WorldWideScience

Sample records for bomb attack investigation

  1. Ancestry analysis in the 11-M Madrid bomb attack investigation.

    Directory of Open Access Journals (Sweden)

    Christopher Phillips

    Full Text Available The 11-M Madrid commuter train bombings of 2004 constituted the second biggest terrorist attack to occur in Europe after Lockerbie, while the subsequent investigation became the most complex and wide-ranging forensic case in Spain. Standard short tandem repeat (STR profiling of 600 exhibits left certain key incriminatory samples unmatched to any of the apprehended suspects. A judicial order to perform analyses of unmatched samples to differentiate European and North African ancestry became a critical part of the investigation and was instigated to help refine the search for further suspects. Although mitochondrial DNA (mtDNA and Y-chromosome markers routinely demonstrate informative geographic differentiation, the populations compared in this analysis were known to show a proportion of shared mtDNA and Y haplotypes as a result of recent gene-flow across the western Mediterranean, while any two loci can be unrepresentative of the ancestry of an individual as a whole. We based our principal analysis on a validated 34plex autosomal ancestry-informative-marker single nucleotide polymorphism (AIM-SNP assay to make an assignment of ancestry for DNA from seven unmatched case samples including a handprint from a bag containing undetonated explosives together with personal items recovered from various locations in Madrid associated with the suspects. To assess marker informativeness before genotyping, we predicted the probable classification success for the 34plex assay with standard error estimators for a naïve Bayesian classifier using Moroccan and Spanish training sets (each n = 48. Once misclassification error was found to be sufficiently low, genotyping yielded seven near-complete profiles (33 of 34 AIM-SNPs that in four cases gave probabilities providing a clear assignment of ancestry. One of the suspects predicted to be North African by AIM-SNP analysis of DNA from a toothbrush was identified late in the investigation as Algerian in origin. The

  2. Suicide bomb attack causing penetrating craniocerebral injury

    Institute of Scientific and Technical Information of China (English)

    Manzar Hussain; Muhammad Ehsan Bari

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma,although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails.In our case,a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack.The skull X-ray showed a single intracranial nail.Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue.At 6 months' follow-up his right-sided power improved to against gravity.

  3. Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time-Series and Intervention Analysis.

    Science.gov (United States)

    Li, Shuying; Zhuang, Jun; Shen, Shifei

    2016-08-23

    In recent years, various types of terrorist attacks occurred, causing worldwide catastrophes. According to the Global Terrorism Database (GTD), among all attack tactics, bombing attacks happened most frequently, followed by armed assaults. In this article, a model for analyzing and forecasting the conditional probability of bombing attacks (CPBAs) based on time-series methods is developed. In addition, intervention analysis is used to analyze the sudden increase in the time-series process. The results show that the CPBA increased dramatically at the end of 2011. During that time, the CPBA increased by 16.0% in a two-month period to reach the peak value, but still stays 9.0% greater than the predicted level after the temporary effect gradually decays. By contrast, no significant fluctuation can be found in the conditional probability process of armed assault. It can be inferred that some social unrest, such as America's troop withdrawal from Afghanistan and Iraq, could have led to the increase of the CPBA in Afghanistan, Iraq, and Pakistan. The integrated time-series and intervention model is used to forecast the monthly CPBA in 2014 and through 2064. The average relative error compared with the real data in 2014 is 3.5%. The model is also applied to the total number of attacks recorded by the GTD between 2004 and 2014.

  4. Indicators of the need for ICU admission following suicide bombing attacks

    Directory of Open Access Journals (Sweden)

    Bala Miklosh

    2012-03-01

    Full Text Available Abstract Introduction Critical hospital resources, especially the demand for ICU beds, are usually limited following mass casualty incidents such as suicide bombing attacks (SBA. Our primary objective was to identify easily diagnosed external signs of injury that will serve as indicators of the need for ICU admission. Our secondary objective was to analyze under- and over-triage following suicidal bombing attacks. Methods A database was collected prospectively from patients who were admitted to Hadassah University Hospital Level I Trauma Centre, Jerusalem, Israel from August 2001-August 2005 following a SBA. One hundred and sixty four victims of 17 suicide bombing attacks were divided into two groups according to ICU and non-ICU admission. Results There were 86 patients in the ICU group (52.4% and 78 patients in the non-ICU group (47.6%. Patients in the ICU group required significantly more operating room time compared with patients in the non-ICU group (59.3% vs. 25.6%, respectively, p = 0.0003. For the ICU group, median ICU stay was 4 days (IQR 2 to 8.25 days. On multivariable analysis only the presence of facial fractures (p = 0.014, peripheral vascular injury (p = 0.015, injury ≥ 4 body areas (p = 0.002 and skull fractures (p = 0.017 were found to be independent predictors of the need for ICU admission. Sixteen survivors (19.5% in the ICU group were admitted to the ICU for one day only (ICU-LOS = 1 and were defined as over-triaged. Median ISS for this group was significantly lower compared with patients who were admitted to the ICU for > 1 day (ICU-LOS > 1. This group of over-triaged patients could not be distinguished from the other ICU patients based on external signs of trauma. None of the patients in the non-ICU group were subsequently transferred to the ICU. Conclusions Our results show that following SBA, injury to ≥ 4 areas, and certain types of injuries such as facial and skull fractures, and peripheral vascular injury, can serve

  5. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  6. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  7. An Attack Investigation, Characterization and Simulation of Various Attacks in MANET

    Directory of Open Access Journals (Sweden)

    Pratik Gite

    2015-01-01

    Full Text Available Mobile Ad-hoc Network is one of the most popular network technology in the field of research and development community. Due to their dynamic and ad-hoc nature, the network suffers from the various performance and security issues. The main objective of this paper is to evaluate the performance of Ad-hoc On Demand Distance Vector (AODV routing protocol under normal condition and attacks conditions on the basis of different performance metrics. This paper is also concerned about the different kinds of attacks formation viz. Black Hole, Worm Hole, Gray Hole and Denial of Service attacks on MANET environment. In addition of that different kinds of approaches available for detection and prevention of such attacks are also investigated. Finally using different experimentation and simulations through NS-2, the effort is made to identify the effective network characteristics. After concluding the effects and simulation the need of a new Intrusion Detection System (IDS model is presented for future implementation.

  8. DNS Pharming through PHP Injection: Attack Scenario and Investigation

    Directory of Open Access Journals (Sweden)

    Divya Rishi Sahu

    2015-03-01

    Full Text Available With the increase in technology, Internet has provided set of tools and technologies which has enabled web programmers to develop effective websites. PHP is most widely used server side scripting language and more than twenty million of web sites are designed through PHP. It has used as a core script in Web Content Management System (WCMS, such as Joomla, WordPress, Drupal, SilverStripe etc. PHP has also security flaws due to the certain vulnerabilities such as PHP injection, remote file inclusion and unauthorized file creation. PHP injection is a variant of code injection attacks in which PHP script may be exploited to execute remote commands. The contribution of this paper is twofold: First, it presents a unifying view of PHP injection vulnerability, which causes alteration in the 'hosts file'; Second, It introduces an investigation process against alteration in 'hosts file' through PHP injection. This attack has been introduced as a type of DNS pharming. In this investigation process a chain of evidence has been created and an algebraic signature has been developed to detect explained attack.

