; Dohy, Hiroo; Kyo, Taiichi; Saito, Osamu; Okita, Hajime

    1980-01-01

    In 90 patients with aplastic anemia who were seen at Dept. Med. RINMB, Hiroshima Univ. from 1962 to March, 1980, clinical findings of 33 A-bomb survivors (which included the second generation of the survivors) and those of 57 nonexposed patients were compared. No relationship was found between the age at the time of exposure and the period preceding onset of the disease. The A-bomb survivors showed higher neutrophil counts and higher reticulocyte counts than the nonexposed patients. There were less severe cases in the A-bomb survivors. There was no difference in the incidence of atypical aplastic anemia between the exposed patients and the nonexposed ones. No difference was found in overall survival (one-year and five-year survival rates) between the exposed and the nonexposed. The A-bomb survivors often had complete remission or maintenance of remission, and rarely had acute progression. These results suggested that clinical picture of aplastic anemia in the A-bomb survivors is different from that in the nonexposed patients. (Ueda, J.)

  5. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  6. Attacks on RFID Identification Systems

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-09-01

    Full Text Available This article is about attacks on RFID systems. Currently antivirus developers are not developing systems that protect from viruses that could exist on RFID tags. Such viruses are considered as not existing because the RFID tag memory is very small. Unfortunately such viruses exist. This article is concerned to such viruses and attacks that hackers could do using such viruses. Based on this article methods to prevent RFID-viruses attacks could be developed.

  7. Terrorism and blast phenomena: lessons learned from the attack on the USS Cole (DDG67).

    Science.gov (United States)

    Langworthy, Michael J; Sabra, John; Gould, Mark

    2004-05-01

    Blast phenomena and injuries to the musculoskeletal system have been well documented for the past 50 years. The USS Cole was attacked in Aden Harbor in Yemen on October 12, 2000. Seventeen sailors were killed and 39 were wounded. The bombing of the USS Cole and an analysis of the pattern of injury are unique compared with previous terrorist bombing attacks in which the predominant injury pattern is from Type II and Type III blast phenomena. Because the ship superstructure did not collapse, there were no confounding variables in examining the pattern of injury as there would have been with shrapnel-generating devices or detonations with subsequent building collapse. The morbidity and mortality sustained by the victims was almost exclusively from Type I and Type III blast effects. The musculoskeletal system was a clear marker for mortality and morbidity. Fractures of the cranium, spine, pelvis, and long bones denoted increasing severity of injury to critical organ systems. Shipboard firefighting was successful in containing fires and there was very little morbidity from inhalational injuries or burns. Blast phenomena that affect ships or buildings that have been specifically built to absorb a blast attack likely will manifest a different mode and pattern of injury than those seen in traditional terrorist blast events.

  8. Thyroid disorders in atomic-bomb survivors

    International Nuclear Information System (INIS)

    Imaizumi, M.; Neriishi, K.; Akahoshi, M.; Suzuki, G.; Nakashima, E.; Nagataki, S.; Eguchi, K.

    2003-01-01

    It is known from several studies, including those from RERF that radiation exposure can cause thyroid tumors (Socolow, N Engl J Med. 1963;268:406, Parker, Ann Intern Med. 1974;80:600). Effects of radiation on autoimmune thyroid disease are not well understood. We have conducted thyroid disease screening on a population of 2856 individuals from the Adult Health Study (AHS) cohort of atomic-bomb survivors for the period of 1984-1987. This study, which for logistical reasons involved survivors only from Nagasaki, revealed a statistically significant relationship between radiation dose and prevalence of solid nodules, including cancer, and that of autoimmune hypothyroidism (Nagataki, JAMA. 1994;272:364). Because the previous thyroid study was conducted only in Nagasaki, the new comprehensive thyroid disease screening study has been ongoing in Hiroshima and Nagasaki AHS participants since March 2000. For about 4,000 participants in Hiroshima and Nagasaki AHS cohort, thyroid ultrasonography, aspiration biopsy of nodules, thyroid function test, thyroid autoantibody (thyroid peroxidase antibody and thyroglobulin antibody) test by highly sensitive assay using enzyme linked immunosorbent assay were performed for the diagnosis of thyroid diseases. Analysis of data from the 1874 people examined through July 2001 (915 people from Hiroshima, 959 people from Nagasaki) provides evidence that thyroid cancer increases with radiation dose. The prevalence of positive result for thyroid autoantibody test is increased in the people exposed to relative low dose of radiation (0.01-0.99 Sv). Examination and measurements was completed in February 2003 for all patients. The analysis of these data is providing new and more complete insights into relationships between thyroid diseases and low doses of radiation

  9. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  10. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  11. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  12. The Rhetoric of "Unconditional Surrender" and the Decision to Drop the Atomic Bomb.

    Science.gov (United States)

    Hikins, James W.

    1983-01-01

    Analyzes the decision to drop the atomic bomb from a rhetorical point of view, arguing that the bombs were launched because of an American commitment to a particular rhetoric that focused on the propaganda slogan "unconditional surrender." (PD)

  13. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  14. Present status of investigations of attacks by hydrogen upon non-loaded test pieces, as affected by hydrogen pressure, the duration of the experiment, and the hardening state of the material

    Energy Technology Data Exchange (ETDEWEB)

    1944-04-04

    Tests run before 1940 on resistance of steels to hydrogen attack seemed to indicate that steels containing at least 3% chromium (with or without molybdenum, vanadium, and tungsten) were resistant to attack up to 600/sup 0/C and 700 atm pressure for up to 1000 hours of testing. Hydrogen attack was evaluated by change (reduction) in the value of contraction of the steel. Thus it seemed then that steels such as N6, N8, N9, and N10 could be used in preheater hairpins with no problems. Since ruptures of the steels did occur after all, additional tests were run to take greater measure of the effects of length of exposure of the steels to hydrogen and of hardening procedures used in producing the steel. Those tests showed that hydrogen attack was present, but that it proceeded much more slowly than previously supposed and by unexpected mechanisms, so that even 1000 hours of testing was sometimes not a sufficient testing time. Tests showed that steels should be air-quenched instead of oil-quenched, that they should be annealed at some temperature outside the range 700/sup 0/C to 750/sup 0/C, and that they should have as little as possible of carbides in grain boundaries and carbon dissolved in ferrites. The mechanism of hydrogen attack was reevaluated. Instead of direct attack on carbide within crystalline grains, the mechanism was probably one of attack on carbides at grain boundaries, producing a slow migration of carbon out of the grains to the boundaries (concentration-gradient effect) and leaving a lower carbon concentration in the grains to be compensated for by breakup of carbides in the grains. 4 diagrams.

  15. The Terrorist Attacks and the Human Live Birth Sex Ratio: a Systematic Review and Meta-Analysis.

    Science.gov (United States)

    Masukume, Gwinyai; O'Neill, Sinéad M; Khashan, Ali S; Kenny, Louise C; Grech, Victor

    2017-01-01

    The live birth sex ratio is defined as male/total births (M/F). Terrorist attacks have been associated with a transient decline in M/F 3-5 months later with an excess of male losses in ongoing pregnancies. The early 21st century is replete with religious/politically instigated attacks. This study estimated the pooled effect size between exposure to attacks and M/F. Registration number CRD42016041220. PubMed and Scopus were searched for ecological studies that evaluated the relationship between terrorist attacks from 1/1/2000 to 16/6/2016 and M/F. An overall pooled odds ratio (OR) for the main outcome was generated using the generic inverse variance method. Five studies were included: 2011 Norway attacks; 2012 Sandy Hook Elementary School shooting; 2001 September 11 attacks; 2004 Madrid and 2005 London bombings. OR at 0.97 95% CI (0.94-1.00) (I2 = 63%) showed a small statistically significant 3% decline in the odds (p = 0.03) of having a male live birth 3-5 months later. For lone wolf attacks there was a 10% reduction, OR 0.90 95% CI (0.86-0.95) (p = 0.0001). Terrorist (especially lone wolf) attacks were significantly associated with reduced odds of having a live male birth. Pregnancy loss remains an important Public Health challenge. Systematic reviews and meta-analyses considering other calamities are warranted.

  16. Epidemiologic study of skin cancer in Nagasaki atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Sadamori, Naoki; Mine, Mariko (Nagasaki Univ. (Japan). School of Medicine)

    1989-01-01

    Data from 140 A-bomb survivors with skin cancer were analyzed with the purpose of elucidating the relationship between atomic bombing and skin cancer. The incidence of skin cancer was significantly correlated with the distance from the hypocenter (p<0.01), regardless of sex. Basal cell epithelioma was the most predominant, followed by squamous cell carcinoma. Histology of skin cancer seemed independent of the distance. Since 1965, the incidence of skin cancer has been increased with aging in A-bomb survivors exposed at le2500 m from the hypocenter. It has been significantly higher since 1975 in the le2500 m group than in the ge3000 m group. (N.K.).

  17. Reassessing the Bunbury Bombing: Juxtaposition of Political and Media Narratives

    Directory of Open Access Journals (Sweden)

    Kate O’Donnell

    2017-03-01

    Full Text Available This paper examines an Australian newspaper’s coverage of the bombing of an export port terminal in Bunbury, Western Australia on 19 July, 1976. We wanted to see how The West Australian newspaper framed the story, its precursor events, and the events that followed. We were particularly interested in whether the bombing was reported as an act of terrorism because the then Premier of Western Australia, Sir Charles Court, immediately decried it as “a gross act of terrorism.” We find the newspaper resisted the lure to apply this label, and couched the story in terms of serious criminality. However, it did so before the 1978 Hilton Hotel bombing; an event the news media heralded as the “arrival” of terrorism in Australia. Also, this occurred before what could be argued the sensationalist and politicised reporting of terror-related events became normalised.

  18. Forensic applications of {sup 14}C bomb-pulse dating

    Energy Technology Data Exchange (ETDEWEB)

    Zoppi, U. E-mail: ugo@ansto.gov.au; Skopec, Z.; Skopec, J.; Jones, G.; Fink, D.; Hua, Q.; Jacobsen, G.; Tuniz, C.; Williams, A

    2004-08-01

    After a brief review of the basics of {sup 14}C bomb-pulse dating, this paper presents two unique forensic applications. Particular attention is dedicated to the use of the {sup 14}C bomb-pulse to establish the time of harvest of illicit drugs such as heroin and opium. Preliminary measurements of {sup 14}C concentrations in milligram samples taken from seized drugs are presented. {sup 14}C bomb-pulse dating can determine whether drug distribution originates from stockpiles or recent manufacture, and support the action of law enforcement authorities against criminal organisations involved in drug trafficking. In addition, we describe the dating of wine vintages for a number of authenticated single label vintage red wines from the Barossa Valley - South Australia. Our results show that radiocarbon dating can be used to accurately determine wine vintages and therefore reveal the addition of unrelated materials of natural and synthetic origin.

  19. Forensic applications of 14C bomb-pulse dating

    Science.gov (United States)

    Zoppi, U.; Skopec, Z.; Skopec, J.; Jones, G.; Fink, D.; Hua, Q.; Jacobsen, G.; Tuniz, C.; Williams, A.

    2004-08-01

    After a brief review of the basics of 14C bomb-pulse dating, this paper presents two unique forensic applications. Particular attention is dedicated to the use of the 14C bomb-pulse to establish the time of harvest of illicit drugs such as heroin and opium. Preliminary measurements of 14C concentrations in milligram samples taken from seized drugs are presented. 14C bomb-pulse dating can determine whether drug distribution originates from stockpiles or recent manufacture, and support the action of law enforcement authorities against criminal organisations involved in drug trafficking. In addition, we describe the dating of wine vintages for a number of authenticated single label vintage red wines from the Barossa Valley - South Australia. Our results show that radiocarbon dating can be used to accurately determine wine vintages and therefore reveal the addition of unrelated materials of natural and synthetic origin.

  20. Forensic applications of 14C bomb-pulse dating

    International Nuclear Information System (INIS)

    Zoppi, U.; Skopec, Z.; Skopec, J.; Jones, G.; Fink, D.; Hua, Q.; Jacobsen, G.; Tuniz, C.; Williams, A.

    2004-01-01

    After a brief review of the basics of 14 C bomb-pulse dating, this paper presents two unique forensic applications. Particular attention is dedicated to the use of the 14 C bomb-pulse to establish the time of harvest of illicit drugs such as heroin and opium. Preliminary measurements of 14 C concentrations in milligram samples taken from seized drugs are presented. 14 C bomb-pulse dating can determine whether drug distribution originates from stockpiles or recent manufacture, and support the action of law enforcement authorities against criminal organisations involved in drug trafficking. In addition, we describe the dating of wine vintages for a number of authenticated single label vintage red wines from the Barossa Valley - South Australia. Our results show that radiocarbon dating can be used to accurately determine wine vintages and therefore reveal the addition of unrelated materials of natural and synthetic origin

  1. Study of thyroid tumors in atomic bomb survivors in Nagasaki

    International Nuclear Information System (INIS)

    Sekine, Ichiro; Shichijo, Kazuko; Ito, Masahiro; Kishikawa, Masao; Mine, Mariko; Ikeda, Takayoshi; Ooya, Seiichi.

    1992-01-01

    Thyroid tumors, which were registered during 16 years from 1973 through 1988 in the Nagasaki tumor tissue registration committee, were examined with the purpose of searching for the relationship between thyroid tumors and A-bombing. One hundred and three A-bomb survivors having an A-bomb survivors 'handbook and 89 non-exposed persons born before August 9, 1945 in Nagasaki City were enrolled in the present study. The A-bomb survivors were divided into three groups: people exposed at >2,000 m from the hypocenter (n=20), those exposed at ≤2,000 m (n=68), and those entered the city early after A-bombing (n=15). Thyroid tumors examined were: thyroid carcinoma, nodular goiter, thyroid adenoma and malignant lymphoma. Crude incidence rate and relative risk of thyroid cancer were higher in all exposed groups, except for the ≤2,000 m group of males, than the non-exposed group. In particular, the >2,000 m group had significantly higher incidence of thyroid cancer, irrespective of sex. These findings confirmed the previous data for the higher incidence of thyroid cancer in A-bomb survivors exposed to higher doses of radiation. According to age, thyroid cancer was the most common in their sixth decade of life in the exposed group and in their fifth decade of life in the non-exposed group. Histologically, follicular carcinoma occupied higher incidence in the exposed group (19.2%) than the non-exposed group (8.7%). (N.K.)

  2. Relationship between radioactivity from atomic bomb and leukemia

    International Nuclear Information System (INIS)

    Ishimaru, Toranosuke

    1975-01-01

    A study was made on the atomic bomb survivors in whom leukemia subsquently occurred in Hiroshima and Nagasaki. The incidence of leukemia averaged 30 per one million people 5--26 years after they had been exposed to less than one rad. Among the atomic bomb survivors who had been exposed to 1--99 rads, leukemia occurred within 5--10 years, which showed a slightly higher incidence than that among those who had been exposed to one rad. Among survivors exposed to more than 100 rads, leukemia occurred within 5--10 years on an average of 900 per one million, which was more than 30 times as high as that among those with one rad. Among those aged 15--29 years at the time of bombing, it was high 10--15 years afterward, but was low among those aged 30--44 years at the time of bombing. Among people over 45 years, it became high within 10--15 years, and was still high 15--26 years after bombing. It was suspected that it took 2--3 years after the bombing to develop. From 1950 to 1961, among survivors with exposure to more than 50 rads in Hiroshima, there was a higher incidence of leukemia than there was in Nagasaki. This suggests that neutron-rays have a stronger effect on the incidence of leukemia than have γ-rays. Survivors who had been exposed to neutron-rays in Hiroshima, often had acute or chronic leukemia. On the other hand, some of the survivors with exposure to γ-rays in Nagasaki had only acute leukemia. (Kanao, N.)

  3. Sweden and the bomb. The Swedish plans to acquire nuclear weapons, 1945 - 1972

    International Nuclear Information System (INIS)

    Jonter, T

    2001-09-01

    This study analyses the Swedish nuclear weapons research since 1945 carried out by the Swedish National Defence Research Establishment (FOA). The most important aspect of this research was dealing with protection in broad terms against nuclear weapons attacks. However, another aspect was also important from early on - to conduct research aiming at a possible production of nuclear weapons. FOA performed an extended research up to 1968, when the Swedish government signed the Non-Proliferation Treaty (NPT), which meant the end of these production plans. Up to this date, five main investigations about the technical conditions were made, 1948, 1953, 1955, 1957 and 1965, which all together expanded the Swedish know-how to produce a bomb. The Swedish plans to procure nuclear weapons were not an issue in the debate until the mid-50's. The reason for this was simple, prior to 1954 the plans were secretly held within a small group of involved politicians, military and researchers. The change of this procedure did take place when the Swedish Supreme Commander in a public defence report in 1954 favoured a Swedish Nuclear weapons option. In 1958 FOA had reached a technical level that allowed the parliament to make a decision. Two programs were proposed - the L-programme (the Loading Programme), to be used if the parliament would say yes to a production of nuclear weapons, and the S-programme (the Protection Programme), if the parliament would say no. The debate on the issue had now created problems for the Social Democratic Government. The prime minister, Tage Erlander, who had earlier defended a procurement of nuclear weapons, was now forced to reach a compromise. The compromise was presented to the parliament in a creative manner that meant that only the S-programme would be allowed. The government argued that the technical level did allow a 'freedom of action' up to at least the beginning of the 60's when Sweden was mature to make a decision on the issue. During this period

  4. The Bali bombing: the Royal Darwin Hospital response.

    Science.gov (United States)

    Palmer, Didier J; Stephens, Dianne; Fisher, Dale A; Spain, Brian; Read, David J; Notaras, Len

    2003-10-06

    After the Bali bombing on 12 October 2002, injured Australians were evacuated to Darwin. The first patients arrived at the Royal Darwin Hospital (RDH) 26 hours after the blasts. RDH assessed and resuscitated 61 patients (including 20 intensive care patients, with 15 requiring ventilation, 19 surgery and more than 20 escharotomies). RDH evacuated 48 patients to burns centres around Australia within 36 hours of the first patient arrivals at the hospital and 62 hours after the bomb blasts. The response was successful, but improvements are needed in coordination between the different groups involved in such operations.

  5. Why didn't Hitler get the atomic bomb

    International Nuclear Information System (INIS)

    Chevassus-au-Louis, Nicolas

    2013-01-01

    This bibliographical note presents a book in which the author reports his historical studies on the Nazi's nuclear activities as, by the end of the 1930's, Germany was probably the leader in this domain. He mentions and describes the various programs that were launched between 1939 and 1945, discusses some evidences related to the fact that the Germans probably tried to master nuclear energy production, and that they might have tested a weapon containing fissile materials (probably a dirty bomb). The author analyses the reasons of the failure of this nuclear sector: a lack of organization, war and bombings, and a relative lack of interest of political authorities

  6. The Manhattan Project: Making the Atomic Bomb. 1999 edition.

    Energy Technology Data Exchange (ETDEWEB)

    Gosling, F.G.

    1999-01-01

    ``The Manhattan Project: Making the Atomic Bomb`` is a short history of the origins and development of the American atomic bomb program during World War II. Beginning with the scientific developments of the pre-war years, the monograph details the role of the United States government in conducting a secret, nationwide enterprise that took science from the laboratory and into combat with an entirely new type of weapon. The monograph concludes with a discussion of the immediate postwar period, the debate over the Atomic Energy Act of 1946, and the founding of the Atomic Energy Commission.