  9. Terrorist bombing

    Science.gov (United States)

    Mayo, Ami; Kluger, Yoram

    2006-01-01

    Bombings and explosion incidents directed against innocent civilians are the primary instrument of global terror. In the present review we highlight the major observations and lessons learned from these events. Five mechanisms of blast injury are outlined and the different type of injury that they cause is described. Indeed, the consequences of terror bombings differ from those of non-terrorism trauma in severity and complexity of injury, and constitute a new class of casualties that differ from those of conventional trauma. The clinical implications of terror bombing, in treatment dilemmas in the multidimensional injury, ancillary evaluation and handling of terror bombing mass casualty event are highlighted. All this leads to the conclusion that thorough medical preparedness to cope with this new epidemic is required, and that understanding of detonation and blast dynamics and how they correlate with the injury patterns is pivotal for revision of current mass casualty protocols. PMID:17101058

  10. Terrorist bombing

    OpenAIRE

    Kluger Yoram; Mayo Ami

    2006-01-01

    Abstract Bombings and explosion incidents directed against innocent civilians are the primary instrument of global terror. In the present review we highlight the major observations and lessons learned from these events. Five mechanisms of blast injury are outlined and the different type of injury that they cause is described. Indeed, the consequences of terror bombings differ from those of non-terrorism trauma in severity and complexity of injury, and constitute a new class of casualties that...

  11. The Madrid Train Bombings: A Decision-Making Model Analysis

    Science.gov (United States)

    2009-12-11

    train bombing terrorist attack AML Anti Money Laundering CFT Combating the Financing of Terrorism ETA Euzkadi Ta Azkatasuna otherwise known as the...Basque Terrorist Organization EU European Union FBI Federal Bureau of Investigation GICM Groupe Islamique Combattant Marocain otherwise known as...Fund board of executives have ―adopted action plans to enhance efforts for AML/CFT [anti money laundering and combating the financing of terrorism

  12. Britain's bomb

    Science.gov (United States)

    Corfield, Richard

    2012-10-01

    On the 60th anniversary of Britain's first nuclear test, Richard Corfield explores how Operation Hurricane - the British effort to develop the atomic bomb in the 1940s and 1950s - compares with states such as Iran that today wish to have such devices.

  13. Investigation of the Livengood-Wu integral for modelling autoignition in a high-pressure bomb

    Science.gov (United States)

    Hu, Zhixin; Somers, Bart L. M. T.; Cracknell, Roger F.; Bradley, Derek

    2016-01-01

    The reaction progress variable, which is widely used in premixed and diffusion combustion studies, comprises a set of pre-selected intermediate species to denote reaction progress. Progress towards autoignition can also be traced by the Livengood-Wu (LW) integral. Autoignition occurs when the LW integral attains a value of unity. This concept is further explored by applying it to an inhomogeneous mixture scenario, to determine the time and place of autoignition occurrence. A semidetailed mechanism (137 species and 633 reactions) for n-heptane/iso-octane/toluene is used in this study. Two numerical schemes based on the LW integral are proposed and incorporated into a computational fluid dynamics platform, to model autoignition in a 3D configuration, when a spray is injected into a constant volume bomb under diesel engine conditions. Tabulated chemistry, a traditional method of modelling autoignition using information from pre-calculated igniting diffusion flames, is also used for comparison purposes. The associated predicted pressure profiles are compared with experimental measurements.

  14. BusWorld: an analog pilot test of a virtual environment designed to treat posttraumatic stress disorder originating from a terrorist suicide bomb attack.

    Science.gov (United States)

    Josman, Naomi; Reisberg, Ayelet; Weiss, Patrice L; Garcia-Palacios, Azucena; Hoffman, Hunter G

    2008-12-01

    Exposure therapy treatment can lead to large reductions in posttraumatic stress disorder (PTSD) symptoms. Virtual reality exposure (VRE) therapy is designed to facilitate cognitive behavioral therapy for PTSD. During VRE therapy, patients go into an immersive computer-generated environment (go back to the scene of the traumatic event) to help them gain access to their memories of the traumatic event, change unhealthy thought patterns, gradually habituate to their anxiety, and reduce the intensity of associated emotions. The therapist's ability to manipulate the amount of anxiety experienced by the client during therapy is an important element of successful exposure therapy. Using a within-subjects design, 30 asymptomatic volunteers each experienced four levels of a virtual world depicting a terrorist bus bombing, designed to be increasingly distressful. There was a statistically significant difference between the mean subjective units of discomfort scores (SUDS) of the four levels, and several planned paired comparisons showed significantly higher SUDS ratings with higher simulation levels. Results suggest that sound may play an important role in successful elicitation of emotional responses during VRE. The results of this analog study provide initial validation of the potential of BusWorld to provide graded exposure for individuals suffering from PTSD originating from suicide bus bombings. Future research exploring whether VR exposure therapy with BusWorld can reduce PTSD in clinical patients is warranted.

  15. Are IRIS Bombs Connected to Ellerman Bombs?

    Science.gov (United States)

    Tian, Hui; Xu, Zhi; He, Jiansen; Madsen, Chad

    2016-06-01

    Recent observations by the Interface Region Imaging Spectrograph (IRIS) have revealed pockets of hot gas (˜2-8 × 104 K) potentially resulting from magnetic reconnection in the partially ionized lower solar atmosphere (IRIS bombs; IBs). Using joint observations between IRIS and the Chinese New Vacuum Solar Telescope, we have identified 10 IBs. We find that 3 are unambiguously and 3 others are possibly connected to Ellerman bombs (EBs), which show intense brightening of the extended {{{H}}}α wings without leaving an obvious signature in the {{{H}}}α core. These bombs generally reveal the following distinct properties: (1) the O iv 1401.156 Å and 1399.774 Å lines are absent or very weak; (2) the Mn i 2795.640 Å line manifests as an absorption feature superimposed on the greatly enhanced Mg ii k line wing; (3) the Mg ii k and h lines show intense brightening in the wings and no dramatic enhancement in the cores; (4) chromospheric absorption lines such as Ni ii 1393.330 Å and 1335.203 Å are very strong; and (5) the 1700 Å images obtained with the Atmospheric Imaging Assembly on board the Solar Dynamics Observatory reveal intense and compact brightenings. These properties support the formation of these bombs in the photosphere, demonstrating that EBs can be heated much more efficiently than previously thought. We also demonstrate that the Mg ii k and h lines can be used to investigate EBs similarly to {{{H}}}α , which opens a promising new window for EB studies. The remaining four IBs obviously have no connection to EBs and they do not have the properties mentioned above, suggesting a higher formation layer, possibly in the chromosphere.

  16. Investigation Model for DDoS Attack Detection in Real-Time

    Directory of Open Access Journals (Sweden)

    Abdulghani Ali Ahmed

    2015-02-01

    Full Text Available Investigating traffic of distributed denial of services (DDoS attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack.

  17. Emergency assistance provided abroad to insured travellers from Australia following the Bali bombing.

    Science.gov (United States)

    Leggat, Peter A; Leggat, Frances W

    2004-02-01

    Background. On 12 October 2002, terrorist bombs detonated in the Kuta entertainment district of Bali, Indonesia, a popular tourist destination for Australian travellers. This study was designed to investigate travel insurance claims reported by travellers from Australia requiring emergency assistance and/or aeromedical evacuation, as well as to examine the role of travel insurance and emergency assistance companies, following the Bali bombing. Methods. In 2003, all claims reported, following the Bali bombing attack on 12 October 2002, to a major Australian travel insurance company were examined for those claims that described the use of the insurer's emergency assistance contractor by travellers in Bali following the bombing. Results. Thirteen insured travellers used the emergency assistance service following the Bali bombing. Six travellers cancelled their trip to Bali. Five travellers, who were already abroad cancelled their trip to Bali and one was given evacuation assistance. One traveller required aeromedical evacuation by scheduled aircraft with glass injuries resulting from the bomb blast, and there was also assistance provided to significant others following the death of one insured traveller as a direct consequence of the bombing. Two travellers sought only claiming and policy advice and no claim was made. The mean refund, where a travel insurance claim was made, was AUD1185.09 (SD=AUD3047.31). Conclusions. This study highlights the importance of travellers taking out appropriate travel insurance, which provides for emergency assistance. Travel insurance agencies do play some role after emergencies such as the Bali bombing. This assistance involves predominantly dealing with cancellation of travellers' intended visits to the affected area, but does also involve some assistance to travellers evacuating from the crisis, including some who require aeromedical evacuation. Travellers should be advised to seek travel health advice well before departure overseas

  18. Bomb-Pulse Chlorine-36 At The Proposed Yucca Mountain Repository Horizon: An Investigation Of Previous Conflicting Results And Collection Of New Data

    Energy Technology Data Exchange (ETDEWEB)

    J. Cizdziel

    2006-07-28

    Previous studies by scientists at Los Alamos National Laboratory (LANL) found elevated ratios of chlorine-36 to total chloride ({sup 36}Cl/Cl) in samples of rock collected from the Exploratory Studies Facility (ESF) and the Enhanced Characterization of the Repository Block (ECRB) at Yucca Mountain as the tunnels were excavated. The data were interpreted as an indication that fluids containing 'bomb-pulse' {sup 36}Cl reached the repository horizon in the {approx}50 years since the peak period of above-ground nuclear testing. Moreover, the data support the concept that so-called fast pathways for infiltration not only exist but are active, possibly through a combination of porous media, faults and/or other geologic features. Due to the significance of {sup 36}Cl data to conceptual models of unsaturated zone flow and transport, the United States Geological Survey (USGS) was requested by the Department of Energy (DOE) to design and implement a study to validate the LANL findings. The USGS chose to drill new boreholes at select locations across zones where bomb-pulse ratios had previously been identified. The drill cores were analyzed at Lawrence Livermore National Laboratory (LLNL) for {sup 36}Cl/Cl using both active and passive leaches, with the USGS/LLNL concluding that the active leach extracted too much rock-Cl and the passive leach did not show bomb-pulse ratios. Because consensus was not reached between the USGS/LLNL and LANL on several fundamental points, including the conceptual strategy for sampling, interpretation and use of tritium ({sup 3}H) data, and the importance and interpretation of blanks, in addition to the presence or absence of bomb-pulse {sup 36}Cl, an evaluation by an independent entity, the University of Nevada, Las Vegas (UNLV), using new samples was initiated. This report is the result of that study. The overall objectives of the UNLV study were to investigate the source or sources of the conflicting results from the previous

  19. Bomb-Pulse Chlorine-36 at the Proposed Yucca Mountain Repository Horizon: An Investigation of Previous Conflicting Results and Collection of New Data

    Energy Technology Data Exchange (ETDEWEB)

    Cizdziel, James

    2006-07-31

    Previous studies Los Alamos National Laboratory (LANL) found elevated ratios of chlorine-36 to total chloride (36Cl/Cl) in samples of rock collected from the Exploratory Studies Facility (ESF) at Yucca Mountain (YM). The data were interpreted as an indication that fluids containing “bomb-pulse” 36Cl reached the repository horizon in the ~50 years since the peak period of above-ground nuclear testing. Due to the significance of 36Cl data to conceptual models of unsaturated zone flow, the United States Geological Survey (USGS) implemented a study to validate the LANL findings. The USGS drilled new boreholes at select locations across zones where bomb-pulse ratios had previously been identified. The drill cores were analyzed at Lawrence Livermore National Laboratory (LLNL). Because consensus was not reached between the USGS/LLNL and LANL on several fundamental points including the presence or absence of bomb-pulse 36Cl, an evaluation by the University of Nevada, Las Vegas (UNLV), was initiated. The overall objectives of the UNLV study were to investigate the source of the validation study’s conflicting results, and to obtain additional data on bomb-pulse isotopes at the repository horizon. UNLV engaged in discussions with previous investigators, reviewed reports, and analyzed archived samples. UNLV also collected new samples of rock from the ESF, soil profiles from the surface of YM, and samples of seep water from inside the ESF. Samples were analyzed for 36Cl/Cl ratios, and 99Tc and 129I in select samples. A column experiment was conducted mimicking the passage of bomb-pulse 36Cl through YM tuff. The work faced several obstacles including an extended shutdown of the tunnel. Only one sample yielded a background corrected 36Cl/Cl ratio that was higher than the accepted bomb-pulse threshold (1250 x 10-15). Specimen 01034214 obtained from the Drill Hole Wash fault (19+33) had a ratio of 1590 ± 80 (1σ) x10-15, whereas the other separate sample from this fault zone

  20. Italian Bombs & Fuzes

    Science.gov (United States)

    1948-06-01

    withdrawal of the safety pin . The bomb 20.1., on account of its special method of suspension, has a recess cut in the tail, about half way along...Indication of arming :- safety pin and caps missing. To defuze these bombs. Lay the bombs carefully on their sides. Unscrew...bomb can be regarded as ALLWAYS action. (a) If the safety pin hole in the fuze spindle is visible 2 cm above the head of the fuze, the

  1. Bomb tests attack the food chain

    Energy Technology Data Exchange (ETDEWEB)

    Ruff, T. (Monash Medical School, Melbourne (Australia))

    1990-03-01

    Ciguatera poisoning, the most common type of fish poisoning in the world, has become a major public health problem in some parts of the South Pacific. This area has always been the site of periodic outbreaks, especially after severe storms or natural disasters that damage core reefs. But since World War II it has become evident that military activities and major construction projects that wreak havoc on corals also lead to ciguatera outbreaks. Extraordinarily high rates of ciguatera poisoning have occurred on the small Pacific islands that have been used for nuclear tests and on the islands that host the military infrastructures and activities that accompany the tests. This is true for both the Marshall Islands near Bikini and Eniwetok, where U.S. tests took place, and in French Polynesia, in the area around Moruroa Atoll where the French government continues to test. Ciguatera poisoning has a disastrous effect on people who depend on fishing as a way of life and on fish as the major source of protein. 10 refs.