  7. The development of the atomic bomb, Los Alamos

    Energy Technology Data Exchange (ETDEWEB)

    Seidel, R.W.

    1993-11-01

    The historical presentation begins with details of the selection of Los Alamos as the site of the Army installation. Wartime efforts of the Army Corps of Engineers, and scientists to include the leader of Los Alamos, Robert Oppenheimer are presented. The layout and construction of the facilities are discussed. The monumental design requirements of the bombs are discussed, including but not limited to the utilization of the second choice implosion method of detonation, and the production of bomb-grade nuclear explosives. The paper ends with a philosophical discussion on the use of nuclear weapons.

  8. The Manhattan Project: Making the Atomic Bomb. 1999 edition.

    Science.gov (United States)

    Gosling, F. G.

    1999-01-01

    "The Manhattan Project: Making the Atomic Bomb" is a short history of the origins and development of the American atomic bomb program during World War II. Beginning with the scientific developments of the pre-war years, the monograph details the role of the United States government in conducting a secret, nationwide enterprise that took science from the laboratory and into combat with an entirely new type of weapon. The monograph concludes with a discussion of the immediate postwar period, the debate over the Atomic Energy Act of 1946, and the founding of the Atomic Energy Commission.

  9. Lack of tissue renewal in human adult Achilles tendon is revealed by nuclear bomb (14)C

    DEFF Research Database (Denmark)

    Heinemeier, Katja Maria; Schjerling, Peter; Heinemeier, Jan

    2013-01-01

    the 14C bomb-pulse method. This method takes advantage of the dramatic increase in atmospheric levels of 14C, produced by nuclear bomb tests in 1955-1963, which is reflected in all living organisms. Levels of 14C were measured in 28 forensic samples of Achilles tendon core and 4 skeletal muscle samples...... is revealed by nuclear bomb 14C....

  10. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    Identifying factors behind countries weakness to cyber - attacks is an important step towards addressing these weaknesses at the root level. For...the lowest rates of cyber - attacks . This is surprising given the bad cyber reputation of some African countries such as Nigeria. Our research has many policy implications.

  11. [Heart-attack in pregnancy].

    Science.gov (United States)

    Výtisková, T; Suchá, D; Fučíková, Z

    To describe hear-attack on crystal meth addicted pregnant woman. Case report. Acute heart-attack during pregnancy means unexpected obstetric complication. The consequences could be fatal for the mother and the fetus. Although good delivery management and treatment could reduce morbidity and mortality to a minimum.

  12. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...

  13. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...

  14. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...

  15. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    Science.gov (United States)

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  16. JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones

    DEFF Research Database (Denmark)

    Meng, Weizhi; Jiang, Lijun; Wang, Yu

    2017-01-01

    attacks especially charging attacks and threaten user's privacy. As an example, juice filming charging (JFC) attack is able to steal users' sensitive and private information from both Android OS and iOS devices, through automatically recording phone-screen and monitoring users' inputs during the whole...... damage of JFC attack, in this work, we investigate the impact of JFC attack on processor usage including both CPU- and GPU-usage. It is found that JFC attack would cause a noticeable usage increase when connecting the phone to the JFC charger. Then, we design a security mechanism, called JFCGuard...

  17. Nagasaki and radiation. Health effects of radiation: atomic bomb, Chernobyl and JCO

    International Nuclear Information System (INIS)

    Nagataki, Shigenobu

    2005-01-01

    Under the title of Nagasaki and Radiation, this presentation will include the significance of the investigation of health of radiation on A-bomb survivors, dissociation between the scientific results and the public impression at the Chernobyl accident and problems in health control of the people in the regions surrounding JCO, Tokaimura. It is proposed that in the area of the low-dose radiation, economic, ethical, psychological, environmental, and scientific factors are all essential in the policy and regulatory decision-making process to assure public health and well-being. (author)

  18. Uranium tetrafluoride reduction closed bomb. Part I: Reduction process general conditions; Reduccion del tetrafluoruro de uranio en bomba cerrada. Part I. estudio de las variables generales del proceso de reduccion

    Energy Technology Data Exchange (ETDEWEB)

    Anca Abati, R.; Lopez Rodriguez, M.

    1961-07-01

    General conditions about the metallo thermic reduction in small bombs (250 and 800 gr. of uranium) has been investigated. Factors such as kind and granulometry of the magnesium used, magnesium excess and preheating temperature, which affect yields and metal quality have been considered. magnesium excess increased yields in a 15% in the small bomb, about the preheating temperature, there is a range between which yields and metal quality does not change. All tests have been made with graphite linings. (Author) 18 refs.

  19. Comparative Test of the Effectiveness of Large Bombs against Reinforced Concrete Structures (Anglo-American Bomb Tests-Project RUBY).

    Science.gov (United States)

    1946-10-31

    be expected to perforate up to 15’-l0" of reinforced concreto at this striking velocity. (3) The rocket assisted 4500-lb. Disney bomb, with a striking...to 30 doegre until it is brought to reot in the esneret or ele perforates the slabe (4) The reliability of the arm~t d firing systen of the Disne...Field, Florida. 1. GEMAL: a. Descriotion.-This test is a joint British-American project tc letni el concrete penetrating performance of large bombs

  20. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  1. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... of MMP-3 in the external jugular (P = 0.002) and cubital (P = 0.008) vein during attacks compared with outside of attacks. We found no correlation of ictal or interictal MMP-3, MMP-9 and TIMP-1 to migraine duration and frequency analysed in 21 patients (P > 0.05). There was no difference between ictal...

  2. Satisfaction in life of elder A-bomb survivors

    International Nuclear Information System (INIS)

    Mine, Mariko; Okumura, Yutaka; Kondo, Hisayoshi; Yokota, Kenichi

    1992-01-01

    1500 A-bomb survivor aged more than 65 are sampled and the questionnaire was performed by mailing. 1329 (88.6 %) responded and 937 from the age less than 80 were statistically anylized. Fairly good satisfaction was felt on their daily life, including dwelling, income, work, health and family. (J.P.N.)

  3. Bombing beyond Democracy. Remembering the Ruins of Europe

    DEFF Research Database (Denmark)

    Hoffmann, Birthe

    2013-01-01

    ? And which lesson is to be learnt by this – does it affect the European conduct in international conflicts? In order to provide some background information to understand this debate, the paper will give an outline of the background and the extent of the bombings, including the development of the concept...

  4. Current trend of malignant neoplasms among atomic bomb survivors

    International Nuclear Information System (INIS)

    Hamada, Tadao

    1984-01-01

    A survey was made on 7,589 admitted patients and 1,965 autopsy cases. The overall incidence of malignant neoplasms tended to decrease in the group exposed to atomic bomb within 2 km in autopsy cases and to increase in admitted patients. The incidence of pulmonary cancer tended to increase in both autopsy cases and admitted patients. The incidence of gastric cancer tended to increase up to 1975, and thereafter tended to decrease. The incidence of liver cancer tended to increase in both autopsy cases and admitted patients, which was marked in males. The incidence of leukemia was high in the group exposed to atomic bomb within 2 km in autopsy cases, and in the group within 1 km and the group which entered the city after the explosion in admitted patients. The incidence of malignant lymphoma tended to decrease, and the incidence of carcinoma of the colon tended to gradually increase in both autopsy cases and admitted patients. The incidence of multiple carcinomas tended to increase in both atomic bomb exposed group and non-exposed group, being higher in atomic bomb group than in non-exposed group. The incidence of breast cancer became constant since 1970. The incidence of carcinoma of the thyroid gland tended to decrease, although it was high in the group exposed near the explosion. (Namekawa, K.)

  5. Characterising argon-bomb balloons for high-speed photography

    CSIR Research Space (South Africa)

    Olivier, M

    2013-08-01

    Full Text Available A method to optimise the geometry, explosive charge mass and volume of an argon bomb for specific lighting requirements has been proposed. The method is specifically aimed at applications that require photographic diagnostics with ultra-high speed...

  6. Accurate dating with radiocarbon from the atom bomb tests

    CSIR Research Space (South Africa)

    Vogel, JC

    2002-09-01

    Full Text Available The artificial radiocarbon produced by the thermonuclear bomb tests in the 1950s and 1960s significantly increased the level of C-14 in the environment. A detailed record of the subsequent changes in the C-14 concentration of the atmosphere can...

  7. Malignant Lymphoma in an Atomic-bomb Survivor

    Directory of Open Access Journals (Sweden)

    Cheng-Chia Lee

    2009-07-01

    Full Text Available Atomic bomb survivors outside of Japan are few and often hard to follow-up. Spinal malignant lymphoma among these survivors is rare in established studies from Japan or the United States. Here, we report an 81-year-old woman, who experienced the atomic bomb explosion in Nagasaki when she was 19 years old, who presented with papillary thyroid carcinoma when she was 70 years old. Both follicular lymphoma over the right elbow region and vertebral malignant lymphoma were found when she turned 81 years old. Bone scan did not show any increased uptake of isotope. However, thoracolumbar spine magnetic resonance imaging showed multiple infiltrative soft tissue masses involving vertebral bodies at the T10–11 level. Computed tomography-guided biopsy further showed lymphocyte infiltration. Fortunately, the neurological deficit was improved after chemotherapy. The diagnosis of malignant lymphoma in atomic bomb survivors should be more careful and aggressive, even when their bone scan results show negative findings. In addition, the authors suggest that atomic bomb survivors should be followed-up carefully throughout their entire life.

  8. Proposed Specifications for International Interoperability on Repaired Bomb Damaged Runways

    Science.gov (United States)

    1981-01-01

    ESL-TR-81-03 PROPOSED SPECIFICATIONS FOR INTERNATIONAL INTEROPERABILITY ON REPAIRED BOMB DAMAGED RUNWAYS CALDWELL, LAPSLEY R. LT COL. USAF GERARDI... Lapsley R., Lt Col, USAF xctard,., Anthony G. IN-HOUSE 9. PERFORk, AG’ •)RGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMENT. PROJ :CT, TASKAREA & WORK

  9. Lymphocyte cytotoxicity of colchicine in Hiroshima atomic bomb survivors

    International Nuclear Information System (INIS)

    Caplan, R.A.; Odoroff, C.L.; Ozaki, Kyoko; Hamilton, H.B.; Finch, S.C.

    1979-07-01

    The cytotoxicity of colchicine for the peripheral blood lymphocytes of 151 Hiroshima atomic bomb survivors and their controls was determined. No radiation effect was found, but modest age-related changes for the initial number of vialble cells and for the cytotoxicity of colchicine were observed. (author)

  10. The development of the first Soviet atomic bomb

    International Nuclear Information System (INIS)

    Goncharov, German A; Ryabev, Lev D

    2001-01-01

    In the late 1930s and early 1940s, two remarkable physical phenomena - the fission of heavy nuclei and the chain fission reaction - were discovered, implying that a new powerful source of energy (nuclear fission energy) might become a practical possibility for mankind. At that time, however, the political situation in the world made the development of the atomic bomb the main objective of nuclear energy research in the countries involved. The first atomic bombs, notoriously used in the war against Japan, were produced by the United States of America only six and a half years after the discovery of fission. Four years later, the first Soviet atomic bomb was tested. This was a major step toward the establishment of nuclear parity which led to stability and global peace and thus greatly influenced the destiny of human kind. Based on documentary materials covering the period from 1939 to 1949, this paper traces the origin and evolution of the physical ideas behind the first Soviet atomic bomb and discusses the most important events associated with the project. (from the history of physics)

  11. 3D reconstructions of a controlled bus bombing

    DEFF Research Database (Denmark)

    Villa, Chiara; Hansen, Nikolaj Friis; Hansen, Kamilla Maria

    2018-01-01

    Objectives: to demonstrate the usefulness of 3D reconstructions to better understand the dynamic of a controlled bus bombing. Materials and methods: 3D models of the victims (pigs) were created from post-mortem CT scanning using Mimic software; 3D models of the crime scene (bus) were generated by...

  12. Biplanes and Bombsights, British Bombing in World War I

    Science.gov (United States)

    1999-05-01

    and arrangements had to be made for a large installation of electrical power for workshops and lighting and petrol in order to save transport. The...strategic bombing, assumptions engen - dered and reinforced by official reports, classified analyses, and public bulletins in the years before the Second

  13. Atomic Bomb: Memory and its Power on Japanese Pacifism

    Science.gov (United States)

    2008-05-01

    incentives and most importantly any manipulation of the atomic bomb memory. The most devastated members of Japan’s society however, would be the...The Rape of Nanking. New York: Penguin Books, 1998. Chomsky , Noam. Intervention. San Francisco: City Lights Books, 2007. Christopher, Robert C. The

  14. Alabama University Professor's View of the Birmingham Bombing Trial.

    Science.gov (United States)

    Journal of Blacks in Higher Education, 2001

    2001-01-01

    Presents the views of Alabama university scholars regarding the historical significance of the 2001 trial of Thomas Blanton for his role in the Ku Klux Klan bombing of the Sixteenth Street Baptist church in Birmingham, Alabama thet killed four girls. Their discussions note the need to examine the American judicial system, the weak case against Mr.…

  15. Pre- and post-bomb radiocarbon in fish otoliths

    Science.gov (United States)

    Kalish, John M.

    1993-02-01

    Measurements of radiocarbon in seawater dissolved inorganic carbon (DIC), or suitable proxies such as hermatypic corals, are a valuable source of information on carbon flux and ocean circulation. However, knowledge of the global distribution of both pre- and post-bomb radiocarbon is limited due to the sources of these data. Suitable hermatypic corals are restricted to shallow tropical and subtropical waters and oceanographic collections of seawater are prohibitively expensive. What is needed is a proxy for ocean radiocarbon that can be collected at most latitudes and depths, and which can be reliably aged. Here I report accelerator mass spectrometry analyses of radiocarbon from selected regions of fish otoliths and show that such measurements are suitable for determining both pre- and post-bomb radiocarbon in all oceans and at most depths. Radiocarbon data obtained from otoliths can extend our knowledge of carbon flux in the oceans and atmosphere and help to develop further understanding of the fate of atmospheric CO 2 and ocean circulation. The data presented here represent the first pre- and post-bomb time series of radiocarbon levels from temperate waters. Furthermore, I demonstrate that the dramatic increase in radiocarbon in the atmosphere and oceans, attributable to the atmospheric testing of thermonuclear bombs during the 1950's and 1960's, provides a chemical mark on fish otoliths that is suitable for the validation of age in fishes.

  16. Aplastic anemia and related disorders in atomic bomb survivors

    International Nuclear Information System (INIS)

    Ichimaru, Michito; Tomonaga, Yu; Matsunaga, Masako; Sadamori, Naoki; Ishimaru, Toranosuke.

    1978-01-01

    Whether the incidence of aplastic anemia significantly increases due to the later effect of atomic-bomb radiation was studied. After the data of aplastic anemia which occurred within 1950 - 1973 were evaluated and the diagnoses of the cases were certified, the incidence of aplastic anemia per 109,000 inhabitants of the cities of Hiroshima and Nagasaki was calculated and compared according to the dose of atomic-bomb radiation. There was no increase in the incidence according to an increase in radiation dose, and there was no fact that aplastic anemia increased in a certain period either. Most of the atomic-bomb survivors who were close to the epicenter and were clinically diagnosed as aplastic anemia had leukemia lesion or myeloid proliferating lesion, and it is likely to be that pathological changes resembling aplastic anemia may appear in a certain phase of myeloid proliferation or as a phenotype of myeloid proliferation. An evaluation was made on cases of aplastic anemia of other groups, but the doses of atomic-bomb radiation which they received were not so much to give effect on the bone marrow except only two cases. (Ueda, J.)

  17. Bombing of Hiroshima and Nagasaki: a test or tragedy ?

    International Nuclear Information System (INIS)

    Faridah Mohd Idris

    2003-01-01

    Hiroshima and Nagasaki were left as monument by the history of the man civilization. This article discussed some of related issues i.e. the scenarios of the tragedy, the history of atomic bomb - starts with the discovery of neutrons to the day the tragedy happened

  18. The dirty bomb: management of victims of radiological weapons.

    Science.gov (United States)

    Willis, Denise; Coleman, Elizabeth Ann

    2003-12-01

    A "dirty bomb," a conventional explosive packed with radioactive material, kills or injures through the initial blast and by airborne radiation and contamination. Adult-health nurses need an understanding of the consequences of blast injuries and radiation exposure, and the management of victims.

  19. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  20. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  1. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  2. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  3. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  4. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security......The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...

  5. For Whom Does Time Heal Wounds? Individual Differences in Stability and Change in Posttraumatic Stress After the 2011 Oslo Bombing.

    Science.gov (United States)

    Birkeland, Marianne Skogbrott; Hansen, Marianne Bang; Blix, Ines; Solberg, Øivind; Heir, Trond

    2017-02-01

    Prospective studies describing and predicting individual differences in the course of posttraumatic stress symptoms (PTSS) after disasters are scarce. The present study aimed to describe and predict individual differences in both the level and the rate of change in PTSS after the 2011 Oslo bombing, a terrorist attack directed at the Norwegian government. Survey data from ministerial employees (N = 256) were collected 10, 22, and 34 months after the bombing. We used latent growth modeling to examine the development of PTSS, and to identify the strength of predictor variables. High exposure, female sex, and high levels of neuroticism were associated with higher levels of PTSS 10 months after the traumatic event (β ranged from .25 to .30, p < .001), whereas social support was associated with lower levels of PTSS (β = -.30, p < .001). The combination of being female and high in neuroticism was associated with a faster decline in PTSS (β range: -.20 to -.39, p = .010 < .05). High exposure seemed to have a lasting influence by maintaining high levels of PTSS. Our findings suggested that being female, being highly exposed, and having low levels of social support were risk markers for enduring PTSS. Copyright © 2017 International Society for Traumatic Stress Studies.

  6. Gas in Attack and Gas in Defense

    National Research Council Canada - National Science Library

    Fries, Amos A

    1919-01-01

    Carrying out a gas attack is the most technical and dangerous of war's attacks, not only to those on board the airplane that is initiating the attack, but also to those friendly troops on the ground for miles around...

  7. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available and is only able to cater for social engineering attacks that use bidirectional communication. Previous research discovered that social engineering attacks can be classified into three different categories, namely attacks that utilise bidirectional...

  8. Imaginary Savior: the image of the nuclear bomb in Korea, 1945-1960.

    Science.gov (United States)

    Kim, Dong-Won

    2009-01-01

    Two atomic bombs dropped on Hiroshima and Nagasaki in August 1945 brought the unexpected liberation of Korea from the 35-year Japanese occupation. Koreans therefore had a very favorable and positive image of the nuclear bomb and nuclear energy from the beginning. The image of the nuclear bomb as "savior" was strengthened during the Korean War when the United States openly mentioned the possible use of the nuclear bomb against North Korean and Chinese military. After the end of the Korean War in July 1953 South Koreans strongly supported the development of the nuclear bomb in order to deter another North Korean invasion. When the US government provided South Korea with a research nuclear reactor in the late 1950s, most South Koreans hailed it as the first step to developing their own nuclear bomb. This paper will analyze how and why the savior image of the nuclear bomb originated and spread in Korea during the 1950s.

  9. Error and attack vulnerability of temporal networks

    Science.gov (United States)

    Trajanovski, S.; Scellato, S.; Leontiadis, I.