  2. Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations

    Directory of Open Access Journals (Sweden)

    Wenjun Fan

    2017-01-01

    Full Text Available Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or take actions to help the adversary bypass the secure perimeter in front of the information-related resources so that the attacking goals can be completed. Though there are a number of security tools, such as firewalls and intrusion detection systems which are used to protect machines from being attacked, widely accepted mechanism to prevent dupe from fraud is lacking. However, the human element is often the weakest link of an information security chain, especially, in a human-centered environment. In this paper, we reveal that the human psychological weaknesses result in the main vulnerabilities that can be exploited by social engineering attacks. Also, we capture two essential levels, internal characteristics of human nature and external circumstance influences, to explore the root cause of the human weaknesses. We unveil that the internal characteristics of human nature can be converted into weaknesses by external circumstance influences. So, we propose the I-E based model of human weakness for social engineering investigation. Based on this model, we analyzed the vulnerabilities exploited by different techniques of social engineering, and also, we conclude several defense approaches to fix the human weaknesses. This work can help the security researchers to gain insights into social engineering from a different perspective, and in particular, enhance the current and future research on social engineering defense mechanisms.

  3. INVESTIGATION ON PROPERTIES OF CONCRETE CONTAINING NATURAL POZZOLAN VOLCANIC ORIGIN DUE TO SULFATE ATTACK

    OpenAIRE

    MERIDA AHCENE; KHARCHI FATTOUM

    2013-01-01

    Sulfate attack and its effects are important from both scientific and industrial viewpoints. It is perceived that concretes containing pozzolan have better performance in sulfate solutions, since the pozzolanic reactions reduce the quantity of calcium hydroxide and increase calcium silicate hydrate. This paper investigates thecontribution of natural pozzolan volcanic origin on the physico - mechanical and physico-chemical characteristics of the concretes. When it is coupled to a water reducin...

  4. Investigation on high angle of attack characteristics of hypersonic space vehicle

    Institute of Scientific and Technical Information of China (English)

    HUANG Wei; LI ShiBin; LIU Jun; WANG ZhenGuo

    2012-01-01

    The high angle of attack characteristics play an important role in the aerodynamic performances of the hypersonic space vehicle.The three-dimensional Reynolds Averaged Navier-Stokes (RANS) equations and the two-equation RNG k-ε turbulence model have been employed to investigate the influence of the high angle of attack on the lift-to-drag ratio and the flow field characteristics of the hypersonic space vehicle,and the contributions of each component to the aerodynamic forces of the vehicle have been discussed as well.At the same time,in order to validate the numerical method,the predicted results have been compared with the available experimental data of a hypersonic slender vehicle,and the grid independency has been analyzed.The obtained results show that the predicted lift-to-drag ratio and pitching moment coefficient show very good agreement with the experimental data in the open literature,and the grid system makes only a slight difference to the numerical results.There exists an optimal angle of attack for the aerodynamic performance of the hypersonic space vehicle,and its value is 20°.When the angle of attack is 20°,the high pressure does not leak from around the leading edge to the upper surface.With the further increasing of the angle of attack,the high pressure spreads from the wing tips to the central area of the vehicle,and overflows from the leading edge again.Further,the head plays an important role in the drag performance of the vehicle,and the lift percentage of the flaperon is larger than that of the rudderevator.This illustrates that the optimization of the flaperon configuration is a great work for the improvement of the aerodynamic performance of the hypersonic space vehicle,especially for a high lift-to-drag ratio.

  5. PCF INVESTIGATION TO IMPROVE THE PERFORMANCE OF TORA – BASED MANET AGAINST JAMMING ATTACKS

    Directory of Open Access Journals (Sweden)

    Sabbar Insaif Jasim

    2014-10-01

    Full Text Available Security in Mobile Ad Hoc Network became very important due to the nature of wireless communication between the nodes and the rapid movement of node which make Mobile Ad hoc Network vulnerable to Attackers. Jamming is a DoS attack’s special category used in wireless networks. The attacker disrespects the medium access control (MAC protocol and transmits on the shared channel; either periodically or continuously to target all or some communication, respectively. Distributed coordination function (DCF and Point coordination function (PCF are the two different media access control (MAC mechanisms which are specified by the IEEE 802.11standard. PCF can achieve higher throughput than DCF due to the nature of contention-free, therefore, this paper investigate the impact of PCF when integrated into the TORA – Based MANET and how it can improve the performance of the network. OPNET – Based simulation scenarios were created and the simulation was run and the results were collected which investigate that PCF provided a good functionality to improve deficiency caused by the Jammers this by increasing the throughput and decreasing the delay which is affected by the Jammers. PCF was a good improvement with different levels of Jammers’ transmission power.

  6. Korean atomic bomb victims.

    Science.gov (United States)

    Sasamoto, Yukuo

    2009-01-01

    After colonizing Korea, Japan invaded China, and subsequently initiated the Pacific War against the United States, Britain, and their allies. Towards the end of the war, U.S. warplanes dropped atomic bombs on Hiroshima and Nagasaki, which resulted in a large number of Koreans who lived in Hiroshima and Nagasaki suffering from the effects of the bombs. The objective of this paper is to examine the history of Korea atomic bomb victims who were caught in between the U.S., Japan, the Republic of Korea (South Korea) and the Democratic People's Republic of Korea (North Korea).

  7. Cluster bomb ocular injuries

    Directory of Open Access Journals (Sweden)

    Ahmad M Mansour

    2012-01-01

    Full Text Available Purpose: To present the visual outcomes and ocular sequelae of victims of cluster bombs. Materials and Methods: This retrospective, multicenter case series of ocular injury due to cluster bombs was conducted for 3 years after the war in South Lebanon (July 2006. Data were gathered from the reports to the Information Management System for Mine Action. Results: There were 308 victims of clusters bombs; 36 individuals were killed, of which 2 received ocular lacerations and; 272 individuals were injured with 18 receiving ocular injury. These 18 surviving individuals were assessed by the authors. Ocular injury occurred in 6.5% (20/308 of cluster bomb victims. Trauma to multiple organs occurred in 12 of 18 cases (67% with ocular injury. Ocular findings included corneal or scleral lacerations (16 eyes, corneal foreign bodies (9 eyes, corneal decompensation (2 eyes, ruptured cataract (6 eyes, and intravitreal foreign bodies (10 eyes. The corneas of one patient had extreme attenuation of the endothelium. Conclusions: Ocular injury occurred in 6.5% of cluster bomb victims and 67% of the patients with ocular injury sustained trauma to multiple organs. Visual morbidity in civilians is an additional reason for a global ban on the use of cluster bombs.

  8. Are IRIS bombs connected to Ellerman bombs?

    CERN Document Server

    Tian, Hui; He, Jiansen; Madsen, Chad

    2016-01-01

    Recent observations by the Interface Region Imaging Spectrograph (IRIS) have revealed pockets of hot gas ($\\sim$2--8$\\times$10$^{4}$ K) potentially resulting from magnetic reconnection in the partially ionized lower solar atmosphere (IRIS bombs; IBs). Using joint observations between IRIS and the Chinese New Vacuum Solar Telescope, we have identified ten IBs. We find that three are unambiguously and three others are possibly connected to Ellerman bombs (EBs), which show intense brightening of the extended H$_{\\alpha}$ wings without leaving an obvious signature in the H$_{\\alpha}$ core. These bombs generally reveal the following distinct properties: (1) The O~{\\sc{iv}}~1401.156\\AA{} and 1399.774\\AA{} lines are absent or very weak; (2) The Mn~{\\sc{i}}~2795.640\\AA{} line manifests as an absorption feature superimposed on the greatly enhanced Mg~{\\sc{ii}}~k line wing; (3) The Mg~{\\sc{ii}}~k and h lines show intense brightening in the wings and no dramatic enhancement in the cores; (4) Chromospheric absorption lin...

  9. INVESTIGATION ON PROPERTIES OF CONCRETE CONTAINING NATURAL POZZOLAN VOLCANIC ORIGIN DUE TO SULFATE ATTACK

    Directory of Open Access Journals (Sweden)

    MERIDA AHCENE

    2013-05-01

    Full Text Available Sulfate attack and its effects are important from both scientific and industrial viewpoints. It is perceived that concretes containing pozzolan have better performance in sulfate solutions, since the pozzolanic reactions reduce the quantity of calcium hydroxide and increase calcium silicate hydrate. This paper investigates thecontribution of natural pozzolan volcanic origin on the physico - mechanical and physico-chemical characteristics of the concretes. When it is coupled to a water reducing superplasticizer by a correct adjustment of the composition, it greatly improves the concrete properties. The analysis of the experimental results on pozzolan concrete at 5% content and sharpness of 9600cm2/g, in a sulphated environment, showed that it contributes positively to the improvement of its mechanical characteristics and its durability with respect towater absorption, and to the permeability to the chlorine ions as well as to the resistance to the sulphates.

  10. INDONESIAN SALAFISM ON JIHAD AND SUICIDE BOMBINGS

    Directory of Open Access Journals (Sweden)

    Rusli Rusli

    2014-06-01

    Full Text Available This paper deals with jihad and suicide bombings from the perspective of Indonesian salafism. It is argued that there are two different points of view related to this issue. The first is those who are affiliated with Wahhabi salafists such as those involved in Salafi-based foundations like As-Sunnah, Ihyaut Turats, al-Sofwah, Lajnah al-Khairiyah, Lajnah al-Istiqamah, and Wahdah Islamiyyah. They do not agree with suicide bombing directed to Western targets—mainly America—and its symbols. Suicide bombings are equivalent to killing oneself, and this is extremely forbidden in Islam. The second is Salafi-jihadists who have justified suicide bombing attacks to infidel targets and the symbols of tagut (false god. The reason is blowing oneself is not the same as committing suicide, for suicide is a sin. However, he is believed as carrying out “martyrdom operations”, sacrificing himself for the sake of the superior goal of defending his religion and community, while suicide is a hopeless deed performed by a person who kills himself for his own selfish reason.

  11. Integrated approach for investigating the durability of self-consolidating concrete to sulfate attack

    Science.gov (United States)

    Bassuoni, Mohamed Tamer F.

    The growing use of self-consolidating concrete (SCC) in various infrastructure applications exposed to sulfate-rich environments necessitates conducting comprehensive research to evaluate its durability to external sulfate attack. Since the reliability and adequacy of standard sulfate immersion tests have been questioned, the current thesis introduced an integrated testing approach for assessing the durability of a wide scope of SCC mixtures to external sulfate attack. This testing approach involved progressive levels of complexity from single to multiple damage processes. A new series of sulfate attack tests involving multiple field-like parameters and combined damage mechanisms (various cations, controlled pH, wetting-drying, partial immersion, freezing-thawing, and cyclic cold-hot conditions with or without sustained flexural loading) were designed to evaluate the performance (suitability) of the SCC mixtures under various sulfate attack exposure scenarios. The main mixture design variables of SCC included the type of binder (single, binary, ternary and quaternary), air-entrainment, sand-to-aggregate mass ratio and hybrid fibre reinforcement. The comprehensive database and knowledge obtained from this research were used to develop smart models (fuzzy and neuro-fuzzy inference systems) based on artificial-intelligence to evaluate and predict the performance of the SCC mixtures under various sulfate attack exposure regimes implemented in this study. In full immersion tests involving high concentration sodium and magnesium sulfate solutions with controlled pH, the low penetrability of SCC was responsible for the high durability of specimens. Ternary and quaternary cementitious systems with or without limestone materials provided a passivating layer, with or without acid neutralization capacity, which protected SCC from severe damage in the aggressive sulfuric acid and ammonium sulfate solutions. In contrast to conclusions drawn from the sodium sulfate immersion

  12. The effects of using Cesium-137 teletherapy sources as a radiological weapon (dirty bomb)

    CERN Document Server

    Liolios, Theodore

    2009-01-01

    While radioactive sources used in medical diagnosis do not pose a great security risk due to their low level of radioactivity, therapeutic sources are extremely radioactive and can presumably be used as a radiological weapon. Cobalt-60 and Cesium-137 sources are the most common ones used in radiotherapy with over 10,000 of such sources currently in use worldwide, especially in the developing world, which cannot afford modern accelerators. The present study uses computer simulations to investigate the effects of using Cesium-137 sources from teletherapy devices as a radiological weapon. Assuming a worst-case terrorist attack scenario, we estimate the ensuing cancer mortality, land contamination, evacuation area, as well as the relevant evacuation, decontamination, and health costs in the framework of the linear risk model. The results indicate that an attack with a Cesium-137 dirty bomb in a large metropolitan city (especially one that would involve several teletherapy sources) although would not cause any sta...

  13. Suicide bombing: a psychodynamic view.

    Science.gov (United States)

    Khalid, Uday; Olsson, Peter

    2006-01-01

    The horror and macabre images of suicide bombings appear regularly on television news programs around the world. A focused literature review of psychiatric interview and demographic data about suicide bombers is presented. Of particular clinical interest are the findings from the study of potential suicide bombers who were apprehended before they could act on their suicide bombing plans. The authors offer psychodynamic and social self-psychological theories explaining the phenomenon of suicide bombing behavior.

  14. TIGER -- A technology to improve the delivery capability of nuclear bombs and the survivability of the delivery aircraft

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1980-12-31

    The TIGER (Terminal guided and Extended-Range) Program was initiated in 1972 to study improved delivery capabilities for stockpiled tactical nuclear bombs. The Southeast Asia conflict fostered the development of air-delivered standoff conventional weapons utilizing terminal guidance systems. SNL initiated the TIGER program to determine if current nuclear bombs could be provided with a similarly accurate standoff capabilities. These conventional weapon delivery techniques, while allowing highly accurate attack, generally require entering the target area at high altitude to establish line of sight to the target. In parallel with the TIGER program, system studies analyzed this concept and showed marked improvement in aircraft and weapon survivability with moderate standoff (10--20 km) if low level deliveries (60 m) could be accomplished. As a result of this work, the TIGER program was redirected in early 1974 to demonstrate a standoff bomb with good accuracy (90 m CEP) when delivered from low flying aircraft. This program redirection resulted in the selection of an inertial guidance system to replace the earlier terminal guidance systems. This program was called the Extended-Range Bomb (ERB). In May 1974, a joint Air Force/DOE study identified the desirability of having a single tactical weapon which could be employed against either fixed, preselected targets, or mobile battlefield targets. Studies conducted on the ERB system showed that the inertially guided weapon could fly not only the standoff mission but also a return-to-target mission against the mobile battlefield targets whose locations are not known accurately enough to use a standoff delivery. The ERB program evolved from these initial investigations into an exploratory program to develop the hardware and demonstrate the technology required to fly standoff and return-to-target trajectories. The application of this technology in the form of field retrofit kits to the B61 bomb is called TIGER II.