    2012-06-01

    The study of real-world communication systems via complex network models has greatly expanded our understanding on how information flows, even in completely decentralized architectures such as mobile wireless networks. Nonetheless, static network models cannot capture the time-varying aspects and, therefore, various temporal metrics have been introduced. In this paper, we investigate the robustness of time-varying networks under various failures and intelligent attacks. We adopt a methodology to evaluate the impact of such events on the network connectivity by employing temporal metrics in order to select and remove nodes based on how critical they are considered for the network. We also define the temporal robustness range, a new metric that quantifies the disruption caused by an attack strategy to a given temporal network. Our results show that in real-world networks, where some nodes are more dominant than others, temporal connectivity is significantly more affected by intelligent attacks than by random failures. Moreover, different intelligent attack strategies have a similar effect on the robustness: even small subsets of highly connected nodes act as a bottleneck in the temporal information flow, becoming critical weak points of the entire system. Additionally, the same nodes are the most important across a range of different importance metrics, expressing the correlation between highly connected nodes and those that trigger most of the changes in the optimal information spreading. Contrarily, we show that in randomly generated networks, where all the nodes have similar properties, random errors and intelligent attacks exhibit similar behavior. These conclusions may help us in design of more robust systems and fault-tolerant network architectures.

  10. The mental health state of atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Nakane, Yoshibumi; Imamura, Yoshihiro; Yoshitake, Kazuyasu; Honda, Sumihisa; Mine, Mariko; Hatada, Keiko; Tomonaga, Masao [Nagasaki Univ. (Japan). School of Medicine; Tagawa, Masuko

    1997-03-01

    Our department of Neuropsychiatry has clarified the clinical features of several mental disorders and surveyed the causes of those disorders from the psychosocial aspect using the methodology of epidemiological psychiatric approach. Using this previous research experience, we began a long-planned study to examine the mental health state of atomic bomb survivors. Fifty-one years have passed since the atomic bombing, and the survivors must have suffered various psychosocial stresses, other than any direct effect on the central nervous system from exposure to radiation, and it is assumed that victims` mental state has been affected in various ways as a result. The subjects of the survey were 7,670 people who had regular health examinations for atomic bomb survivors during the study period of three years and who consented to participate in the study. Of the total, 226 subjects were selected for a second phase according to the results of the General Health Questionnaire 12-item Version which was used in the first phase of the survey. The results were as follows: 1. The distance from the hypocenter was related to the degree of ill health, and the percentage of people with a high score was greater among those exposed to the atomic bomb in proximity to the hypocenter. 2. 14.6% of the subjects were diagnosed as having some kind of mental disorders according to clinical interviews by trained psychiatrists. These results had not expected prior to the study. On the based of the study, we will try to establish a mental health support system for atomic bomb survivors. (author)

  11. Automatic behavior sensing for a bomb-detecting dog

    Science.gov (United States)

    Nguyen, Hoa G.; Nans, Adam; Talke, Kurt; Candela, Paul; Everett, H. R.

    2015-05-01

    Bomb-detecting dogs are trained to detect explosives through their sense of smell and often perform a specific behavior to indicate a possible bomb detection. This behavior is noticed by the dog handler, who confirms the probable explosives, determines the location, and forwards the information to an explosive ordnance disposal (EOD) team. To improve the speed and accuracy of this process and better integrate it with the EOD team's robotic explosive disposal operation, SPAWAR Systems Center Pacific has designed and prototyped an electronic dog collar that automatically tracks the dog's location and attitude, detects the indicative behavior, and records the data. To account for the differences between dogs, a 5-minute training routine can be executed before the mission to establish initial values for the k-mean clustering algorithm that classifies a specific dog's behavior. The recorded data include GPS location of the suspected bomb, the path the dog took to approach this location, and a video clip covering the detection event. The dog handler reviews and confirms the data before it is packaged up and forwarded on to the EOD team. The EOD team uses the video clip to better identify the type of bomb and for awareness of the surrounding environment before they arrive at the scene. Before the robotic neutralization operation commences at the site, the location and path data (which are supplied in a format understandable by the next-generation EOD robots—the Advanced EOD Robotic System) can be loaded into the robotic controller to automatically guide the robot to the bomb site. This paper describes the project with emphasis on the dog-collar hardware, behavior-classification software, and feasibility testing.

  12. Leukemia among atomic bomb survivors during the 1980s

    International Nuclear Information System (INIS)

    Kusumi, Shizuyo; Matsuo, Tatsuki

    1990-01-01

    On the basis of the dosimetry system 1986, exposure doses were determined in a cohort of 86,502 subjects for the Life Span Study during the period 1950-1985. A total of 248 people were found to develop leukemia in Hiroshima and Nagasaki cities. This is an analysis of the 248 patients with leukemia in connection with exposure doses, years after A-bombing, age at the time of A-bombing, relative risk, and background. An average exposure dose was 0.20 Gy for Hiroshima and 0.22 Gy for Nagasaki. Relative risk for leukemia tended to show a linear increase in proportion to exposure doses. This was significant for acute myelocytic leukemia (AML), regardless of whether A-bomb survivors came from Hiroshima or Nagasaki. The younger the age at the time of A-bombing was, the higher excess relative risk for acute lymphocytic leukemia (ALL) and chronic myelocytic leukemia (CML) was. For AML, however, it was independent of the age at that time. These findings were similar in Hiroshima and Nagasaki A-bomb survivors, irrespective of age. As for non-exposed group, the incidence of CML was three times higher in Hiroshima citizen than Nagasaki citizen. Similarly, Hiroshima citizen had a 1.6 fold incidence of AML. There was no significant difference in the incidence of ALL between the cities. The incidences of both AML and ALL tended to increase more and more with aging, but the prevalences tended to increase in younger generation. An increased incidence of CML was associated with aging alone. (N.K.)

  13. The mental health state of atomic bomb survivors

    International Nuclear Information System (INIS)

    Nakane, Yoshibumi; Imamura, Yoshihiro; Yoshitake, Kazuyasu; Honda, Sumihisa; Mine, Mariko; Hatada, Keiko; Tomonaga, Masao; Tagawa, Masuko

    1997-01-01

    Our department of Neuropsychiatry has clarified the clinical features of several mental disorders and surveyed the causes of those disorders from the psychosocial aspect using the methodology of epidemiological psychiatric approach. Using this previous research experience, we began a long-planned study to examine the mental health state of atomic bomb survivors. Fifty-one years have passed since the atomic bombing, and the survivors must have suffered various psychosocial stresses, other than any direct effect on the central nervous system from exposure to radiation, and it is assumed that victims' mental state has been affected in various ways as a result. The subjects of the survey were 7,670 people who had regular health examinations for atomic bomb survivors during the study period of three years and who consented to participate in the study. Of the total, 226 subjects were selected for a second phase according to the results of the General Health Questionnaire 12-item Version which was used in the first phase of the survey. The results were as follows: 1. The distance from the hypocenter was related to the degree of ill health, and the percentage of people with a high score was greater among those exposed to the atomic bomb in proximity to the hypocenter. 2. 14.6% of the subjects were diagnosed as having some kind of mental disorders according to clinical interviews by trained psychiatrists. These results had not expected prior to the study. On the based of the study, we will try to establish a mental health support system for atomic bomb survivors. (author)

  14. 'What to do if it happens': planners, pamphlets and propaganda in the age of the H-bomb.

    Science.gov (United States)

    Smith, Melissa

    2009-06-01

    In 1955, a highly secret Government report painted a bleak picture of Britain after a nuclear war. Without greatly improved civil defence measures, the report warned, a hydrogen bomb attack on Britain could kill one-third of the population within 24h and leave swathes of land uninhabitable. But Government advice to the public told a different story, offering cheerful advice about vacuuming up radioactive fallout and building shelters from books and furniture. Meanwhile, civil defence spending cuts left the public lacking even the standard of protection they had enjoyed during the Second World War. This seemingly paradoxical Government response was shaped by conflicting financial and political pressures, and by the work of the Home Office scientists whose research underpinned British civil defence planning.

  15. Gamma-ray spectrum of the radiaoctive dust produced by the super-hydrogen bomb test explosion on March 1, 1954

    International Nuclear Information System (INIS)

    Shimizu, Sakae

    1987-01-01

    The super-hydrogen bomb test explosion, the so-called Bravo test of a fission-fusion-fission bomb, was carried out on Bikini Atoll in the mid-Pacific on March 1, 1954. Twenty-three Japanese fishermen on board a fishing boat about 90 miles north-east of the test site were attacked unexpectedly by the fallout, radioactive fine debris of coral reef. Within several months after the accident by radiochemical analysis about 20 different nuclides of fission products and, in addition, a considerable amount of 235 U were discovered from the fallout. As we have been preserving a minute amount of the original fallout dust collected on board the fishing boat 31 years ago, measurements of γ rays from it have recently been used to find some active nuclides, if still existing. In the γ-ray spectrum observed there exist evident peaks of γ and X-rays from 241 Am, 155 Eu, 137 Cs and 60 Co. Absolute intensities of these four nuclides, still remaining 31 years after the explosion of the bomb, have been estimated. Some discussion on our finding is presented. (orig.)

  16. Study of skin cancer incidence in Nagasaki atomic bomb survivors, 1958-85

    International Nuclear Information System (INIS)

    Sadamori, Naoki; Otake, Masanori; Honda, Takeo.

    1993-03-01

    The effects of exposure to ionizing radiation on skin cancer incidence in a cohort of atomic bomb (A-bomb) survivors in the Nagasaki Extended Life Span Study (LSS-E85) sample have been investigated. Among 25,942 exposed survivors at risk whose DS86 dose estimates were available, 47 cases of skin cancer including malignant melanoma were confirmed in the Nagasaki Tumor Registry during the period from 1 April 1958 to 31 December 1985. The dose-response relationship of skin cancer based on an additive relative risk model showed linearity without threshold, not a linear-quadratic curve. The excess relative risk (ERR) of 2.2 per gray in the LSS-E85 sample was highly significant (95% confidence limits: 0.5 to 5.0). In addition, the ERR of 3.1 per gray in the Adult Health Study (AHS) sample was also significant (95% confidence limits: 0.6 to 20.3). When dose equivalents based on a relative biological effectiveness of neutrons of 10 were used, the ERR in the former sample decreased to 2.0 per sievert (95% confidence limits: 0.7-4.5), and the risk in the latter group also declined, to 2.7 per sievert (95% confidence limits: 0.6-17.8). The ERRs did not differ significantly between males and females in the LSS-E85 and AHS samples, but a highly significant increase was observed for the ERR of age at exposure and time trend since exposure. The ERR of skin cancer cases including and excluding 4 malignant melanoma cases for the LSS-E85 sample (there were no malignant melanoma cases in the AHS sample) showed almost the same linear dose response. This is the first report to demonstrate a highly significant dose-response relationship between A-bomb exposure and skin cancer incidence. (author)

  17. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  18. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  19. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... in panic attacks. For example, if a grizzly bear came after you, your body would react instinctively. ... panic disorder Major life stress, such as the death or serious illness of a loved one A ...

  20. Mass-casualty terrorist bombings in Istanbul, Turkey, November 2003: report of the events and the prehospital emergency response.

    Science.gov (United States)

    Rodoplu, Ulkümen; Arnold, Jeffrey L; Tokyay, Rifat; Ersoy, Gurkan; Cetiner, Serkan; Yücel, Tayfun

    2004-01-01

    This paper describes the two mass-casualty, terrorist attacks that occurred in Istanbul, Turkey in November 2003, and the resulting pre-hospital emergency response. A complex, retrospective, descriptive study was performed, using open source reports, interviews, direct measurements of street distances, and hospital records from the American Hospital (AH) and Taksim Education and Research State Hospital (TERSH) in Istanbul. On 15 November, improvised explosive devices (IEDs) in trucks were detonated outside the Neve Shalom and Beth Israel Synagogues, killing 30 persons and injuring an estimated additional 300. Victims were maldistributed to 16 medical facilities. For example, AH, a private hospital located six km from both synagogues, received 69 injured survivors, of which 86% had secondary blast injuries and 13% were admitted to the hospital. The TERSH, a government hospital located 1 km from both synagogues, received 48 injured survivors. On 20 November, IEDs in trucks were detonated outside the Hong Kong Shanghai Banking Corporation (HSBC) headquarters and the British Consulate (BC), killing 33 and injuring an estimated additional 450. Victims were maldistributed to 16 medical facilities. For example, TERSH, located 18 km from the HSBC site and 2 km from the the BC received 184 injured survivors, of which 93% had secondary blast injuries and 15% were hospitalized. The AH, located 9 km from the HSBC site and 6 km from the BC, received 16 victims. The twin suicide truck bombings on 15 and 20 November 2003 were the two largest terrorist attacks in modern Turkish history, collectively killing 63 persons and injuring an estimated 750 others. The vast majority of victims had secondary blast injuries, which did not require hospitalization. Factors associated with the maldistribution of casualties to medical facilities appeared to include the distance from each bombing site, the type of medical facility, and the personal preference of injured survivors.

  1. Public health nutritional studies on the atomic bomb female survivors living in Hiroshima

    Energy Technology Data Exchange (ETDEWEB)

    Munaka, Masaki (Hiroshima Univ. (Japan). Research Inst. for Nuclear Medicine and Biology)

    1983-08-01

    The dietary life and socio-economic status of atomic bomb female survivors living in Hiroshima were investigated. The atomic bomb survivors group exposed at a long distance (LDG) was found to take a great quantity of soybean curd, miso and fruit except citrus, while the atomic bomb survivors group exposed at a short distance (SDG) was found to take a significant amount of fish paste products. SDG tends to ingest processed food and in nutrient supply rate the percentage of calcium, iron and vitamin A is low. Judging from a state of food group without a meal rate, we got the result that SDG has a few kinds of ingestion food and takes them partially in each meal. In terms of socio-economic status, the rate of living alone, supporting oneself and living an empty life is high and the rate of living with a partner is low. On the other hand, we analysed the relations of three factors on physique.physical fitness and living status, and then got the following results. (1) ''Volume capacity'', in the cases of ''be married at present'', ''have a large family'', ''ingest a lot of protein and iron'', tends to be large, while in the cases of ''have no dis ease'', ''don't go without a meal'', ''ingest a lot of carbohydrates (non-fibrous)'', and ''nutr itional balance is good'', it tends to be small. (2) ''Height'', in the case of ''socio-economical status was good before exposure to the atomic bomb'', tends to increase. (3) ''Synthetic physical fitness'', in the cases of ''health condition is good at present'', ''have no disease at present'', ''ingest a lot of vitamin A'' and ''nutritional balance is good'', tends to be superior; in the cases of ''food cost is high

  2. Public health nutritional studies on the atomic bomb female survivors living in Hiroshima

    International Nuclear Information System (INIS)

    Munaka, Masaki

    1983-01-01

    The dietary life and socio-economic status of atomic bomb female survivors living in Hiroshima were investigated. The atomic bomb survivors group exposed at a long distance (LDG) was found to take a great quantity of soybean curd, miso and fruit except citrus, while the atomic bomb survivors group exposed at a short distance (SDG) was found to take a significant amount of fish paste products. SDG tends to ingest processed food and in nutrient supply rate the percentage of calcium, iron and vitamin A is low. Judging from a state of food group without a meal rate, we got the result that SDG has a few kinds of ingestion food and takes them partially in each meal. In terms of socio-economic status, the rate of living alone, supporting oneself and living an empty life is high and the rate of living with a partner is low. On the other hand, we analysed the relations of three factors on physique.physical fitness and living status, and then got the following results. (1) ''Volume capacity'', in the cases of ''be married at present'', ''have a large family'', ''ingest a lot of protein and iron'', tends to be large, while in the cases of ''have no dis ease'', ''don't go without a meal'', ''ingest a lot of carbohydrates (non-fibrous)'', and ''nutr itional balance is good'', it tends to be small. (2) ''Height'', in the case of ''socio-economical status was good before exposure to the atomic bomb'', tends to increase. (3) ''Synthetic physical fitness'', in the cases of ''health condition is good at present'', ''have no disease at present'', ''ingest a lot of vitamin A'' and ''nutritional balance is good'', tends to be superior; in the cases of ''food cost is high'' and ''ingest a lot of carbohydrates (non-fibrous)'', it tends to be low. The significant difference was observed in ''synthetic physical fitness'' between the two age groups of 50-59 years and beyond 70 years. (author)

  3. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Nichols, Jeff A. {Cyber Sciences} [ORNL; Curtis, Laura [Pacific Northwest National Laboratory (PNNL)

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.

  4. Logic of the N-bomb. [In defensive posture of NATO

    Energy Technology Data Exchange (ETDEWEB)

    Cohen, S.T.

    1978-06-01

    S.T. Cohen, the originator of enhanced radiation weapons (the neutron bombs) argues that they would be most effective against a massive enemy tank attack in Europe. The mini-thermonuclear device is a discriminate weapon, and it is now wondered why it has caused so much controversy. A debate of major national proportions emerged, which soon was joined by voices in NATO Europe and Soviet-Warsaw Pact pronouncements. The weapon was attacked on political, military, and technical grounds. In particular, arguments were mounted against the ''insidious'' concept of emphasizing a weapon kill mechanism--namely, nuclear radiation--designed for antipersonnel application. With President Carter's decision to defer production, global response--particularly the response of the USSR--is summarized. Prompt-radiation and blast effects are determined for three nuclear devices: a 1-kT enhanced-radiation device that burns a mixture of deuterium and tritium; a 1-kT fission device; and a 10-kT fission device. Radii corresponding to three radiation dosage levels (8,000, 3,000, and 650 rads) and three blast intensity levels (6, 4, and 3 psi) are shown; variation with burst height is shown for three burst heights (500, 1500, and 3000 ft). The author says it appears that some time ago the Soviets embarked on an ER warhead program of their own. He also analyzes the views of other nuclear scientists and concludes that, whatever their merits may be, ER weapons cannot be said to have a first-order bearing on NATO's current defensive posture. (MCW)

  5. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  6. Blast Injuries: From Improvised Explosive Device Blasts to the Boston Marathon Bombing.

    Science.gov (United States)

    Singh, Ajay K; Ditkofsky, Noah G; York, John D; Abujudeh, Hani H; Avery, Laura A; Brunner, John F; Sodickson, Aaron D; Lev, Michael H

    2016-01-01

    Although most trauma centers have experience with the imaging and management of gunshot wounds, in most regions blast wounds such as the ones encountered in terrorist attacks with the use of improvised explosive devices (IEDs) are infrequently encountered outside the battlefield. As global terrorism becomes a greater concern, it is important that radiologists, particularly those working in urban trauma centers, be aware of the mechanisms of injury and the spectrum of primary, secondary, tertiary, and quaternary blast injury patterns. Primary blast injuries are caused by barotrauma from the initial increased pressure of the explosive detonation and the rarefaction of the atmosphere immediately afterward. Secondary blast injuries are caused by debris carried by the blast wind and most often result in penetrating trauma from small shrapnel. Tertiary blast injuries are caused by the physical displacement of the victim and the wide variety of blunt or penetrating trauma sustained as a result of the patient impacting immovable objects such as surrounding cars, walls, or fences. Quaternary blast injuries include all other injuries, such as burns, crush injuries, and inhalational injuries. Radiography is considered the initial imaging modality for assessment of shrapnel and fractures. Computed tomography is the optimal test to assess penetrating chest, abdominal, and head trauma. The mechanism of blast injuries and the imaging experience of the victims of the Boston Marathon bombing are detailed, as well as musculoskeletal, neurologic, gastrointestinal, and pulmonary injury patterns from blast injuries. ©RSNA, 2016.