  15. Experimental investigation of separated shear layer from a leading edge subjected to various angles of attack with tail flap deflections

    Indian Academy of Sciences (India)

    K Anand; S Sarkar

    2015-05-01

    Shear layer development over a thick flat plate with a semi-circular leading edge is investigated for a range of angles of attack under different pressure gradients for a Reynolds number of 2.44×105 (based on chord and free-stream velocity). The characteristics of the separated shear layer are very well documented through a combination of surface pressure measurement and smoke flow visualization. The instability of the separated layer occurs because of enhanced receptivity of perturbations leading to the development of significant unsteadiness and three-dimensional motions in the second-half of the bubble. The onset of separation, transition and the point of reattachment are identified for varying angles of attack and pressure gradients imposed by tail flap deflections. The data concerning bubble length, laminar portion and reattachment points agree well with the literature.

  16. Analysis of Al-Qaeda Terrorist Attacks to Investigate Rational Action

    Directory of Open Access Journals (Sweden)

    Daniel P. Hepworth

    2013-04-01

    Full Text Available Many studies have been conducted to demonstrate the collective rationality of traditional terrorist groups; this study seeks to expand this and apply collective rationality to Islamic terrorist groups. A series of statistical analyses were conducted on terrorist attacks carried out by Al-Qaeda and affiliated terrorist organization; these were then compared to two more conventional terrorist groups: the Euskadi Ta Askatasuna (ETA and the Liberation Tigers of Tamil Eelam (LTTE. When viewed through the context of the groups’ various motivations and objectives, the results of these analyses demonstrates collective rationality for those terrorist groups examined. 

  17. Ellerman bombs: fallacies, fads, usage

    CERN Document Server

    Rutten, Robert J; van der Voort, Luc H M Rouppe; Sütterlin, Peter; Vitas, Nikola

    2013-01-01

    Ellerman bombs are short-lived brightenings of the outer wings of Halpha that occur in active regions with much flux emergence. We point out fads and fallacies in the extensive Ellerman bomb literature, discuss their appearance in various spectral diagnostics, and advocate their use as indicators of field reconfiguration in active-region topography using AIA 1700 A images.

  18. Penetrating Cardiac and Hepatic Injury; Polytrauma of a Child After Bombing

    Directory of Open Access Journals (Sweden)

    Baris Akca

    2013-10-01

    Full Text Available After a bombing attack, patients were brought into hospital suffering from a combination of injuries caused by the blast, penetrating injuries and burns which as a case of polytrauma. In penetrating thoracoabdominal injuries due to bombing possibility of cardiac injury should be kept in mind. Penetrating cardiac injuries in children are rare but has a high mortality and morbidity. In some cases there may be difficulty in diagnosis of penetrating cardiac injury. In this case we want to share the diagnosis, treatment and follow-up processes of penetrating cardiac and hepatic injury with burns of a politrauma child due to bombing.

  19. Dirty Bombs: A Discouraging Second Look

    Science.gov (United States)

    Loeb, Cheryl A.

    2004-05-01

    Dirty bombs, terrorist devices to spread intensely radioactive material with the intent to kill, sicken, or inflict economic damage, have been overestimated by some in the government and underestimated by many physicists. It is unlikely that a radiological dispersion device (RDD) will contaminate an area to such a level that brief exposures are lethal or even incapacitating. However, careful examination of the consequences of the accident in Goiânia, Brazil shows that it is highly likely that people in the contaminated region will inhale or ingest dusty or liquid radioactive material in sufficient quantities to cause acute radiation sickness, and in some cases enough to kill. Some forms of radiological attack could kill tens or hundreds of people and sicken hundreds or thousands. This paper provides a general overview of the nature and use of RDDs and examines readily available sources of large quantities of radioactive material, material which requires significantly greater protection than it is afforded today. Under many circumstances an RDD containing only a few curies of cesium-137, strontium-90, cobalt-60 or other industrial isotopes could force the razing of more buildings and inflict greater economic losses than did the September 11, 2002 attacks on the World Trade Center and the Pentagon. The National Defense University study proposes new policies for the federal government which would decrease the chances of an attack and reduce the cost in lives and money to the United States should one, nevertheless, occur.

  20. An investigation into the effectiveness of bibliotherapy and minimal contact interventions in the treatment of panic attacks.

    Science.gov (United States)

    Febbraro, Greg A R

    2005-06-01

    The present study investigated the effectiveness of bibliotherapy and minimal therapist-contact interventions in the treatment of panic attacks. Individuals were randomly assigned to one of three conditions: (1) bibliotherapy alone (BT); (2) bibliotherapy plus phone contact (BT+PC); or (3) phone contact alone (PC). Assessment (pre- and post-treatment) and treatment (8 weeks in duration) were conducted via mail and phone. Individuals receiving BT and BT+PC exhibited significant reductions from pre- to post-treatment on panic cognitions and fear of having a panic attack. Individuals receiving BT+PC exhibited significant reductions from pre- to post-treatment on panic symptoms and avoidance. In addition, individuals in the BT and BT+PC groups were more likely to exhibit clinically significant improvement on most dependent measures relative to PC alone. On some measures, individuals in the BT+PC group did clinically better than individuals in the BT group. Results of the present study also suggest that diagnosis may play some role in outcome.

  1. Worry, Worry Attacks, and PTSD among Cambodian Refugees: A Path Analysis Investigation

    OpenAIRE

    Hinton, Devon E.; Nickerson, Angela; Bryant, Richard A

    2011-01-01

    Among traumatized Cambodian refugees, this article investigates worry (e.g., the types of current life concerns) and how worry worsens posttraumatic stress disorder (PTSD). To explore how worry worsens PTSD, we examine a path model of worry to see whether certain key variables (e.g., worry-induced somatic arousal and worry-induced trauma recall) mediate the relationship between worry and PTSD. Survey data were collected from March 2010 until May 2010 in a convenience sample of 201 adult Cambo...

  2. The philosophy of bombs. The theoretical foundations of terrorist attacks

    OpenAIRE

    Kreibohm, Patricia

    2011-01-01

    El objetivo de este artículo es examinar las bases esenciales de la filosofía terrorista; es decir, el núcleo duro de Ia convicción que anima a sus actores y que subyace a sus ideas políticas, a sus demandas, ideologías y doctrinas. Con este propósito, el análisis se ha centrado en Io que hemos denominado los cinco pilares de la filosofía terrorista: la necesidad, la legitimidad, la eficacia, la capacidad para propagar el miedo y el valor propagandístico de sus acciones The goal of this ar...

  3. Terrorism in Two Cultures: Stress and Growth Following September 11 and the Madrid Train Bombings

    Science.gov (United States)

    Steger, Michael F.; Frazier, Patricia A.; Zacchanini, Jose Luis

    2008-01-01

    In this study, we compared the prevalence of post traumatic stress disorder (PTSD) and posttraumatic growth following the September 11, 2001, attacks in the United States and the March 11, 2004, Madrid, Spain train bombings. We also examined meaning in life as a correlate of posttrauma outcomes. A sample of midwestern college students (N = 188)…

  4. Peace and the Atomic Bomb

    Energy Technology Data Exchange (ETDEWEB)

    Bradbury, Norris E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Meade, Roger Allen [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    1948-12-02

    A little over three years after assuming the directorship of the Los Alamos Scientific Laboratory, Norris Bradbury returned to his alma mater, Pomona College, and delivered one of his first extended speeches regarding the atomic bomb. Bradbury noted that although the atomic bomb had brought a “peace of kind,” ending World War II, the bomb also had become, without much thought, a “factor in the political, military, and diplomatic thinking of the world.” Bradbury hoped his speech, given to both the faculty and student body of Pomona, would give his audience a foundation on which to assess and understand the new world the bomb had ushered into existence. Bradbury’s talk was quickly printed an distributed by Pomona College and, later, reprinted in The Physical Review (Volume 75, No. 8, 1154-1160, April 15, 1949). It is reprinted here, for a third time, as a reminder of the early days of Los Alamos and its role in international affairs. "Slightly more that three years ago, this country brought to an end the most catastrophic war in history. The conflict had been characterized by an unremitting application of science to the technology of destruction. The final use of the atomic bomb, however, provided a climax so striking that the inevitable nature of future wars was illustrated with the utmost clarity. Peace of a kind followed the first military use of atomic weapons, but international understanding did not, and the atomic bomb became a factor in the political, military, and diplomatic thinking of the world. Where do we now stand in all this? What are the costs and the rewards? Where are we going? These are some of the things that I would like to discuss with you this morning."

  5. When the Japanese Bombed the Huertgen Forest: How the Army’s Investigation of Pearl Harbor Influenced the Outcome of the Huertgen Forest, Major General Leonard T. Gerow and His Command of V Corps from 1943-1945

    Science.gov (United States)

    2011-05-19

    disassociation by long time friends and superiors was a terrible blow to his ego and confidence to lead. Gerow, who prior to the investigation, thought he...Corps commander was more demur than Eisenhower’s. He described Gerow as “conscientious, self -confident and steady.”77 His words of endorsement were...38 November and had only entered the line a week prior the German attack.116 Its initial task was to occupy a quiet sector of the American front

  6. Bombe udstiller Sinn Feins dilemma

    DEFF Research Database (Denmark)

    2010-01-01

    Natten til mandag den 12. april sprang en bombe lige udenfor Belfast. Hverken tid eller sted var tilfældigt. Bomben sprang nemlig på den dag, hvor det justitspolitiske område blev overført til Nordirland. Og den sprang lige bagved den bygning hvor den britiske sikkerhedstjeneste MI5 har deres nye...

  7. Investigation of normal force and moment coefficients for an AUV at nonlinear angle of attack and sideslip range

    Digital Repository Service at National Institute of Oceanography (India)

    Barros, E.A. de; Dantas, J.L.D.; Pascoal, A.M.; Desa, E.S.

    of angles of attack considered. In contrast with the traditional ASE formulations used in naval and aircraft fields, an improved methodology is introduced that takes advantage of the qualitative information obtained from CFD flow visualizations...

  8. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  9. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  10. What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response.

    Directory of Open Access Journals (Sweden)

    Jeannette Sutton

    Full Text Available Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials' Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events.

  11. Pure Nuclear Fusion Bomb Propulsion

    OpenAIRE

    Winterberg, F.

    2008-01-01

    Recent progress towards the non-fission ignition of thermonuclear micro-explosions raises the prospect for a revival of the nuclear bomb propulsion idea, both for the fast transport of large payloads within the solar system and the launch into earth orbit without the release of fission products into the atmosphere. To reach this goal three areas of research are of importance: 1)Compact thermonuclear ignition drivers. 2)Fast ignition and deuterium burn. 3)Space-craft architecture involving mag...

  12. Medical Effects of Atomic Bombs. The Report of the Joint Commission for the Investigation of the Effects of the Atomic Bomb in Japan; Volume 2. Section 4H. Materials and Methods (Hiroshima. Section 4N. Materials and Methods (Nagasaki). Section 5H. Clinical Observations in Hiroshima. Section 5N. Clinical Observations in Nagasaki

    Science.gov (United States)

    1951-04-19

    multiple lacerations. Leg held in semi fixed position on account of d IL --. Fig. 6 (5H)--Telephone pole at Meiji bridge. 1300 meters. Shadow of...side of face. Bomb to left and anteriorly of Patient. I Deep chocolate brown mask of pigmentation. Sharp v-line of neck. Burns . over left deltoid...scorched. Typical prof i le burn with deep chocolate -brown pigmentation. Very sharp outline. Protection of upper portjon of neck by mandibular shading

  13. Degradation of self-compacting concrete (SCC) due to sulfuric acid attack: Experiment investigation on the effect of high volume fly ash content

    Science.gov (United States)

    Kristiawan, S. A.; Sunarmasto; Tyas, G. P.

    2016-02-01

    Concrete is susceptible to a variety of chemical attacks. In the sulfuric acid environment, concrete is subjected to a combination of sulfuric and acid attack. This research is aimed to investigate the degradation of self-compacting concrete (SCC) due to sulfuric acid attack based on measurement of compressive strength loss and diameter change. Since the proportion of SCC contains higher cement than that of normal concrete, the vulnerability of this concrete to sulfuric acid attack could be reduced by partial replacement of cement with fly ash at high volume level. The effect of high volume fly ash at 50-70% cement replacement levels on the extent of degradation owing to sulfuric acid will be assessed in this study. It can be shown that an increase in the utilization of fly ash to partially replace cement tends to reduce the degradation as confirmed by less compressive strength loss and diameter change. The effect of fly ash to reduce the degradation of SCC is more pronounced at a later age.

  14. Earthquakes induced by deep penetrating bombing?

    Institute of Scientific and Technical Information of China (English)

    Serguei Yu. Balassanian

    2005-01-01

    The data of M≥5 earthquakes occurred in one year before and after 4 deep penetrating bombs in the region within 500 km and 1 000 km from the shooting site are presented. The 4 bombs are those happened in 1999 Kosovo of Yugoslavia, the 1991 Baghdad of Iraq, the 2001 Tora Bora of Afghanistan, and the 2003 Kirkuk of Iraq, respectively. The data indicate that the deep penetrating bombs may have remotely triggered some earthquakes. The deep penetrating bombs in seismically active regions should be forbidden.

  15. Modelling vapour transport in Surtseyan bombs

    Science.gov (United States)

    McGuinness, Mark J.; Greenbank, Emma; Schipper, C. Ian

    2016-05-01

    We address questions that arise if a slurry containing liquid water is enclosed in a ball of hot viscous vesicular magma ejected as a bomb in the context of a Surtseyan eruption. We derive a mathematical model for transient changes in temperature and pressure due to flashing of liquid water to vapour inside the bomb. The magnitude of the transient pressure changes that are typically generated are calculated together with their dependence on material properties. A single criterion to determine whether the bomb will fragment as a result of the pressure changes is derived. Timescales for ejection of water vapour from a bomb that remains intact are also revealed.