  7. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.

    Science.gov (United States)

    Feng, Zhi; Wen, Guanghui; Hu, Guoqiang

    2017-05-01

    This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.

  8. Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures

    OpenAIRE

    Xing, Xinyu; Dang, Jianxun; Han, Richard; Liu, Xue; Mishra, Shivakant

    2010-01-01

    Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-on-one via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper presents one of the first investigations of the privacy threats found in such video chat systems, identifying three such threats, namely de-anonymization attacks, phishing attacks, and ma...

  9. Destroying of chemical and oil industry, bombing of energy sources and use of depleted uranium ammunition during NATO bombing in FR Yugoslavia

    International Nuclear Information System (INIS)

    Antic, D. P.

    2002-01-01

    During the NATO bombing of the FR Yugoslavia from March 24 to June 10, 1999, according to NATO's data, there were 34 250 takeoffs of the 1200 aircrafts; 367 000 tonnes of kerosine were consumed; there were 400 Tomahawk cruise missiles and 130 air-to-ground missiles. It is estimated that 22 000-79 000 tonnes of explosives were dropped; in addition to 20 000 smart bombs and 5000 conventional bombs of various weight and purposes. The bombing had the characteristics of an ecological war, among other things. During the air strikes A-10 aircrafts fired shells with depleted uranium from 30 mm guns. According to NATO estimates, around 31 000 projectiles were fired (298 g of depleted uranium for each bullet, and more than 10 tonnes of uranium-238 as a contaminating agent), and according to the Yugoslav Army estimated, around 50 000 were fired. Some radiological, chemical and ethical consequences of NATO bombing in FR Yugoslavia are reviewed. (author)

  10. Attack resilience of the evolving scientific collaboration network.

    Directory of Open Access Journals (Sweden)

    Xiao Fan Liu

    Full Text Available Stationary complex networks have been extensively studied in the last ten years. However, many natural systems are known to be continuously evolving at the local ("microscopic" level. Understanding the response to targeted attacks of an evolving network may shed light on both how to design robust systems and finding effective attack strategies. In this paper we study empirically the response to targeted attacks of the scientific collaboration networks. First we show that scientific collaboration network is a complex system which evolves intensively at the local level--fewer than 20% of scientific collaborations last more than one year. Then, we investigate the impact of the sudden death of eminent scientists on the evolution of the collaboration networks of their former collaborators. We observe in particular that the sudden death, which is equivalent to the removal of the center of the egocentric network of the eminent scientist, does not affect the topological evolution of the residual network. Nonetheless, removal of the eminent hub node is exactly the strategy one would adopt for an effective targeted attack on a stationary network. Hence, we use this evolving collaboration network as an experimental model for attack on an evolving complex network. We find that such attacks are ineffectual, and infer that the scientific collaboration network is the trace of knowledge propagation on a larger underlying social network. The redundancy of the underlying structure in fact acts as a protection mechanism against such network attacks.

  11. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  12. A review of colorectal cancer in atomic bomb survivors

    International Nuclear Information System (INIS)

    Nakao, Susumu; Sawai, Terumitsu; Ishii, Toshiyo; Eida, Kazuyuki; Noguchi, Kyoichi; Takahara, Osamu

    1989-01-01

    Clinical and pathological characteristics of patients with colorectal cancer amongst atomic bomb survivors, who had undergone operations from 1971∼1984, have been reviewed and compared with that of a control group. The survival rate of the atomic bomb survivors over the age of 60 years was statistically better than that of the same age group in the controls. In this age bracket, the control group were in a more advanced stage of the disease than were the survivors, this accounting for the reason why the survivors had better prognosis. Further, the fact that the survivors continually have received more medical attention than have the aged in the control group affects this statistic. (author)

  13. Food habits in atomic bomb survivors suffering from malignant neoplasms

    International Nuclear Information System (INIS)

    Morimoto, Kazue; Inoue, Hisako; Uchino, Chito

    1984-01-01

    Food habits were surveyed in patients admitted to 13 hospitals in Nagasaki prefecture and other prefectures to compare the incidence of malignant neoplasms according to the food intake between atomic bomb exposed group and non-exposed group. The incidence of malignant neoplasms was significantly higher in male patients having the low intake of milk and salted fish than in those having the high intake of them in atomic bomb exposed group, while it was significantly higher in male patients having the low intake of potatoes and milk and in female patients having the low intake of boiled fish paste than in those having the high intake of them in non-exposed group. (Namekawa, K.)

  14. Genetic effect of A-bomb radiation- Analysis of minisatellite regions detected by DNA fingerprint probe

    International Nuclear Information System (INIS)

    Kodaira, Mieko

    1999-01-01

    In author's laboratory, screening of mutation in germ cells of A-bomb survivors is under investigation with use of 8 single-locus minisatellite probes and no increase in mutation rate has been detected hitherto. This paper reported results of screening on the minisatellite region, which consisting of short repeated base sequence, using a DNA fingerprint probe for 33.15 core sequence. Subjects were 50 A-bomb survivor families exposed to mean dose of 1.9 Sv (exposed group) or 0 Gy (control), having 64 or 60 children, respectively. DNA was extracted from their B cells established by EB virus and subjected to agarose-gel electrophoresis followed by southern blotting with some improvements for fingerprinting. On the fingerprints, numbers of the band detected in regions of >3.5 kb were 1080 in children of the exposed group (16.9/child) and 1024 (17.1) in the control group, indicating no detectable effect of exposure on the germ cell mutation rate in the region.(K.H.)

  15. The hypothesis of radiation-accelerated aging and the mortality of Japanese A-bomb victims

    International Nuclear Information System (INIS)

    Beebe, G.W.; Land, C.E.; Kato, H.

    1978-01-01

    The hypothesis that ionizing radiation accelerates aging is extremely difficult to investigate in man except at the level of mortality. Among the 82000 Japanese A-bomb survivors being followed for mortality, there were 14400 deaths from non-neoplastic diseases from October 1950 to September 1974, and this experience has been analysed for evidence of a non-specific mortality differential associated with radiation dose (kerma). Cause of death has been classified as follows: neoplastic diseases individually and in various groupings, tuberculosis, cerebrovascular diseases, cardiovascular diseases other than cerebrovascular, diseases of blood and blood-forming organs, diseases of the digestive system, all other non-neoplastic diseases, and all non-neoplastic diseases. Although there is clear evidence of a radiation effect for many forms of cancer, mortality from other diseases contains little suggestion of a relationship to radiation dose. A superficial association between mortality from diseases of blood and blood-forming organs and radiation rests entirely on the carcinogenic effect of radiation, especially the leukaemogenic effect. Deaths from digestive diseases seem related to radiation dose but only in the 1971-74 period and among the Hiroshima survivors; the excess is small but occurred in all age groups. Thus far the mortality experience of the Japanese A-bomb survivors suggests that the life-shortening effect of whole-body human exposure to ionizing radiation derives from its carcinogenic effect, not from any acceleration of the aging process

  16. Autopsy cases of hepatocellular carcinoma in atomic bomb survivors

    International Nuclear Information System (INIS)

    Fujihara, Megumu; Kurihara, Kanji; Aimitsu, Shiomi; Yukaya, Hirofumi; Hamada, Tadao.

    1994-01-01

    Since 1956, 388 autopsy cases of hepatocellular carcinoma (HCC) have been obtained at the Hiroshima Red Cross and A-Bomb Survivors Hospital, which consisted of those of proximately exposed 52 A-bomb survivors (mean age, 63.8 years), 105 distally exposed A-bomb survivors (mean age, 64.2 years), and the other 231 non-exposed patients (mean age, 60.6 years). Since 1985, the incidence of HCC tended to be higher in both proximately and distally exposed groups than the non-exposed group. There was no consistent tendency for the incidence of HCC by ages at autopsy and A-bombing. The incidence of liver cirrhosis was approximately 2 times higher in males than females in the non-exposed group, although no gender difference existed after 1981. In the exposed group, the incidence was similar in male and female groups. Approximately 90% of HCC patients had coexistent liver cirrhosis. Liver cirrhosis was associated with HCC in 50-60%. No significant differences in these incidences were observed between the exposed and non-exposed groups. The proportion of liver cirrhosis associated with HCC became constant in patients over the age of 40 in the non-exposed group. In the exposed group, on the other hand, the proportion reached the peak in those in their fifties and sixties. Survival time tended to be longer in the exposed group than the non-exposed group. The patients in the non-exposed group tended to have histologically atypical type and metastases, as compared with those in the exposed group. (N.K.)

  17. Cancer mortality among atomic bomb survivors exposed as children.

    Science.gov (United States)

    Goto, Hitomi; Watanabe, Tomoyuki; Miyao, Masaru; Fukuda, Hiromi; Sato, Yuzo; Oshida, Yoshiharu

    2012-05-01

    To compare cancer mortality among A-bomb survivors exposed as children with cancer mortality among an unexposed control group (the entire population of Japan, JPCG). The subjects were the Hiroshima and Nagasaki A-bomb survivor groups (0-14 years of age in 1945) reported in life span study report 12 (follow-up years were from 1950 to 1990), and a control group consisting of the JPCG. We estimated the expected number of deaths due to all causes and cancers of various causes among the exposed survivors who died in the follow-up interval, if they had died with the same mortality as the JPCG (0-14 years of age in 1945). We calculated the standardized mortality ratio (SMR) of A-bomb survivors in comparison with the JPCG. SMRs were significantly higher in exposed boys overall for all deaths, all cancers, leukemia, and liver cancer, and for exposed girls overall for all cancers, solid cancers, liver cancer, and breast cancer. In boys, SMRs were significantly higher for all deaths and liver cancer even in those exposed to very low doses, and for all cancers, solid cancers, and liver cancer in those exposed to low doses. In girls, SMRs were significantly higher for liver cancer and uterine cancer in those exposed to low doses, and for leukemia, solid cancers, stomach cancer, and breast cancer in those exposed to high doses. We calculated the SMRs for the A-bomb survivors versus JPCG in childhood and compared them with a true non-exposed group. A notable result was that SMRs in boys exposed to low doses were significantly higher for solid cancer.

  18. Profiles of non-cancer diseases in atomic bomb survivors

    International Nuclear Information System (INIS)

    Kazunori Kodama; Saeko Fujiwara; Michiko Yamada; Fumiyoshi Kasagi; Yukiko Shimizu; Itsuzo Shigematsu

    1996-01-01

    This article summarizes the results of a recent study of atomic bomb radiation and non-cancer diseases in the AHS (Adult Health Study) population by the RERF (Radiation Effects Research Foundation) along with a general discussion of previous studies. Recent studies have demonstrated almost certainly that uterine myoma is more frequent among atomic bomb survivors. It cannot, at present, be concluded that uterine myoma is caused by radiation, because there are no reported studies of other exposed populations. Further analyses including the role of confounding factors as well as molecular approaches are needed to verify this radiation effect. The relationship between atomic bomb radiation exposure and hyperparathyroidism can now be said to have been established in view of the strong dose response, the agreement with results of studies of other populations, the high risk in the younger survivors, and the biological plausibility. Future studies by molecular approaches, etc., are needed to determine the pathogenic mechanism. Among other benign tumours, a dose response has been demonstrated for tumours of the thyroid, stomach and ovary. Although fewer studies have been conducted than for cancer, a clear association between radiation and various benign tumours is emerging. 79 refs, 5 figs, 1 tab

  19. Hyperparathyroidism among atomic bomb survivors in Hiroshima, 1986-88

    International Nuclear Information System (INIS)

    Fujiwara, Saeko; Ezaki, Haruo; Sposto, R.; Akiba, Suminori; Neriishi, Kazuo; Kodama, Kazunori; Hosoda, Yutaka; Shimaoka, Katsutaro; Yoshimitsu, Kengo.

    1990-10-01

    During the two-year period from August 1986 to July 1988, the prevalence of hyperparathyroidism (HPT) was determined among A-bomb survivors and unexposed control subjects in Hiroshima. The diagnosis of HPT was determined biochemically, based upon the presence of consistent hypercalcemia and elevated serum parathyroid hormone levels. Among a population of 4,675 individuals (1,527 males, 3,148 females), primary HPT was diagnosed in 22 (3 males, 19 females). Of these, 8 underwent surgery, of whom 6 had a single parathyroid adenoma and 2 had parathyroid hyperplasia. HPT was more prevalent among the A-bomb survivors who received higher radiation doses (p <.001 for linear trend). The prevalence rates predicted from the model were 0.204% (±0.094%) at 0 Gy and 0.893% (±0.237%) at 1 Gy. The background rate of HPT did not differ significantly by sex or by age at the time of the bombing, although the effect of radiation exposure was greater for individuals exposed at a younger age (p <.01). (author)

  20. Leukemia in Hiroshima atomic bomb survivors from 1946 to 1975

    International Nuclear Information System (INIS)

    Ohkita, Takeshi

    1976-01-01

    In five recent years, 134 deaths from leukemia among Hiroshima citizen were recorded. Of these, 23 cases (17 acute and 6 chronic types) were atomic bomb survivors exposed within 2,000 m of the hypocenter. Fifteen of them (65%) were over 60 years of age. The frequency of chronic lymphocytic leukemia was still low. Although the risk of leukemia was greatly reduced after 1961, and the frequency of chronic granulocytic leukemia (one of the most characteristic type of Hiroshima atomic bomb-induced leukemia) was also decreased, the death rate from leukemia among survivors exposed within 2,000 m or 1,500 m from the hypocenter was about 3 to 4 times higher than the mean death rate in all Japan. Therefore, careful and long-range follow-up surveillance should be continued. A brief review was also made of relevant studies such as the influence of environmental and host factors in the epidemiology of leukemia, the incidence of leukemia in children exposed in utero, and leukemia in offspring of atomic bomb survivors. (Evans, J.)

  1. Patenting the bomb: nuclear weapons, intellectual property, and technological control.

    Science.gov (United States)

    Wellerstein, Alex

    2008-03-01

    During the course of the Manhattan Project, the U.S. government secretly attempted to acquire a monopoly on the patent rights for inventions used in the production of nuclear weapons and nuclear energy. The use of patents as a system of control, while common for more mundane technologies, would seem at first glance to conflict with the regimes of secrecy that have traditionally been associated with nuclear weapons. In explaining the origins and operations of the Manhattan Project patent system, though, this essay argues that the utilization of patents was an ad hoc attempt at legal control of the atomic bomb by Manhattan Project administrators, focused on the monopolistic aspects of the patent system and preexisting patent secrecy legislation. From the present perspective, using patents as a method of control for such weapons seems inadequate, if not unnecessary; but at the time, when the bomb was a new and essentially unregulated technology, patents played an important role in the thinking of project administrators concerned with meaningful postwar control of the bomb.

  2. Smoking behaviour under intense terrorist attacks.

    Science.gov (United States)

    Keinan-Boker, Lital; Kohn, Robert; Billig, Miriam; Levav, Itzhak

    2011-06-01

    Smoking is one of the varied psychological reactions to stress. This study examined the rate and changes in cigarette smoking among former Gaza and current West Bank Jewish settlers subjected to direct and indirect terrorist attacks during the Al-Aksa Intifada. The relationship with degree of religious observance and emotional distress was explored as well. In this cross-sectional study, the respondents were settlers randomly selected and interviewed by telephone (N = 706). The interview schedule included socio-demographic items, information on direct exposure to terrorist attacks (e.g. threat to life or physical integrity, personal losses, property damage) and on steady and changes in smoking habits, and a scale to measure emotional distress. In contrast with the country population, a larger percentage of settlers who smoked increased the number of cigarettes consumed with exposure to terrorism (10 and 27%, respectively). Respondents who were injured or had their home damaged reported a higher rate of smoking during the preceding year (30 and 20%, respectively). Emotional distress was related to cigarette smoking, but not in the controlled analysis. Religious observance had no effect. Direct or indirect exposure to terrorist attacks had an impact on smoking prevalence rates and on changes in smoking habits. Studies investigating reactions to traumatic events should include a detailed section on smoking while mental health interventions should address the needs of smokers.

  3. Relation between both oxidative and metabolic-osmotic cell damages and initial injury severity in bombing casualties

    Directory of Open Access Journals (Sweden)

    Vučeljić Marina

    2006-01-01

    Full Text Available Background/Aim. We have recently reported the development of oxidative cell damages in bombing casualties within a very early period after the initial injury. The aim of this study, was to investigate malondialdehyde (MDA, as an indicator of lipid peroxidation, and osmolal gap (OG, as a good indicator of metabolic cell damages and to assess their relationship with the initial severity of the injury in bombing casualties. Methods. The study included the males (n = 52, injured during the bombing with the Injury Severity Score (ISS ranging from 3 to 66. The whole group of casualties was devided into a group of less severely (ISS < 25, n = 24 and a group of severely (ISS ≥ 26, n = 28 injured males. The uninjured volunteers (n = 10 were the controls. Osmolality, MDA, sodium, glucose, urea, creatinine, total bilirubin and total protein levels were measured in the venous blood, sampled daily, within a ten-day period. Results. In both groups of casualties, MDA and OG levels increased, total protein levels decreased, while other parameters were within the control limits. MDA alterations correlated with ISS (r = 0.414, p < 0.01, while a statistically significant correlation between OG and ISS was not obtained. Interestingly, in spite of some differences in MDA and OG trends, at the end of the examined period they were at the similar level in both groups. Conclusion. The initial oxidative damages of the cellular membrane with intracellular metabolic disorders contributed to the gradual development of metabolic-osmotic damages of cells, which, consequently caused the OG increase. In the bombing casualties, oxidative cell damages were dependent on the initial injury severity, while metabolic-osmotic cell damages were not.

  4. Detection of radiation-induced translocations in A-bomb survivors by fluorescence in situ hybridization (FISH) method

    International Nuclear Information System (INIS)

    Awa, A.A.; Kodama, Y.; Nakano, M.; Ohtaki, K.; Lucas, J.N.; Gray, J.W.

    1992-01-01

    The present paper describes the results of a collaborative study by RERF, LINL and UCSF on an analysis of the utility of fluorescence in situ hybridization (FISH) with whole-chromosome probes (chromosomes 1, 2 and 4) for measurement of the frequencies of chromosomal translocations that have persisted for decades in the peripheral blood lymphocytes of atomic bomb survivors. In this study, attempts have been made to investigate whether the translocation frequencies measured using FISH agree well with the translocation frequencies measured using both G-banding and conventional Giemsa staining analyses, the latter two techniques of which have been accepted as standard cytogenetic procedures. Sample subjects under study include 20 Hiroshima A-bomb survivors, consisting of 2 distally exposed survivors in the 0-Gy group, and 18 proximally exposed survivors with estimated DS86 kerma ranging from 0.5 to 5.0 Gy. Our preliminary results of measurement of translocations using FISH on A-bomb survivors have indicated that the FISH technique is a useful biological assay system for rapid and accurate detection of induced translocations, and thus for quantification of previous acute exposures to ionizing radiation. Translocation analysis using FISH can also be utilized to assess the level of acute radiation exposure independent of time between exposure and cytogenetic analysis. (author)

  5. DNA analysis in perpetrator identification of terrorism-related disaster: suicide bombing of the Australian Embassy in Jakarta 2004.

    Science.gov (United States)

    Sudoyo, Herawati; Widodo, Putut T; Suryadi, Helena; Lie, Yuliana S; Safari, Dodi; Widjajanto, Agung; Kadarmo, D Aji; Hidayat, Soegeng; Marzuki, Sangkot

    2008-06-01

    We report the strategy that we employed to identify the perpetrator of a suicide car bombing in front of the Australian Embassy in Jakarta, Indonesia, on 9 September 2004. The bomb was so massive that only small tissue pieces of the perpetrator could be recovered, preventing conventional approach to the identification of the bomber, necessitating the introduction of DNA analysis as the primary means for perpetrator identification. Crime scene investigation revealed the trajectory of the bomb blast, which was used to guide the collection of charred tissue fragments of the perpetrator. Mitochondrial DNA analysis was first conducted on 17 tissue fragments, recovered over large areas of the trajectory to, (a) confirm that they are of a common source, i.e. the perpetrator, and thus (b) establish the mtDNA HV1 sequence profile of the perpetrator. The mtDNA of the perpetrator matches that of a maternally related family member of one of four suspects. Standard autosomal STR analysis confirmed the identification. This case is of interest as an illustration of a successful application of DNA analysis as the primary means of disaster perpetrator identification.

  6. CD14 and IL18 gene polymorphisms associated with colorectal cancer subsite risks among atomic bomb survivors.

    Science.gov (United States)

    Hu, Yiqun; Yoshida, Kengo; Cologne, John B; Maki, Mayumi; Morishita, Yukari; Sasaki, Keiko; Hayashi, Ikue; Ohishi, Waka; Hida, Ayumi; Kyoizumi, Seishi; Kusunoki, Yoichiro; Tokunaga, Katsushi; Nakachi, Kei; Hayashi, Tomonori

    2015-01-01

    Colorectal cancer (CRC) is a common malignancy worldwide, and chronic inflammation is a risk factor for CRC. In this study, we carried out a cohort study among the Japanese atomic bomb (A-bomb) survivor population to investigate any association between immune- and inflammation-related gene polymorphisms and CRC. We examined the effects of six single-nucleotide polymorphisms of CD14 and IL18 on relative risks (RRs) of CRC. Results showed that RRs of CRC, overall and by anatomic subsite, significantly increased with increasing radiation dose. The CD14-911A/A genotype showed statistically significant higher risks for all CRC and distal CRC compared with the other two genotypes. In addition, the IL18-137 G/G genotype showed statistically significant higher risks for proximal colon cancer compared with the other two genotypes. In phenotype-genotype analyses, the CD14-911A/A genotype presented significantly higher levels of membrane and soluble CD14 compared with the other two genotypes, and the IL18-137 G/G genotype tended to be lower levels of plasma interleukin (IL)-18 compared with the other two genotypes. These results suggest the potential involvement of a CD14-mediated inflammatory response in the development of distal CRC and an IL18-mediated inflammatory response in the development of proximal colon cancer among A-bomb survivors.

  7. Colorectal cancer among atomic bomb survivors in Hiroshima and Nagasaki, 1950-80

    International Nuclear Information System (INIS)

    Nakatsuka, Hirofumi; Yamamoto, Tsutomu; Shimizu, Yukiko

    1984-01-01

    Of 108,739 atomic-bomb (A-bomb) victims enrolled in the population of life span survey by Radiation Effects Research Foundation, 730 victims from October 1950 to December 1980 were selected as subjects of colorectal cancer based on death certificates, autopsy and operative findings, and clinicopathological reconfirmation of colorectal cancer. Tentative dose decided in 1965 (T65D) was used to estimate radiation doses of A-bomb victims. Although the incidence of colon cancer was found to be related to radiation, the relation of the incidence of rectal cancer to radiation was not confirmed. Radiation effects were dependent on the age of A-bomb victims at the time of the bombing, which was noted in A-bomb victims aged less than twenty years at that time. Dose-response relationship was found in cases of cancer of the sigmoid colon. Histological types of cancer were independent of radiation doses. (Namekawa, K.)

  8. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  9. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    Science.gov (United States)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  10. Leukemia, malignant lymphoma and multiple myeloma in atomic bomb survivors treated in this hospital lately

    International Nuclear Information System (INIS)

    Niimi, Masanobu; Orimen, Akio; Ota, Takanori; Aisaka, Tadakazu

    1976-01-01

    This paper describes atomic bomb survivors with leukemia and various leukemia like diseases in Hiroshima City Funairi Hospital. The patients who had been exposed near the bombed area (1 - 3.4 km) consisted of 3 with leukemia, 4 with malignant lymphoma and 2 with multiple myeloma. These diseases seems to tend to be still increased now in the survivors exposed near the bombed area. (Serizawa, K.)

  11. Quantum cloning attacks against PUF-based quantum authentication systems

    Science.gov (United States)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-08-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  12. Fault Attacks on the Authenticated Encryption Stream Cipher MORUS

    Directory of Open Access Journals (Sweden)

    Iftekhar Salam

    2018-01-01

    Full Text Available This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the integrity component. For the fault attack on the confidentiality component of MORUS, we propose two different types of key recovery. The first type is a partial key recovery using a permanent fault model, except for one of the variants of MORUS where the full key is recovered with this model. The second type is a full key recovery using a transient fault model, at the cost of a higher number of faults compared to the permanent fault model. Finally, we describe a fault attack on the integrity component of MORUS, which performs a forgery using the bit-flipping fault model.

  13. Countermeasures Against Blinding Attack on Superconducting Nanowire Detectors for QKD

    Directory of Open Access Journals (Sweden)

    Elezov M.S.

    2015-01-01

    Full Text Available Nowadays, the superconducting single-photon detectors (SSPDs are used in Quantum Key Distribution (QKD instead of single-photon avalanche photodiodes. Recently bright-light control of the SSPD has been demonstrated. This attack employed a “backdoor” in the detector biasing technique. We developed the autoreset system which returns the SSPD to superconducting state when it is latched. We investigate latched state of the SSPD and define limit conditions for effective blinding attack. Peculiarity of the blinding attack is a long nonsingle photon response of the SSPD. It is much longer than usual single photon response. Besides, we need follow up response duration of the SSPD. These countermeasures allow us to prevent blind attack on SSPDs for Quantum Key Distribution.

  14. An unusual case of predation: dog pack or cougar attack?

    Science.gov (United States)

    Fonseca, Gabriel M; Palacios, Rocío

    2013-01-01

    Injuries produced by animals are capable of leaving severe patterns and in some cases may result in the death of the attacked individual. Law enforcement authorities may come to erroneous conclusions about the source of the bites based on their awareness of animals present and similarities of the injuries to the untrained eye, with dreadful consequences. Expertise of a carnivore biologist and an odontologist that indentifies the particularities of bite marks may be useful for identifying the attacking species. We present the investigation of a fatal dog pack attack involving a 43-year-old man in Bell Ville (Argentina) where the evidence provided by a forensic dentist and a biologist was categorical for establishing the animal species involved. Because of the unusual characteristics of the wounds and the initial hypothesis made by local authorities of a cougar attack, habits and specific patterns of both dog pack and cougar predation on humans are discussed. © 2012 American Academy of Forensic Sciences.

  15. Research on Semi-automatic Bomb Fetching for an EOD Robot

    Directory of Open Access Journals (Sweden)

    Qian Jun

    2008-11-01

    Full Text Available An EOD robot system, SUPER-PLUS, which has a novel semi-automatic bomb fetching function is presented in this paper. With limited support of human, SUPER-PLUS scans the cluttered environment with a wrist-mounted laser distance sensor and plans the manipulator a collision free path to fetch the bomb. The model construction of manipulator, bomb and environment, C-space map, path planning and the operation procedure are introduced in detail. The semi-automatic bomb fetching function has greatly improved the operation performance of EOD robot.

  16. Research on Semi-Automatic Bomb Fetching for an EOD Robot

    Directory of Open Access Journals (Sweden)

    Zeng Jian-Jun

    2007-06-01

    Full Text Available An EOD robot system, SUPER-PLUS, which has a novel semi-automatic bomb fetching function is presented in this paper. With limited support of human, SUPER-PLUS scans the cluttered environment with a wrist-mounted laser distance sensor and plans the manipulator a collision free path to fetch the bomb. The model construction of manipulator, bomb and environment, C-space map, path planning and the operation procedure are introduced in detail. The semi-automatic bomb fetching function has greatly improved the operation performance of EOD robot.

  17. The cetene scale and the induction period preceding the spontaneous ignition of diesel fuels in bombs

    Science.gov (United States)

    Michailova, M N; Neumann, M B

    1936-01-01

    In the present report a comparison is made between the scale obtained with mixtures of cetane and l-methyl naphthalene in a bomb, and that obtained with the same fuels in a Waukesha engine. The tests were conducted in a metal bomb heated by a Nichrome spiral. The fuel was injected into the bomb from a Bosch jet by means of a specially constructed plunger pump. The instant injection and the pressure curve in the bomb were registered by a beam of light which was reflected from a mirror connected to the needle of the jet and to a membrane indicator.

  18. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  19. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  20. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  1. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  2. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available taxonomy and ontology RP van Heerden1,2, B Irwin2, ID Burke1, L Leenen1 1CSIR, Pretoria, South Africa 2Rhodes University, Grahamstown, South Africa Keywords/ Key Phrases: Network Attack, Network Attack Classification, Taxonomy, Ontology, Attack... Scenario rvheerden@csir.co.za b.irwin@ru.ac.za iburke@csir.co.za lleenen@csir.co.za Abstract: Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has a...

  3. 360° FILM BRINGS BOMBED CHURCH TO LIFE

    Directory of Open Access Journals (Sweden)

    K. Kwiatek

    2012-09-01

    Full Text Available This paper explores how a computer-generated reconstruction of a church can be adapted to create a panoramic film that is presented in a panoramic viewer and also on a wrap-around projection system. It focuses on the fundamental principles of creating 360º films, not only in 3D modelling software, but also presents how to record 360º video using panoramic cameras inside the heritage site. These issues are explored in a case study of Charles Church in Plymouth, UK that was bombed in 1941 and has never been rebuilt. The generation of a 3D model of the bombed church started from the creation of five spherical panoramas and through the use of Autodesk ImageModeler software. The processed files were imported and merged together in Autodesk 3ds Max where a visualisation of the ruin was produced. A number of historical images were found and this collection enabled the process of a virtual reconstruction of the site. The aspect of merging two still or two video panoramas (one from 3D modelling software, the other one recorded on the site from the same locations or with the same trajectories is also discussed. The prototype of 360º non-linear film tells a narrative of a wartime wedding that occurred in this church. The film was presented on two 360º screens where members of the audience could make decisions on whether to continue the ceremony or whether to run away when the bombing of the church starts. 3D modelling software made this possible to render a number of different alternati ves (360º images and 360º video. Immersive environments empower the visitor to imagine the building before it was destroyed.

  4. 360° Film Brings Bombed Church to Life

    Science.gov (United States)

    Kwiatek, K.

    2011-09-01

    This paper explores how a computer-generated reconstruction of a church can be adapted to create a panoramic film that is presented in a panoramic viewer and also on a wrap-around projection system. It focuses on the fundamental principles of creating 360º films, not only in 3D modelling software, but also presents how to record 360º video using panoramic cameras inside the heritage site. These issues are explored in a case study of Charles Church in Plymouth, UK that was bombed in 1941 and has never been rebuilt. The generation of a 3D model of the bombed church started from the creation of five spherical panoramas and through the use of Autodesk ImageModeler software. The processed files were imported and merged together in Autodesk 3ds Max where a visualisation of the ruin was produced. A number of historical images were found and this collection enabled the process of a virtual reconstruction of the site. The aspect of merging two still or two video panoramas (one from 3D modelling software, the other one recorded on the site) from the same locations or with the same trajectories is also discussed. The prototype of 360º non-linear film tells a narrative of a wartime wedding that occurred in this church. The film was presented on two 360º screens where members of the audience could make decisions on whether to continue the ceremony or whether to run away when the bombing of the church starts. 3D modelling software made this possible to render a number of different alternati ves (360º images and 360º video). Immersive environments empower the visitor to imagine the building before it was destroyed.

  5. Two cases of giant parathyroid adenoma in atomic bomb survivors

    International Nuclear Information System (INIS)

    Takeichi, Nobuo; Nishida, Toshihiro; Fujikura, Toshio

    1983-12-01

    In a study of parathyroid tumor among autopsy cases at RERF in Hiroshima, 16 cases of parathyroid adenoma were detected among 4,136 autopsies during 1961-77. Of these, two cases were giant adenoma (5 cm in diameter) accompanied by hyperparathyroidism. Both cases were atomic bomb survivors from Hiroshima. One was exposed to 55 rad at age 51 and died at age 71, and the other was exposed to 28 rad at age 45 and died at age 71. These two cases will be reported together with a review of the literature on parathyroid tumors developed following irradiation on the head and neck. (author)

  6. The Manhattan Project: Making the Atomic Bomb. 2010 edition.

    Energy Technology Data Exchange (ETDEWEB)

    Gosling, F. G.

    2010-01-15

    This historical document is part of a planned 3-volume series. This volume, volume 1, provides a short history of the origins and development of the American atomic bomb program during World War II. Beginning with the scientific developments of the pre-war years, the monograph details the role of the United States government in conducting a secret, nationwide enterprise that took science from the laboratory and into combat with an entirely new type of weapon. The monograph concludes with a discussion of the immediate postwar period, the debate over the Atomic Energy Act of 1946, and the founding of the Atomic Energy Commission.

  7. Some thoughts on Hiroshima: 50 years after the bomb

    International Nuclear Information System (INIS)

    Kato, Shuichi

    1997-01-01

    Commemorating the fiftieth anniversary of Hiroshima, this paper covers three issues: Personal experience, concluding that the bomb was an extraordinary cruel weapon beyond imagination, Japanese experience, i.e. Japanese attitude against nuclear weapons and the actions to be undertaken in order to achieve nuclear-weapon-free world. The support of Non-proliferation Treaty, as well as the support of the protest against any kind of nuclear weapon experiments should be related to the understanding of the cause of the events against which one is protesting. The radical therapy would be the removal of the cause, i.e. the striking discrepancy of nuclear armaments

  8. Review of dosimetry for the atomic bomb survivors

    International Nuclear Information System (INIS)

    Kerr, G.D.

    1981-01-01

    This paper summarizes and discusses results of some 1980-1981 studies of neutron and γ-ray exposure to the atomic bomb survivors by W.E. Loewe and E. Mendelsohn of the Lawrence Livermore National Laboratory, D.C. Kaul and W.H. Scott of Science Applications, Inc., and J.V. Pace of the Oak Ridge National Laboratory. Some other special studies which are now underway to complete the review will also be discussed. The expert assistance of others in these special studies is being supported in part by the US Department of Energy and in part by the US Defense Nuclear Agency

  9. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  10. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  11. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  12. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Heart-Health Basics Reducing your risk starts with smart choices. If you smoke, stop. The American Heart ... a Second Heart Attack | Spanish Cardiac Rehab Referral Card | Spanish Heart Attack Warning Signs: Patient sheet | Infographic | ...

  13. Can Vitamins Help Prevent a Heart Attack?

    Science.gov (United States)

    ... vitamins help prevent a heart attack? Can taking vitamins help prevent heart disease or a heart attack? Answers ... M.D. It's not yet clear if taking vitamins can reduce your risk of developing heart disease ...

  14. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  15. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on

  16. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  17. 14C dating with the bomb peak: An application to forensic medicine

    International Nuclear Information System (INIS)

    Wild, E.M.; Arlamovsky, K.A.; Golser, R.; Kutschera, W.; Priller, A.; Puchegger, S.; Rom, W.; Steier, P.; Vycudilik, W.

    2000-01-01

    Samples originating from the time period after 1950 can be radiocarbon dated utilising the 14 C bomb peak as a calibration curve. The applicability of 'radiocarbon dating' of recent organic human material for the determination of the time of death of humans was tested. The radiocarbon results from hair and lipid samples from individuals with known date of death were compared with the results from two individuals with unknown time of death. An estimate of the year of death for the unknowns could be derived by this way. Due to the long turnover time of collagen in human bones it is not possible to use the radiocarbon content of bone collagen for a reliable estimate. In order to study the time dependence of the collagen turnover we tested 'soft' chemical methods for the isolation of collagen from the bone matrix. First radiocarbon results of this investigation are presented

  18. Persisting injuries in immune system and their effects on health in a-bomb survivors

    International Nuclear Information System (INIS)

    Kusunoki, Yoichiro; Hayashi, Tomonori; Kyoizumi, Seishi

    2000-01-01

    This review describes findings concerning persisting effects of A-bomb radiation on immune cells and their relation to diseases. Injuries in immune system are mainly the depression of cellular immunity mediated by T-lymphocytes, especially CD4 T-cells, and the elevation of humoral immunity by B-cells. These are conceivably the imbalance results in immune system of incomplete recovery of those T-cells after exposure and thymus retraction by aging and of consequently affecting the functional differentiation of CD4 T-cells to lower the cellular immunity and to elevate the humoral immunity. Lowered cellular immunity in the survivors can be related to their liver and cardiovascular diseases caused by infection and cancer caused by tumor antigens and oncoviruses. Thus immunological investigations of the survivors are revealing not only the effect of radiation on the immune system but also the correlation between immunity and diseases. (K.H.)

  19. Estimation of inhalation radiation doses associated with a strontium-90 dirty bomb event

    International Nuclear Information System (INIS)

    Reshetin, V.P.

    2006-01-01

    The initial stage of dispersion of 90 Sr radiological dispersion device (dirty bomb) in a terrorist event was investigated on the basis of a numerical solution of the full system of Navier-Stokes equations. Maximum inhalation doses at the level of ≥1, ≥5, ≥10, ≥50 mSv are used as evaluative criteria to assess probable consequences. The intentional release of a relatively small amount of 90 Sr using a conventional explosive has the potential to cause internal exposure to beta-radiation with relatively high maximum inhalation doses achieving hundreds of mSv, but the spatial extent of the area within which high exposures might occur is very small with most of the population receiving maximum inhalation doses between 1-10 mSv. The extent of radiation contamination (area and activity) is dependent on 90 Sr particle size, the height of release, and local weather conditions

  20. Network Attack Reference Data Set

    Science.gov (United States)

    2004-12-01

    fingerprinting tools include QueSO [10] (literally translates to “what OS”) and nmap [11], however there are a number of additional tools available for...Network Attack Reference Data Set J. McKenna and J. Treurniet Defence R&D Canada √ Ottawa TECHNICAL...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources

  1. Biometrics Evaluation under Spoofing Attacks

    OpenAIRE

    Chingovska, Ivana; Anjos, André; Marcel, Sébastien

    2014-01-01

    While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, resulting in efficient counter-measures for many biometric modes. However, an important, but often overlooked issue regards their engagement into a verification task and how to measure their impact on the verification systems themselves. A novel evalu...

  2. Education, Income, and Support for Suicide Bombings: Evidence from Six Muslim Countries

    Science.gov (United States)

    Shafiq, M. Najeeb; Sinno, Abdulkader H.

    2010-01-01

    The authors examine the effect of educational attainment and income on support for suicide bombing among Muslim publics in six predominantly Muslim countries that have experienced suicide bombings: Indonesia, Jordan, Lebanon, Morocco, Pakistan, and Turkey. The authors make two contributions. First, they present a conceptual model, which has been…

  3. Mental health conditions in Korean atomic bomb survivors. A survey in Seoul

    International Nuclear Information System (INIS)

    Koshimoto, Rika; Nakane, Hideyuki; Kim, Hyen

    2011-01-01

    More than 60 years have elapsed since the atomic bombings to Hiroshima and Nagasaki, and since all of the atomic bomb survivors have become old, the importance of caring their mental health has become increasing in Japan. Although approximately 70% of overseas atomic bomb are living in Korea, there have been quite few studies on their mental health. The objectives of the present study were to elucidate whether the mental health conditions of atomic bomb survivor in Korea are similar to those in Japan. The subjects were 181 Korean atomic bomb survivors living in Korea (cases) and 209 outpatients of a hospital in Seoul who were not exposed to atomic bombs (controls). Interviewers administered them at the hospital a questionnaire with Impact of Event Scale-Revised, General Health Questionnaire 12 (GHQ-12), Korean version of short form Geriatric Depression Scale and the K scale of the Minnesota Multiphasic Personality Inventory. Excluding subjects with incomplete responses we analyzed 162 cases and 189 controls. The proportion of subjects with high score of GHQ-12 (≥4) was significantly higher in cases (78/162 or 48.1%) than in controls (42/189 or 22.2%) (p<0.0001, Fisher's exact test). The present results, though preliminary, indicate that atomic bomb survivors in Korea have also mental health problems similar to those observed in Japanese atomic bomb survivors, indicating the necessity of a larger study. (author)

  4. The finish. About the reasons and events leading to the nuclear bombing of Hiroshima and Nagasaki

    International Nuclear Information System (INIS)

    Goldberg, S.

    1995-01-01

    The bombing was decided not only for military reasons. For the Manhattan Project managers, and for General Groves in particular, it was a question of justification of their own work and commitment. The bomb may have actually prolonged the war. (orig.) [de

  5. One minute after the detonation of the atomic bomb: the erased effects of residual radiation.

    Science.gov (United States)

    Takahashi, Hiroko

    2009-01-01

    The U.S. Government's official narrative denies the effects of residual radiation which appeared one minute after the atomic bomb detonations in Hiroshima and Nagasaki. This paper explores declassified documents from the U.S. Atomic Energy Commission, the Atomic Bomb Casualties Commission, and others and shows that these documents actually suggested the existence of serious effects from residual radiation.

  6. Water-Triggered Luminescent "Nano-bombs" Based on Supra-(Carbon Nanodots)

    NARCIS (Netherlands)

    Lou, Q.; Qu, S.; Jing, P.; Ji, W.; Li, D.; Cao, J.; Zhang, H.; Liu, L.; Zhao, J.; Shen, D.

    2015-01-01

    Novel luminescent "nano-bombs" based on a self-assembled system of carbon-nanodots, termed supra-CDs, are developed. The luminescence of these luminescent "nano-bombs" depends strongly on water contact; they show weak emission in toluene and decompose in contact with water, resulting in strong

  7. Diagnosis and treatment of leukemia recognized in atomic-bomb survivors

    International Nuclear Information System (INIS)

    Ichimaru, Michito

    1978-01-01

    Out of atomic bomb survivors in Hiroshima and Nagasaki, 256 patients which were diagnosed as having leukemia by 1975 and of which exposure dose was estimated as over 1 rad were described. Chronic myelocytic leukemia (CGL) was plentiful in Hiroshima, and acute myelocytic leukemia (AGL) was comparatively plentiful in Nagasaki. Chronic lymphatic leukemia (CLL) was not recognized in the atomic bomb survivors exposed at places near the center of the explosion, but CLL was recognized plentifully in the atomic bomb survivors exposed to radiation of under 1 rad. The incidence of leukemia according to the total dose was higher in Hiroshima than in Nagasaki. When RBE of neutron on the occurrence of leukemia was considered to be five times that of gamma-ray, the occurrence curves in both cities were consistent well. As to a relationship between leukemia in the atomic bomb survivors and the age at the exposure time, CGL occurred early in the atomic bomb survivors exposed at an early age. A specific lesion of leukemia in the atomic bomb survivors was not recognized, but cases of which leukemia cells were negative to peroxidase and were very difficult to be identified were plentiful in the atomic bomb survivors exposed within 2 km from the explosion center. The treatment of leukemia in atomic bomb survivors does not differ from that of general leukemia, but a method of treatment, administration dosage, a method and a kind of supportive care must be discussed according to each case. (Serizawa, K.)

  8. Survey of Sybil Attacks in Social Networks

    OpenAIRE

    Gunturu, Rupesh

    2015-01-01

    This paper reviews the Sybil attack in social networks, which has the potential to compromise the whole distributed network. In the Sybil attack, the malicious user claims multiple identities to compromise the network. Sybil attacks can be used to change the overall ranking in voting applications, bad-mouth an opinion, access resources or to break the trust mechanism behind a P2P network. In this paper, different defense mechanisms used to mitigate Sybil attacks are also reviewed.

  9. Intact blood-brain barrier during spontaneous attacks of migraine without aura

    DEFF Research Database (Denmark)

    Amin, F M; Hougaard, A; Cramer, S P

    2017-01-01

    , brain stem, posterior pons and whole brain. The paired samples t test was used to compare Ki (permeability) values between the attack and headache-free days. RESULTS: Nineteen patients completed the study. Median time from onset of migraine attack to scan was 6.5 h (range 4.0-15.5 h). No change......BACKGROUND AND PURPOSE: The integrity of the blood-brain barrier (BBB) has been questioned in migraine, but BBB permeability has never been investigated during spontaneous migraine attacks. In the present study, BBB permeability during spontaneous attacks of migraine without aura was investigated...

  10. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  11. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  12. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  13. The Value of Attack-Defence Diagrams

    NARCIS (Netherlands)

    Hermanns, H.; Krämer, Julia; Krčál, Jan; Stoelinga, Mariëlle Ida Antoinette; Piessens, Frank; Viganò, Luca

    Success or failure of attacks on high-security systems, such as hacker attacks on sensitive data, depend on various situational conditions, including the timing and success chances of single attack steps, and concurrent countermeasures of the defender. With the existing state-of-the-art modelling

  14. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  15. Game of thrown bombs in 3D: using high speed cameras and photogrammetry techniques to reconstruct bomb trajectories at Stromboli (Italy)

    Science.gov (United States)

    Gaudin, D.; Taddeucci, J.; Scarlato, P.; Del Bello, E.; Houghton, B. F.; Orr, T. R.; Andronico, D.; Kueppers, U.

    2015-12-01

    Large juvenile bombs and lithic clasts, produced and ejected during explosive volcanic eruptions, follow ballistic trajectories. Of particular interest are: 1) the determination of ejection velocity and launch angle, which give insights into shallow conduit conditions and geometry; 2) particle trajectories, with an eye on trajectory evolution caused by collisions between bombs, as well as the interaction between bombs and ash/gas plumes; and 3) the computation of the final emplacement of bomb-sized clasts, which is important for hazard assessment and risk management. Ground-based imagery from a single camera only allows the reconstruction of bomb trajectories in a plan perpendicular to the line of sight, which may lead to underestimation of bomb velocities and does not allow the directionality of the ejections to be studied. To overcome this limitation, we adapted photogrammetry techniques to reconstruct 3D bomb trajectories from two or three synchronized high-speed video cameras. In particular, we modified existing algorithms to consider the errors that may arise from the very high velocity of the particles and the impossibility of measuring tie points close to the scene. Our method was tested during two field campaigns at Stromboli. In 2014, two high-speed cameras with a 500 Hz frame rate and a ~2 cm resolution were set up ~350m from the crater, 10° apart and synchronized. The experiment was repeated with similar parameters in 2015, but using three high-speed cameras in order to significantly reduce uncertainties and allow their estimation. Trajectory analyses for tens of bombs at various times allowed for the identification of shifts in the mean directivity and dispersal angle of the jets during the explosions. These time evolutions are also visible on the permanent video-camera monitoring system, demonstrating the applicability of our method to all kinds of explosive volcanoes.

  16. The articles on atomic bomb of the newspaper in the past 15 years

    International Nuclear Information System (INIS)

    Ubuki, Satoru; Hayakawa, Norihiko; Matsuura, Masaaki; Hatano, Hiroko

    1990-01-01

    A-bomb hazards are given publicity by journalism every year from the end of the 1960s, especially in July and August, in Japan. This is generally termed 'the publication of A-bomb articles'. This paper outlines 'the publication of A-bomb articles' and introduces the actual conditions of A-bomb hazard problems. Articles were selected from three major national newspapers and two domestic newspapers (Hiroshima and Nagasaki) during the past 15 years from 1975 through 1989. Contents of the articles were divided into 20 categories and subdivided into 92 categories. According to newspaper, the Hiroshima domestic newspaper published the articles in the largest number (approximately 30% of all the articles). Overall, approximately 21% of the articles were published in August. The most common article content was A-bomb survivors' experiences, accounting for 47% before 1981 and 60% since 1982. (N.K.)

  17. Review of diagnosis and classification of leukemias that occurred in A-bomb survivors (preliminary report)

    International Nuclear Information System (INIS)

    Matsuo, Tatsuki; Tomonaga, Masao; Ichimaru, Michito; Kamata, Nanao; Kuramoto, Atsushi.

    1984-01-01

    According to the current knowledge of diagnosis and classification, a review of 157 patients who had developed leukemia before June 30, 1967 was made. The total number of acute leukemia slightly decreased among A-bomb survivors in Hiroshima; however, the number of acute lymphatic leukemia (ALL) increased. The number of chronic myeloid leukemia (CML) was unchanged. The frequency of CML implied that A-bombing damaged stem cells in a high incidence. Among A-bomb survivors in Nagasaki, although the number of acute non-lymphatic leukemia decreased, the number of ALL was unchanged. Adult T-cell leukemia (ATL) was diagnosed in 7 A-bomb survivors, confirming that Nagasaki is an endemic area for ATL. These preliminary results seem to be of importance in elucidating the mechanism of leukemia developiong among A-bomb survivors. (Namekawa, K.)

  18. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  19. Sweden and the bomb. The Swedish plans to acquire nuclear weapons, 1945 - 1972

    Energy Technology Data Exchange (ETDEWEB)

    Jonter, T [Uppsala Univ. (Sweden). Dept. of History

    2001-09-01

    This study analyses the Swedish nuclear weapons research since 1945 carried out by the Swedish National Defence Research Establishment (FOA). The most important aspect of this research was dealing with protection in broad terms against nuclear weapons attacks. However, another aspect was also important from early on - to conduct research aiming at a possible production of nuclear weapons. FOA performed an extended research up to 1968, when the Swedish government signed the Non-Proliferation Treaty (NPT), which meant the end of these production plans. Up to this date, five main investigations about the technical conditions were made, 1948, 1953, 1955, 1957 and 1965, which all together expanded the Swedish know-how to produce a bomb. The Swedish plans to procure nuclear weapons were not an issue in the debate until the mid-50's. The reason for this was simple, prior to 1954 the plans were secretly held within a small group of involved politicians, military and researchers. The change of this procedure did take place when the Swedish Supreme Commander in a public defence report in 1954 favoured a Swedish Nuclear weapons option. In 1958 FOA had reached a technical level that allowed the parliament to make a decision. Two programs were proposed - the L-programme (the Loading Programme), to be used if the parliament would say yes to a production of nuclear weapons, and the S-programme (the Protection Programme), if the parliament would say no. The debate on the issue had now created problems for the Social Democratic Government. The prime minister, Tage Erlander, who had earlier defended a procurement of nuclear weapons, was now forced to reach a compromise. The compromise was presented to the parliament in a creative manner that meant that only the S-programme would be allowed. The government argued that the technical level did allow a 'freedom of action' up to at least the beginning of the 60's when Sweden was mature to make a decision on the issue

  20. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    Racana, R.; Terrado, C.

    2006-01-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  1. Cancer incidence and mortality rate in children of A-bomb survivors

    International Nuclear Information System (INIS)

    Yoshimoto, Yasuhiko

    1992-01-01

    The purpose of this paper is to summarize the previous findings of carcinogenesis and mortality rate in children born to A-bomb survivors. The Radiation Effects Research Foundation has collected 72,228 children born to A-bomb survivors from May 1946 through 1984. Of their parents, 31,159 parents had been exposed to significant doses (≥0.01 Sv), with a mean genital dose of 0.435 Sv. Among a hypothetic population of 100,000 children of A-bomb survivors exposed to an mean genital dose of 0.4 SV, radiation-induced diseases were considered to occur in only 250 children or less. An earlier large-scale survey during the period 1948-1956 has revealed an evidence of significant increase in stillborn, congenital malformation, and infantile death. In the 1946-1982 survey concerning carcinogenesis in 72,216 children of A-bomb survivors, cancer was found to be detected in 92 children, with no statistically significant increase in cancer risk with increasing radiation doses in their parents. The survey on mortality rate in 67,586 children of A-bomb survivors has revealed no evidence of significant increase in mortality rate from diseases, other than cancer, and in the incidence of lethal cancer. For A-bomb survivors, genetic doubling doses were considered to be 1 Sv or more. Further, when genetic doubling doses are calculated, the contribution rate of genital cell disturbance should be considered in the incidence of spontaneously induced disease. There is no supportive evidence of genetic effects of A-bomb radiation in children of A-bomb survivors; however, genetic effects of A-bomb radiation cannot be denied completely. Continuing survey is expected to be done for children of A-bomb survivors. (N.K.)

  2. Mortality rate and cancer incidence among in uterus exposed A-bomb survivors

    International Nuclear Information System (INIS)

    Yoshimoto, Yasuhiko

    1992-01-01

    This paper summarises the outcome of follow-up surveys on mortality rate and cancer incidence among in uterus exposed A-bomb survivors. The subjects were 1791 A-bomb survivors, and 1534 (85.7%) of these came from Hiroshima. According to uterus absorption doses, these A-bomb survivors could be divided into the 0 Gy exposed group (n=772) and the ≥0.01 Gy (a mean, 0.302 Gy) exposed group (n=1019). The number of proximally exposed A-bomb survivors (2,000 m or less) was approximately 3 times larger in Hiroshima than in Nagasaki, probably due to various socioeconomical factors. When the mortality rate was examined according to uterus absorption doses, it was higher at infancy and at the age of 15-39 in the ≥0.60 Gy exposed group than the 0 Gy exposed group. For infants, it was 3 times higher in the ≥0.60 Gy exposed group than the 0 Gy exposed group. The 1950-1984 survey on cancer incidence among in uterus exposed A-bomb survivors have revealed that cancer incidence tended to increase among in uterus exposed A-bomb survivors with increasing uterus absorption doses in their mothers. Since A-bomb survivors aged 15 years or younger at the time of A-bombing are characterized by developing leukemia 5-10 years after A-bombing, leukemia is unlikely to be increased among in uterus exposed A-bomb survivors. (N.K.)

  3. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  4. Proliferative and nonproliferative breast disease in atomic-bomb survivors

    International Nuclear Information System (INIS)

    Tokunaga, Masayoshi; Land, C.E.; Aoki, Yoichiro; Yamamoto, Tsutomu; Asano, Masahide; Sato, Eiichi; Tokuoka, Shoji; Sakamoto, Goi; Page, D.L.

    1993-10-01

    The risk of female breast cancer in association with radiation exposure is well established, on the basis of follow-up studies of the atomic-bomb survivors and other exposed populations. This association is especially strong for women exposed before age 20 yr and appears to be much weaker among women exposed after age 40 yr. In this study, breast-tissue autopsy samples from high-dose and low-dose individuals in the Radiation Effects Research Foundation Life Span Study sample were examined in detail to determine whether nonproliferative or proliferative breast lesions are associated with radiation exposure. The results suggest that proliferative disease in general and atypical hyperplasia in particular are associated with radiation exposure and that the risk is strongest for subjects who were ages 40-49 yr at the time of the bombings. It is hypothesized that this finding may be related to the age dependence of radiation-induced breast cancer, in the sense that potential cancers reflecting early-stage changes induced at these ages by radiation exposure may receive too little hormonal promotion to progress to frank cancers. (author)

  5. Axial length of atomic bomb survivors in Nagasaki

    International Nuclear Information System (INIS)

    Wakiyama, Harumi; Kishikawa, Yasuhiro; Imamura, Naoki; Amemiya, Tsugio

    2002-01-01

    We reviewed a series of 778 patients who had cataract surgery during the past 4 years at the Nagasaki Atomic Bomb Memorial Hospital. We evaluated the history of exposure to radiation by atomic bomb in 1945, axial length and state of refraction. All were born before 1945. The series comprised 263 males and 515 females. Their ages averaged 76.5±8.6 years. History of exposure to radiation was present in 356 patients. The remaining 422 patients served as control. There was no difference in the type of cataract between the two groups. High myopia was present in 11 irradiated patients (3.2%) and in 24 patients in the control group (6.0%). The difference was not significant (p=0.083). There was no high myopia among 24 patients who were aged 18 years or less at the time of radiation and who were within 2 km from the epicenter. No difference was present regarding the axial length between the two groups or between both sexes. The present result is not definitive because ''irradiated group'' would include those with little or no exposure and because precise data has not been available about the dosis of radiation. (author)

  6. The significance of chromosome deletions in atomic-bomb survivors

    International Nuclear Information System (INIS)

    Tanaka, Kimio; Shigeta, Chiharu; Oguma, Nobuo; Kamada, Nanao; Deng, Z.; Niimi, Masanobu; Aisaka, Tadaichi.

    1986-01-01

    In 39 A-bomb survivors 40 years after exposure at ≤ 1,000 m from ground zero, the frequency and features of chromosome deletions in peripheral lymphocytes were examined using a differential staining technique. Simultaneously, in vitro irradiation experiment with Cf-252 was made to infer chromosome aberrations occuring immediately after exposure. Californium-252 with 100 rad induced dicentric and ring chromosomes in 40 % of the cells and acentric fragments in 44 %. Among the A-bomb survivors, chromosome aberrations were observed in 651 (21 %) of the total 3,136 cells. There were 146 cells with deletions (22 % of abnormal cells; 5 % of the total cells), and 10 cells with acentric fragment (0.3 % of the total cells). The figure for deletions was far higher than that reported in the literature. A large number of deletions were seen in chromosomes no.4, no.21, and no.22, and a few deletions in chromosomes no.7 and no.20. Significance of chromosome deletions is discussed. (Namekawa, K.)

  7. The bomb, the dark side of the nuclear world

    International Nuclear Information System (INIS)

    Collin, J.M.

    2009-01-01

    The reality of the nuclear world can be summarized in few words: a world arsenal of 26000 bombs, enough uranium and plutonium and the know-how to make much more, multiple non-proliferation and weapons limitation treaties which have troubles regulating the diffusion of this technology, indelible environmental and sanitary marks left by 2059 tests, governments secretly wishing to assume this supreme power attribute, a black market, spies and dealers, but also: opponents, political leaders, local representatives and non-governmental organizations who militate for a nuclear weapon-free world. However, this burning question paradoxically remains obscure to citizens and its obscure aspect is relayed by media and politicians. This book aims at decoding the wheels of the international nuclear weapons situation: from the five official nuclear powers to the proliferation actors, from the defense policies to the risks of accidents and the stakes of disarmament, from the bomb fabrication to its devastating effects. It shows how this ultimate weapon has durably pervaded the defense policies and strategies of countries who own it, and how difficult it will be to reconsider this situation

  8. Radiation and cancer risk in atomic-bomb survivors.

    Science.gov (United States)

    Kodama, K; Ozasa, K; Okubo, T

    2012-03-01

    With the aim of accurately assessing the effects of radiation exposure in the Japanese atomic-bomb survivors, the Radiation Effects Research Foundation has, over several decades, conducted studies of the Life Span Study (LSS) cohort, comprising 93 000 atomic-bomb survivors and 27 000 controls. Solid cancer: the recent report on solid cancer incidence found that at age 70 years following exposure at age 30 years, solid cancer rates increase by about 35%  Gy(-1) for men and 58% Gy(-1) for women. Age-at-exposure is an important risk modifier. In the case of lung cancer, cigarette smoking has been found to be an important risk modifier. Radiation has similar effects on first-primary and second-primary cancer risks. Finally, radiation-associated increases in cancer rates appear to persist throughout life. Leukaemia: the recent report on leukaemia mortality suggests that radiation effects on leukaemia mortality persisted for more than 50 years. Moreover, significant dose-response for myelodysplastic syndrome was observed in Nagasaki LSS members even 40-60 years after radiation exposure. Future perspective: given the continuing solid cancer increase in the survivor population, the LSS will likely continue to provide important new information on radiation exposure and solid cancer risks for another 15-20 years, especially for those exposed at a young age.

  9. Study on the multiple cancer in A-bomb survivors

    International Nuclear Information System (INIS)

    Wakabayashi, Toshiro; Yamamoto, Tsutomu.

    1984-01-01

    Autopsy data from cohort studies performed on A-bomb victims revealed that the incidence rate of multiple cancer was 7.8% (193 of 2,472 cancer A-bomb victims), being higher than that (5.8%) found from the tumor registry in Hiroshima and Nagasaki. Multiple cancer occurred more frequently in women than in men in both Nagasaki and Hiroshima. The incidence of multiple cancer was 1.5 times higher in the victims exposed to more than 100 rad (Vsub(+) group) than in those exposed to less than one rad (V 0 group), suggesting that there might be dose-response relationship, although this was not statistically significant between the exposed groups. According to the organs, relative risk ratio of developing cancer in the Vsub(+) group to that in the V 0 group was high in the colon and rectum, bladder, lungs, and testes in men; in the thyroid gland, lungs, colon and rectum, bladder, and breast in women, although no statistically significant differences were observed between the groups. This was suggestive of cancer that arises frequently in the lungs of men in the Vsub(+) group. Occult cancer of the thyroid gland and testes was also discussed in relation to the incidence of multiple cancer. (Namekawa, K.)

  10. Genetic radiation effects of Hiroshima and Nagasaki atomic bombs

    Energy Technology Data Exchange (ETDEWEB)

    Srsen, S. (Komenskeho Univ., Bratislava (Czechoslovakia). Lekarska Fakulta)

    1984-05-01

    A group of researchers examined persons who had survived the Hiroshima and Nagasaki bombs and were irradiated and their progeny with the aim of getting an idea of the genetic effects of these explosions. Teratogenic effects are not discussed. In the lymphocytes of the peripheral blood of persons who had been exposed to high dose irradiation the researchers found a significant increase in chromosomal aberrations by conventional and more recent methods of chromosomal analysis. In parents who had survived the atomic holocaust there were no significant deviations as against the rest of the population in still births, neonatal defects, infant mortality, and mortality of first generation progeny, in neonate weight, the sex ratio, increased occurence of leukosis and chromosomal aberrations in their children. These negative findings in the first generation do not signify that there is no danger from atomic bomb blasts for human kind. They only indicate that the effects of radiation were too small to be found by routine methods or that the methods used were not suitable.

  11. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  12. Stochastic Model of TCP SYN Attacks

    OpenAIRE

    Simona Ramanauskaitė; Antanas Čenys

    2011-01-01

    A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS) attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both...

  13. Clinical survey of blood dyscrasias among Hiroshima A-bomb survivors by the periodical health examination, (9)

    International Nuclear Information System (INIS)

    Dohy, Hiroo; Taketomi, Yoshinori; Oguma, Nobuo; Takamatsu, Yumiko; Kamada, Nanao

    1984-01-01

    Of 195,146 A-bomb survivors undergoing the periodic health examination, 607 in whom anemia was confirmed were investigated. Iron deficiency anemia was seen in 77.3% of the survivors (mostly consisting of women under the age of 54 years). There was no significant difference in other types of anemia between men and women. Renal anemia was frequent in survivors aged between 60 and 80 years. Refractory anemia was frequent in survivors older than those with renal anemia. The white blood cell count and platelet count were within the normal range in three types of anemia. (Namekawa, K.)

  14. Findings of a recent ORNL review of dosimery for the Japanese atomic-bomb survivors

    International Nuclear Information System (INIS)

    Kerr, G.D.

    1981-01-01

    More detail than previously available on the leakage spectra of neutrons from the Nagasaki and Hiroshima weapons was provided by calculations made at the Los Alamos National Laboratory in 1976. Several neutron-transport calculations using these data predicted significantly less neutron exposure in Hiroshima than the current radiation-exposure estimates for survivors designated as T65D (or Tentative 1965 Doses). The difference was extremely important since recent studies using the T65D estimates have predicted a very large leukemia risk for neutrons at low exposure levels in Hiroshima. Some findings are that the neutron exposures in Hiroshima were probably less than the T65D estimates by factors varying from about four at a ground distance of 1000 m to eight at 2000 m, and the gamma-ray exposures were greater than the T65D estimates starting at about 1000 m and were probably larger by a factor of about three at 2000 m. In Nagasaki, the situation was reversed with respect to gamma rays, and the T65D estimates were higher, but the differences were small (i.e., about 20% at 1000 m and 30% at 2000 m). As a result, it now appears that leukemia and other late effects at lower exposure levels in Hiroshima were due largely to gamma rays rather than neutrons. This may not be true at higher exposure levels in Hiroshima, however. Any reanalysis of data on late effects among the atomic-bomb survivors should be regarded as highly speculative until some other important issues have been investigated in more detail. These issues include the anisotropy in neutron leakage from the Hiroshima weapon, the energy yield of the Hiroshima weapon, the shielding factors for houses, and the organ-dose factors for the atomic-bomb survivors

  15. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  16. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  17. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  18. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  19. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  20. Mortality of in-utero children exposed to the A-bomb and of offspring of A-bomb survivors

    International Nuclear Information System (INIS)

    Kato, H.

    1978-01-01

    A cohort-type follow-up study has been carried out by the Radiation Effects Research Foundation on the mortality of children exposed to A-bomb radiation while in utero. The mortality increased with tissue dose during the first year of life and did not increase during the following nine years, but an increase with dose was again suggested during 10-32 years of age. A detailed analysis of infant mortality revealed that the dose-associated excess in mortality among those under one year of age, especially within one month after birth, was attributable partly to the mechanical injury of the mother, but this does not provide the whole explanation. There was no increase of mortality from cancer including leukaemia with dose. As the number of cancer deaths is at present only five, further careful follow-up on this cohort is necessary to determine the state of radiation-induced cancer among this cohort. The continuing study on mortality rates among children born to A-bomb survivors has been updated to 1976. No clearly significant effect of parental exposure on survival of the offspring (average age 24 years) could be demonstrated either by a contingency chi 2 -type of analysis or regression analysis. (author)

  1. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  2. Reactions to terror attacks in ultra-orthodox jews: the cost of maintaining strict identity.

    Science.gov (United States)

    Ankri, Yael L E; Bachar, Eytan; Shalev, Arieh Y

    2010-01-01

    Traumatic events can shatter faith and beliefs. The responses of Ultra-Orthodox survivors of deadly terrorist attacks illustrate an effort to reconcile dreadful experiences with deeply embedded beliefs. Qualified clinicians prospectively evaluated self-reported and interviewer-generated posttraumatic stress disorder (PTSD) symptoms and cognitive appraisal in Ultra-Orthodox (n = 20) and non-Ultra-Orthodox (n = 33) survivors of suicide bus-bombing incidents in Jerusalem. Ultra-Orthodox survivors reported higher levels of PTSD symptoms and more personal guilt. Their narratives reflected an unshaken belief in Just Providence, within which being a victim of terror was perceived as a Just retribution for known or unknown wrongdoing. Survivors' reactions to trauma often reflect an effort to reconcile incongruous experiences with previously held beliefs. When treating strict believers, helpers should be sensitive to the identity-preserving function of posttraumatic cognitions.

  3. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  4. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Aneurysm More Coronary Artery Dissection: Not Just a Heart Attack Updated:Mar 15,2018 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  5. Symptom-based, algorithmic approach for handling the initial encounter with victims of a potential terrorist attack.

    Science.gov (United States)

    Subbarao, Italo; Johnson, Christopher; Bond, William F; Schwid, Howard A; Wasser, Thomas E; Deye, Greg A; Burkhart, Keith K

    2005-01-01

    This study intended to create symptom-based triage algorithms for the initial encounter with terror-attack victims. The goals of the triage algorithms include: (1) early recognition; (2) avoiding contamination; (3) early use of antidotes; (4) appropriate handling of unstable, contaminated victims; and (5) provisions of force protection. The algorithms also address industrial accidents and emerging infections, which have similar clinical presentations and risks for contamination as weapons of mass destruction (WMD). The algorithms were developed using references from military and civilian sources. They were tested and adjusted using a series of theoretical patients from a CD-ROM chemical, biological, radiological/nuclear, and explosive victim simulator. Then, the algorithms were placed into a card format and sent to experts in relevant fields for academic review. Six inter-connected algorithms were created, described, and presented in figure form. The "attack" algorithm, for example, begins by differentiating between overt and covert attack victims (A covert attack is defined by epidemiological criteria adapted from the Centers for Disease Control and Prevention (CDC) recommendations). The attack algorithm then categorizes patients either as stable or unstable. Unstable patients flow to the "Dirty Resuscitation" algorithm, whereas, stable patients flow to the "Chemical Agent" and "Biological Agent" algorithms. The two remaining algorithms include the "Suicide Bomb/Blast/Explosion" and the "Radiation Dispersal Device" algorithms, which are inter-connected through the overt pathway in the "Attack" algorithm. A civilian, symptom-based, algorithmic approach to the initial encounter with victims of terrorist attacks, industrial accidents, or emerging infections was created. Future studies will address the usability of the algorithms with theoretical cases and utility in prospective, announced and unannounced, field drills. Additionally, future studies will assess the

  6. An analysis of leukaemia, lymphoma and other malignancies together with certain categories of non-cancer mortality in the first generation offspring (F1) of the Japanese bomb survivors

    International Nuclear Information System (INIS)

    Little, M.P.; Wakeford, R.; Charles, M.W.

    1994-01-01

    The absence of any significant excess of childhood leukaemia in the offspring of the Japanese bomb survivors has provided strong evidence against a causal interpretation of the association between paternal preconception radiation dose and the incidence of childhood leukaemia in the offspring of employees at the Sellafield nuclear installation, West Cumbria. The use of the Japanese data has, however, been questioned on the basis that leukaemia cases may have been under-recorded in the years immediately following the bombings. In order to investigate possible misdiagnoses of leukaemia cases in the first generation offspring (F 1 ) of the Japanese bomb survivors, analyses have been undertaken of cases of leukaemia, non-Hodgkin's lymphoma (NHL), and all other malignancies, together with deaths due to blood diseases, deaths due to infectious diseases and deaths from unknown causes. (author)

  7. The course of postdisaster psychiatric disorders in directly exposed civilians after the US Embassy bombing in Nairobi, Kenya: a follow-up study.

    Science.gov (United States)

    Zhang, Gus; North, Carol S; Narayanan, Pushpa; Kim, You-Seung; Thielman, Samuel; Pfefferbaum, Betty

    2013-02-01

    While disasters are common in Africa, disaster studies in Africa are underrepresented in the published literature. This study prospectively examined the longitudinal course of psychopathology, coping, and functioning among 128 directly exposed Kenyan civilian survivors of the 1998 US Embassy bombing in Nairobi. The Diagnostic Interview Schedule/Disaster Supplement assessed predisaster and postdisaster psychiatric disorders and variables related to coping, functioning, safety, and religion near the end of the first and third postdisaster years. Total postdisaster prevalence of posttraumatic stress disorder (PTSD) at the 3-year follow-up was 49; 28% of the sample still had active PTSD. Delayed-onset PTSD was not observed. Posttraumatic symptoms decayed more slowly in individuals with than those without PTSD. PTSD was more prevalent and chronic than major depression. Those with current PTSD or major depression reported more functioning problems than those without. The length of hospitalization for injuries after the bombing predicted major depression remission, but no predictors of PTSD remission were found. Despite differences in coping and social variables, longitudinal psychopathology in the Nairobi terrorism survivors appeared broadly similar to results in Western disaster populations. These findings contribute to the understanding of disaster mental health in Africa and may have implications for generalizability of psychiatric effects of terrorist attacks around the globe.

  8. Accounting for neutron exposure in the Japanese atomic bomb survivors.

    Science.gov (United States)

    Cullings, Harry M; Pierce, Donald A; Kellerer, Albrecht M

    2014-12-01

    The Japanese atomic bomb survivors that were directly exposed to both γ rays and neutrons have been followed by the Radiation Effects Research Foundation (RERF). The estimation of the γ-ray risks requires some adjustment for the greater biological effect of the neutrons per unit dose. Because the small neutron doses and the predominant γ-ray doses are highly correlated, the neutron relative biological effectiveness (RBE) cannot be reliably estimated from the survivors' data and information from radiobiology must be invoked. As data became available on neutron doses, RERF has used a constant neutron RBE value of 10, even though radiobiological studies indicate that the RBE values appear to have considerably larger values at low doses. The approximation RBE = 10 assumes that if the RBE is variable it takes roughly this value in the range of total dose most relevant for linear risk estimation, namely about 1 Gy. We consider some possible RBE functions to explain the correct use and the impact of a dose-dependent RBE. However, we do not advocate any particular choice or even that a variable RBE be employed. Rather we show that the assumed neutron RBE, within a wide range of choices, is far less important to the outcome of risk assessment of the RERF data than generally believed. Some of these misperceptions have been related to the consideration of variable RBE functions, and without due attention to the fact that in the case of the A-bomb survivors' data, the mixed field of neutrons and γ rays must be considered. Therefore, the RBE value of neutrons is much lower than the RBE in pure neutron fields that are used in radiobiological experiments. Thus, applying the pure neutron field RBE to the mixed-field A-bomb radiation can lead to an overestimation of the actual neutron RBE for moderate total dose levels of 1 Gy by a factor of more than four. While in a pure neutron exposure the RBE depends on the neutron dose, in the mixed field it depends on both components of

  9. Psychological problems of atomic bomb survivors from the medical social worker's standpoint

    International Nuclear Information System (INIS)

    Tomoike, Toshio

    1994-01-01

    Mental data from 80 A-bomb survivors were available during a 20-year period 1973-1992. Types of A-bomb survivors were classified into (1) directly exposed A-bomb survivors, (2) A-bomb survivors living in the United States, (3) those living in prefectures other than Nagasaki, (4) ex-soldiers, (5) A-bomb survivors having family problems and others, (6) the demented elderly, (7) the alcoholic, and (8) others. Mental problems were judged as psychogenic, endogenous, and exogenous. Mental problems were most frequently associated with Type 1 (34.9%), followed by Type 8 (21.0%), Type 2 (18.6%), and Type 3 (7.0%). Noticeable finding was that Type 1 A-bomb survivors suffered from psychogenic and exogenous mental problems in an extremely high incidence, as compared with the non-exposed group (66.3% vs 24%). The incidence of both exogenous and endogenous problems was higher in the non-exposed group (32.6% and 24.5%) than the exposed group (23.2% and 10.5%). There was no significant gender difference in the development of mental problems. According to types of A-bomb survivors, both psychogenic and exogenous mental problems were most common for Type 1. The incidence of psychogenic problems was 2.85 times higher than that of exogenous problems. (N.K.)

  10. Effects of radiation on the incidence of prostate cancer among Nagasaki atomic bomb survivors.

    Science.gov (United States)

    Kondo, Hisayoshi; Soda, Midori; Mine, Mariko; Yokota, Kenichi

    2013-10-01

    Atomic bomb survivors have been reported to have an increased risk of some cancers, especially leukemia. However, the risk of prostate cancer in atomic bomb survivors is not known to have been examined previously. This study examined the association between atomic bomb radiation and the incidence of prostate cancer among male Nagasaki atomic bomb survivors. The subjects were classified by distance from the hypocenter into a proximal group (<2 km), a distal group (≥2 km), and an early entrance group (those who entered the region <2 km from the hypocenter within 2 weeks after the explosion). Between 1996 and 2009, 631 new cases of prostate cancer were identified among approximately 18 400 male Nagasaki atomic bomb survivors who were alive in 1996. The Cox proportional hazard model was used to estimate the risk of prostate cancer development, with adjustment for age at atomic bomb explosion, attained age, smoking status, and alcohol consumption. Compared with the distal group, the proximal group had significant increased risks of total, localized, and high-grade prostate cancer (relative risk and 95% confidence interval: 1.51 [1.21-1.89]; 1.80 [1.26-2.57]; and 1.88 [1.20-2.94], respectively). This report is the first known to reveal a significant relationship between atomic bomb radiation and prostate cancer. © 2013 Japanese Cancer Association.

  11. Multiple primary malignant neoplasms in a fixed population of A-bomb survivors, 1

    International Nuclear Information System (INIS)

    Soda, Midori; Yokoyama, Naokata; Matsuo, Tatsuki; Takagi, Miwako; Kitano, Koei; Toyama, Kyoko; Fujikura, Toshio

    1986-01-01

    In a fixed population (7,564 A-bomb survivors) for Adult Health Study performed until December 1985, 28 A-bomb survivors (5 men and 23 women) were diagnosed as having thyroid cancer, and 79 (including one man) as breast cancer. There was an evident tendency among the group receiving 100 rad or more towards higher incidence of cancers of the thyroid and breast and synchronous or metachronous multiple primaries. The incidence of thyroid cancer tended to be higher in A-bomb survivors less than 20 years of age at the time of exposure; however, this tendency was not seen in the case of breast cancer. The incidence of thyroid cancer - in contrast to breast cancer - tended to decrease from year to year. Multiple primaries were associated with thyroid cancer in 5 A-bomb survivors and breast cancer in 9 A-bomb survivors. Three A-bomb survivors had both thyroid and breast cancers. Among the 11 A-bomb survivors with multiple primaries, nine had received 100 rad or more. (Namekawa, K.)

  12. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  13. Suggestion of a Framework to Analyze Failure Modes and Effect of Cyber Attacks in NPP

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chan Young; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of)

    2016-05-15

    The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  14. Effect of Angle of Attack on Slope Climbing Performance

    Science.gov (United States)

    Creager, Colin M.; Jones, Lucas; Smith, Lauren M.

    2017-01-01

    Ascending steep slopes is often a very difficult challenge for off-road vehicles, whether on Earth or on extraterrestrial bodies. This challenge is even greater if the surface consists of loose granular soil that does not provide much shear strength. This study investigated how the path at which a vehicle traverses a slope, specifically the angle that it is commanded to drive relative to the base of the hill (the angle of attack), can affect its performance. A vehicle was driven in loose sand at slope angles up to 15 degrees and angles of attack ranging from 10 to 90 degrees. A novel photogrammetry technique was implemented to both track vehicle motion and create a three-dimensional profile of the terrain. This allowed for true wheel sinkage measurements. The study showed that though low angles of attack result in lower wheel slip and sinkage, the efficiency of the vehicles uphill motion increased at higher angles of attack. For slopes up to 15 degrees, a 90 degree angle of attack provided the greatest likelihood of successful ascent.

  15. Antioxidant status in acute asthmatic attack in children

    International Nuclear Information System (INIS)

    Al-Abdulla, N.O.; Al-Naama, L.M.; Hassan, M.K.

    2010-01-01

    Objectives: To determine the oxidant - antioxidant imbalance in asthmatic children, by measuring the levels of malondialdehyde (MDA) as an oxidant marker of lipid peroxidation as well as antioxidant compounds like vitamin C, vitamin E and uric acid and to investigate whether their concentrations are associated with more severe asthma. Methods: This case controlled prospective study was conducted on 219 children aged 1-12 years, attending Basra Maternity and Children Hospital. Included were 98 asthmatic children during acute attack and 121 non asthmatic, apparently healthy children. Serum malondialdehyde (MDA) as an oxidant marker of lipid peroxidation, and vitamin C, vitamin E and uric acid (as antioxidants) were estimated in asthmatic children during acute attack and compared with non-asthmatic children. Results: Asthmatic children during exacerbation of their asthma have significant lower serum levels of antioxidant compounds like vitamin C, vitamin E and uric acid (p<0.001) and significantly high malondialdehyde as compared with the controls. MDA was significantly elevated (P< 0.001), while that of vitamin C, vitamin E and uric acid were significantly decreased with increasing severity of asthmatic attack (P<0.001). A significant negative correlation between MDA with vitamin C (P<0.05, r = - 0.44) was observed in severe asthmatic attacks. Conclusion: Asthmatic patients during acute attack suffer a high degree of reactive oxygen species formation causing considerable oxidative stress that is indicated by the high level of oxidants (MDA) and low level of antioxidants. (author)

  16. From control system security indices to attack identifiability

    NARCIS (Netherlands)

    Herdeiro Teixeira, A.M.; Sandberg, H

    2016-01-01

    In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The index exactly quantifies the resources

  17. High brain serotonin levels in migraine between attacks

    DEFF Research Database (Denmark)

    Deen, Marie; Hansen, Hanne D.; Hougaard, Anders

    2017-01-01

    Objectives To investigate brain 5-HT4-receptor binding with positron emission tomography (PET) as a proxy of serotonin (5-hydroxytryptamine, 5-HT) levels in migraine patients between attacks. Methods Brain 5-HT4-receptor binding, assessed with PET imaging of the specific 5-HT4-receptor radioligand...

  18. Oslo government district bombing and Utøya island shooting July 22, 2011: The immediate prehospital emergency medical service response

    Directory of Open Access Journals (Sweden)

    Sollid Stephen JM

    2012-01-01

    Full Text Available Abstract Background On July 22, 2011, a single perpetrator killed 77 people in a car bomb attack and a shooting spree incident in Norway. This article describes the emergency medical service (EMS response elicited by the two incidents. Methods A retrospective and observational study was conducted based on data from the EMS systems involved and the public domain. The study was approved by the Data Protection Official and was defined as a quality improvement project. Results We describe the timeline and logistics of the EMS response, focusing on alarm, dispatch, initial response, triage and evacuation. The scenes in the Oslo government district and at Utøya island are described separately. Conclusions Many EMS units were activated and effectively used despite the occurrence of two geographically separate incidents within a short time frame. Important lessons were learned regarding triage and evacuation, patient flow and communication, the use of and need for emergency equipment and the coordination of helicopter EMS.

  19. Oslo government district bombing and Utøya island shooting July 22, 2011: The immediate prehospital emergency medical service response

    Science.gov (United States)

    2012-01-01

    Background On July 22, 2011, a single perpetrator killed 77 people in a car bomb attack and a shooting spree incident in Norway. This article describes the emergency medical service (EMS) response elicited by the two incidents. Methods A retrospective and observational study was conducted based on data from the EMS systems involved and the public domain. The study was approved by the Data Protection Official and was defined as a quality improvement project. Results We describe the timeline and logistics of the EMS response, focusing on alarm, dispatch, initial response, triage and evacuation. The scenes in the Oslo government district and at Utøya island are described separately. Conclusions Many EMS units were activated and effectively used despite the occurrence of two geographically separate incidents within a short time frame. Important lessons were learned regarding triage and evacuation, patient flow and communication, the use of and need for emergency equipment and the coordination of helicopter EMS. PMID:22280935

  20. The Radium Terrors. Science Fiction and Radioactivity before the Bomb.

    Science.gov (United States)

    Candela, Andrea

    2015-01-01

    At the beginning of the 20th century the collective imagination was fascinated and terrified by the discovery of radium. A scientific imagery sprang up around radioactivity and was disseminated by public lectures and newspaper articles discussing the ambiguous power of this strange substance. It was claimed that radium could be used to treat cholera, typhus and tuberculosis, but at the same time there were warnings that it could be used for military purposes. The media and the scientists themselves employed a rich vocabulary influenced by religion, alchemy and magic. The ambivalent power of radioactive elements exerted a great influence on science fiction novelists. This paper will examine some significant works published in Europe, America and Russia during the first decades of the 20th century and their role in the creation of the complex imagery of radioactivity that seized the public imagination long before the invention of the atomic bomb.

  1. Activation of cobalt by neutrons from the Hiroshima bomb

    International Nuclear Information System (INIS)

    Kerr, G.D.; Dyer, F.F.; Emery, J.F.; Pace, J.V. III; Brodzinski, R.L.; Marcum, J.

    1990-02-01

    A study has been completed of cobalt activation in samples from two new locations in Hiroshima. The samples consisted of a piece of steel from a bridge located at a distance of about 1300 m from the hypocenter and pieces of both steel and concrete from a building located at approximately 700 m. The concrete was analyzed to obtain information needed to calculate the cobalt activation in the two steel samples. Close agreement was found between calculated and measured values for cobalt activation of the steel sample from the building at 700 m. It was found, however, that the measured values for the bridge sample at 1300 m were approximately twice the calculated values. Thus, the new results confirm the existence of a systematic error in the transport calculations for neutrons from the Hiroshima bomb. 52 refs., 32 figs., 16 tabs

  2. Solar Ellerman Bombs in 1D Radiative Hydrodynamics

    Energy Technology Data Exchange (ETDEWEB)

    Reid, A.; Mathioudakis, M. [Astrophysics Research Centre, School of Mathematics and Physics, Queen’s University Belfast, Belfast BT7 1NN (United Kingdom); Kowalski, A. [Department of Astrophysical and Planetary Sciences, University of Colorado Boulder, 2000 Colorado Avenue, Boulder, CO 80305 (United States); Doyle, J. G. [Armagh Observatory and Planetarium, College Hill, Armagh BT61 9DG (United Kingdom); Allred, J. C., E-mail: aaron.reid@qub.ac.uk [NASA/Goddard Space Flight Center, Code 671, Greenbelt, MD 20771 (United States)

    2017-02-01

    Recent observations from the Interface Region Imaging Spectrograph appear to show impulsive brightenings in high temperature lines, which when combined with simultaneous ground-based observations in H α , appear co-spatial to Ellerman Bombs (EBs). We use the RADYN one-dimensional radiative transfer code in an attempt to try and reproduce the observed line profiles and simulate the atmospheric conditions of these events. Combined with the MULTI/RH line synthesis codes, we compute the H α , Ca ii 8542 Å, and Mg ii h and k lines for these simulated events and compare them to previous observations. Our findings hint that the presence of superheated regions in the photosphere (>10,000 K) is not a plausible explanation for the production of EB signatures. While we are able to recreate EB-like line profiles in H α , Ca ii 8542 Å, and Mg ii h and k, we cannot achieve agreement with all of these simultaneously.

  3. Lessons from the atomic bomb about secondary MDS.

    Science.gov (United States)

    Hata, Tomoko; Imanishi, Daisuke; Miyazaki, Yasushi

    2014-12-01

    Myelodysplastic syndromes (MDSs) is a hematological neoplasm defined by ineffective hematopoiesis, dysplasia of hematopoietic cells, and risk of progression to acute leukemia. MDS occurs as de novo or secondary, and chemoradiotherapy for cancers is thought to increase the risk of MDS among patients. Recently, an epidemiological study for MDS among A-bomb survivors was performed, and it clearly demonstrated that the exposure to external radiation significantly increased the risk of MDS. Precise epidemiological data among survivors have revealed important clinical factors related to the risk of leukemias. In this review, by comparing data for secondary MDS and leukemia/MDS among survivors, several factors which would affect the risk of MDS, especially secondary MDS, are discussed.

  4. Whole-blood phagocytic and bactericidal activities of atomic bomb survivors, Hiroshima and Nagasaki

    International Nuclear Information System (INIS)

    Sasagawa, Sumiko; Yoshimoto, Yasuhiko; Toyota, Emiko; Neriishi, Shotaro; Yamakido, Michio; Matsuo, Miyo; Hosoda, Yutaka; Finch, S.C.

    1989-04-01

    This in vitro study evaluated the phagocytic and bactericidal activities of leukocytes in aliquots of whole blood from Hiroshima and Nagasaki atomic bomb survivors for Staphylococcus aureus. The data were analyzed by multiple linear regression. Any significant effects of exposure to A-bomb radiation could not be detected for both phagocytic and bactericidal activities of whole blood from A-bomb survivors. In addition, there were no significant effects of age categories, sex or city, except in neutrophil counts. (J.P.N.)

  5. Conduct Problems Among Boston-Area Youth Following the 2013 Marathon Bombing: The Moderating Role of Prior Violent Crime Exposure.

    Science.gov (United States)

    Crum, Kathleen I; Cornacchio, Danielle; Coxe, Stefany; Greif Green, Jennifer; Comer, Jonathan S

    2017-01-01

    A large body of work documents the heavy mental health burden of youth exposure to disasters, but the majority of this research has focused on posttraumatic stress and internalizing symptoms. Less is known about associations between disaster exposure and children's conduct problems (CPs), or variables that may moderate such relationships. Given well-documented links between CPs and children's exposure to community violence, youth with greater prior community violence exposure through residence in high-crime areas may be particularly vulnerable to the impacts of disaster exposure on CPs. We surveyed Boston-area caregivers (N = 460) in the first 6 months following the 2013 Marathon bombing on their children's event-related exposures, as well as CPs. To estimate prior violent crime exposure, children's neighborhoods were assigned corresponding violent crime rates obtained from the Federal Bureau of Investigation's uniform crime reporting statistics. Almost 1 in 6 Boston-area children assessed in this convenience sample showed clinically elevated CPs in the aftermath of the Boston Marathon bombing and subsequent manhunt. Prior violent crime exposure significantly moderated the link between children's manhunt exposure (but not bombing exposure) and child CPs. Manhunt exposure was related to increased CPs among children living in areas with high and medium (but not low) levels of prior violent crime. Children living in neighborhoods characterized by violent crime may be at particularly increased risk for developing CPs after violent manmade disasters. As most postdisaster child intervention efforts focus on posttraumatic stress, efforts are needed to develop programs targeting child CPs, particularly for youth dwelling in violent neighborhoods.

  6. Biochemical survey for children of A-bomb survivors

    International Nuclear Information System (INIS)

    Sato, Chiyoko

    1992-01-01

    The Radiation Effects Research Foundation has conducted biochemical survey in children of A-bomb survivors, with the purpose of elucidating whether or not the rate of genetic mutation in genital cells is increased. This paper describes the previous surveys done at protein levels. Two kinds of indicators have been used: (1) 'rare mutation type' reflecting base substitution mutation, base deletion, and insertion; (2) 'mutation type' reflecting the decrease of red cell enzyme activity. According to the DS86 dosimetry system, the children population of A-bomb survivors were examined by dividing into the exposed group (n=11,364) of their parents exposed to 0.01 Sv or more and the control group (n=12,297) of those exposed to less than 0.01 Sv. 'Rare mutation type' was detected using electrophoresis in a total of 1,233 children in both groups. Of these children, 2 in the exposed group and 4 in the control group had a new 'mutation', i.e., mutation that was considered to have occurred in genital cells of their parents. Survey for genetic foci has revealed mutation in 2 children in the exposed group and 4 children in the control group, with the rate of mutation being 0.37 x 10 -5 /genetic foci/generation and 0.68 x 10 -5 /genetic foci/generation, respectively. Mutation type reflecting the decrease in red cell enzyme activity was seen in 26 in the exposed group and 21 in the control group. A total of 41 children were found to have been inherited from their parents. In the survey for genetic foci, only one had mutation in the exposed group, with the rate of mutation being 1.7 x 10 -5 /genetic foci/generation. These findings have revealed no evidence of significant difference in the rate of mutation between the exposed and control groups. Finally, the future genetic surveys at molecular levels are briefly discussed. (N.K.)

  7. Studies on the life spans of atom-bomb survivors

    International Nuclear Information System (INIS)

    Kato, Hiroo

    1975-01-01

    A shortening of whole life as late injuries of atom-bomb survivors was discussed from the aspects of aging and the studies on the causes of leukemia and cancers. Twenty-one thousands four hundreds and forty-seven of 109000 subjects died during the period between 1950 and 1970. Mortality by exposure doses presented a high value with exposure doses. Mortality of subjects which had received exposure doses of more than 200 rads rose to a level which was 1.27 times in all causes of deaths of the control which had received exposure doses of 0 to 9 rads, and it showed 1.32 times in all deaths of sickness, 18.3 times in leukemia, and 1.48 times in death from cancer. Mortality due to leukemia decreases after 1950-1954, but in the group which had received exposure doses over 100 rads, the mortality was significantly higher than that in all districts in Japan. The shape of dose-reaction curve in Hiroshima was different from that in Nagasaki. In the same dose, mortality due to leukemia in Hiroshima was higher than that in Nagasaki. The younger the age at exposure was, the higher the risk rate of occurring cancer was. Especially, the risk rate of cancer was high in the patients who were exposed to atomic bomb during the age of 0 to 9 years old. Mortality due to cancer increased with the dose. Cancers which statistically showed higher mortality than that in the control group are lung cancer, cancer of the breast (100-199 rad), carcinoma of the esophagus, cancer of the urinary organ (200-299 rad) and gastric cancer (over 300 rads). There are not so clear difference in the mortality due to cancer between Hiroshima and Nagasaki, comparing with the mortality due to leukemia. (Kanao, N.)

  8. Resveratrol products resulting by free radical attack

    Science.gov (United States)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  9. Priming and warnings are not effective to prevent social engineering attacks

    NARCIS (Netherlands)

    Junger, Marianne; Montoya, L.; Overink, F.J.

    2017-01-01

    Humans tend to trust each other and to easily disclose personal information. This makes them vulnerable to social engineering attacks. The present study investigated the effectiveness of two interventions that aim to protect users against social engineering attacks, namely priming through cues to

  10. Using the cumulative sum algorithm against distributed denial of service attacks in Internet of Things

    CSIR Research Space (South Africa)

    Machaka, Pheeha

    2015-11-01

    Full Text Available The paper presents the threats that are present in Internet of Things (IoT) systems and how they can be used to perpetuate a large scale DDoS attack. The paper investigates how the Cumulative Sum (CUSUM) algorithm can be used to detect a DDoS attack...

  11. Physical Attacks: An Analysis of Teacher Characteristics Using the Schools and Staffing Survey

    Science.gov (United States)

    Williams, Thomas O., Jr.; Ernst, Jeremy V.

    2016-01-01

    This study investigated physical attacks as reported by public school teachers on the most recent Schools and Staffing Survey (SASS) from the National Center for Education Statistics administered by the Institute of Educational Sciences. For this study, characteristics of teachers who responded affirmatively to having been physically attacked in…

  12. Denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping; Lu, Bao-Liang; Zhang, Liqing; Kwok, James

    2011-01-01

    The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis approach to investigate and extract second-order

  13. Identifying Risk of Future Asthma Attacks Using UK Medical Record Data : A Respiratory Effectiveness Group Initiative

    NARCIS (Netherlands)

    Blakey, John D.; Price, David B.; Pizzichini, Emilio; Popov, Todor A.; Dimitrov, Borislav D.; Postma, Dirkje S.; Josephs, Lynn K.; Kaplan, Alan; Papi, Alberto; Kerkhof, Marjan; Hillyer, Elizabeth V.; Chisholm, Alison; Thomas, Mike

    BACKGROUND: Asthma attacks are common, serious, and costly. Individual factors associated with attacks, such as poor symptom control, are not robust predictors. OBJECTIVE: We investigated whether the rich data available in UK electronic medical records could identify patients at risk of recurrent

  14. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    . However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute......Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  15. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  16. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  17. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  18. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  19. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    Directory of Open Access Journals (Sweden)

    Frédéric Moisan

    2017-06-01

    Full Text Available Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies.

  20. Risk of death among children of atomic bomb survivors after 62 years of follow-up: a cohort study.

    Science.gov (United States)

    Grant, Eric J; Furukawa, Kyoji; Sakata, Ritsu; Sugiyama, Hiromi; Sadakane, Atsuko; Takahashi, Ikuno; Utada, Mai; Shimizu, Yukiko; Ozasa, Kotaro

    2015-10-01

    No clear epidemiological hereditary effects of radiation exposure in human beings have been reported. However, no previous studies have investigated mortality into middle age in a population whose parents were exposed to substantial amounts of radiation before conception. We assessed mortality in children of the atomic bomb survivors after 62 years of follow-up. In this prospective cohort study, we assessed 75 327 singleton children of atomic bomb survivors in Hiroshima and Nagasaki and unexposed controls, born between 1946 and 1984, and followed up to Dec 31, 2009. Parental gonadal doses of radiation from the atomic bombings were the primary exposures. The primary endpoint was death due to cancer or non-cancer disease, based on death certificates. Median follow-up was 54·3 years (IQR 45·4-59·3). 5183 participants died from disease. The mean age of the 68 689 surviving children at the end of follow-up was 53·1 years (SD 7·9) with 15 623 (23%) older than age 60 years. For parents who were exposed to a non-zero gonadal dose of radiation, the mean dose was 264 mGy (SD 463). We detected no association between maternal gonadal radiation exposure and risk of death caused by cancer (hazard ratio [HR] for 1 Gy change in exposure 0·891 [95% CI 0·693-1·145]; p=0·36) or risk of death caused by non-cancer diseases (0·973 [0·849-1·115]; p=0·69). Likewise, paternal exposure had no effect on deaths caused by cancer (0·815 [0·614-1·083]; p=0·14) or deaths caused by non-cancer disease (1·103 [0·979-1·241]; p=0·12). Age or time between parental exposure and delivery had no effect on risk of death. Late effects of ionising radiation exposure include increased mortality risks, and models of the transgenerational effects of radiation exposure predict more genetic disease in the children of people exposed to radiation. However, children of people exposed to the atomic bombs in Hiroshima and Nagasaki had no indications of deleterious health effects after 62