  16. Confronting the bomber: coping at the site of previous terror attacks.

    Science.gov (United States)

    Strous, Rael D; Mishaeli, Nurit; Ranen, Yaniv; Benatov, Joy; Green, Dovid; Zivotofsky, Ari Z

    2007-03-01

    Terror exposure has become commonplace in Israel, with civilians needing to develop appropriate coping mechanisms. This study investigated coping mechanisms of those who are able to return to leisure activity at sites of previous terror attacks. A specially designed questionnaire, exploring knowledge of the terror event, previous terror exposure, coping mechanisms, state of anxiety, and mood, was administered to 93 restaurant attendees at sites of well-known recent terror attacks (2001-2005). Most respondents were aware of the previous terror attack (92.3%) and most reported no fear at revisiting (70.3%), with 20.9% reporting some anxiety and 5.5% reporting moderate or severe anxiety. Sixty percent reported that they have no fear that a terror attack will reoccur at the same place. Some (27.7%) reported change in practices or decrease in one or more activity, especially use of public transport (18%). The most helpful reported resource for facilitating stress coping following a suicide bombing was to "call or be in touch with friends or relatives," and least helpful was "medicines." Over half of respondents (53%) reported that the current security climate affected their mood. Older individuals and females were more affected by terror events. Study observations confirm that resilience develops in the general population in response to ongoing terror attacks. Response to terror is heterogeneous with a range of coping mechanisms expressed.

  17. Anatomy of the Lockerbie bombing: Libya’s role and reactions to al-Megrahi’s release.

    Directory of Open Access Journals (Sweden)

    K. J. Ani

    2015-04-01

    Full Text Available Despite its long historical antecedents, terrorism is amongst the growing realities of the national history of contemporary sovereign states. With this emergence, destabilizing influence, and internationalization, terrorism has made the associated security challenge a major diplomatic headache for all key international actors and diplomats. This paper, which adopts a theoretical approach, assesses claims that Ghadafi’s Libya championed state-sponsored terrorism. It reviews the Lockerbie bombing and the conviction of al-Megrahi by the court in Netherland as well as his release from Scottish prison on compassionate grounds. It examines Libya’s use of available diplomatic tools and channels not only to prevent Abdelbaset Ali Mohammed al-Megrahi from facing justice but also to attain Ghadafi’s political and economic interests. This article documents the political communication that followed his release and calls for increased diplomatic investigations of the Lockerbie terrorist attack. Finally, the paper beckons on Libya’s new leaders and the leaderships of USA and Scotland to engage in a progressive multilateral strategic cooperation to unravel further facts on the Lockerbie bombing while promoting the current international “war” against terrorism

  18. Pure Nuclear Fusion Bomb Propulsion

    CERN Document Server

    Winterberg, F

    2008-01-01

    Recent progress towards the non-fission ignition of thermonuclear micro-explosions raises the prospect for a revival of the nuclear bomb propulsion idea, both for the fast transport of large payloads within the solar system and the launch into earth orbit without the release of fission products into the atmosphere. To reach this goal three areas of research are of importance: 1)Compact thermonuclear ignition drivers. 2)Fast ignition and deuterium burn. 3)Space-craft architecture involving magnetic insulation and GeV electrostatic potentials

  19. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  20. 效益最优视角下的我国视频侦查工作进路--基于周克华案、波士顿马拉松爆炸案、伦敦地铁爆炸案的比较研究%Study on the Working Approach of our Video Investigation from the Perspective of Optimal Effectiveness---Based on Comparative Case Studies of Zhou Ke-hua Case, Boston Marathon Bombing and the London Subway Bombing

    Institute of Scientific and Technical Information of China (English)

    孔令勇

    2014-01-01

    The implementation of our video investigation work involves condition of investment and effect .Bas-ic parameter, investment and effect of Zhou Ke-hua case, Boston Marathon Bombing case and London Subway Bombings Case are specific indexes of evaluating video investigation .Optimal effectiveness of video investigation is the maximization of investigation efficiency with limited cost .The economic model of optimal effectiveness of video investigation includes ideal and real functions .Optimal effectiveness of video investigation should also take content of law and sociology into consideration .Working approach of China's video investigation from the perspective of op-timal effectiveness is a integral project which involves theory , hardware , staff and mechanism .%我国视频侦查工作的实施状况包括投入与效果两个层面。周克华案、波士顿马拉松爆炸案、伦敦地铁爆炸案中的案件基本参数状况、资源投入状况与收益状况是评价视频侦查工作实施状况的具体指标。视频侦查工作效益最优是指在视频侦查资源成本投入一定的情况下实现侦查效益的最大化。视频侦查工作效益最优的经济学模型包括理想与现实状态两种函数。视频侦查工作的效益最优还应当兼顾法学与社会学领域的内容。效益最优视角下的我国视频侦查工作进路是一种体系化的工作形式,由原理、硬件、人员与机制四个层面的内容组成。

  1. Development of the experimental setup for investigation of latching of superconducting single-photon detector caused by blinding attack on the quantum key distribution system

    Directory of Open Access Journals (Sweden)

    Elezov M.S.

    2017-01-01

    Full Text Available Recently bright-light control of the SSPD has been demonstrated. This attack employed a “backdoor” in the detector biasing scheme. Under bright-light illumination, SSPD becomes resistive and remains “latched” in the resistive state even when the light is switched off. While the SSPD is latched, Eve can simulate SSPD single-photon response by sending strong light pulses, thus deceiving Bob. We developed the experimental setup for investigation of a dependence on latching threshold of SSPD on optical pulse length and peak power. By knowing latching threshold it is possible to understand essential requirements for development countermeasures against blinding attack on quantum key distribution system with SSPDs.

  2. The grave is wide: the Hibakusha of Hiroshima and Nagasaki and the legacy of the Atomic Bomb Casualty Commission and the Radiation Effects Research Foundation.

    Science.gov (United States)

    O'Malley, Gerald F

    2016-07-01

    Following the atomic bomb attacks on Japan in 1945, scientists from the United States and Japan joined together to study the Hibakusha - the bomb affected people in what was advertised as a bipartisan and cooperative effort. In reality, despite the best efforts of some very dedicated and earnest scientists, the early years of the collaboration were characterized by political friction, censorship, controversy, tension, hostility, and racism. The 70-year history, scientific output and cultural impact of the Atomic Bomb Casualty Commission and the Radiation Effects Research Foundation are described in the context of the development of Occupied Japan.

  3. Dynamic processes associated with the eastern Mediterranean 'bomb' of 2004

    Science.gov (United States)

    Karacostas, T. S.; Brikas, D.; Pytharoulis, I.

    2010-09-01

    The meteorological "bomb" of the 21st and 22nd of January 2004, that affected the eastern Aegean Sea with very strong winds reaching 80 kts, excessive rain and even snow, with accumulations of at least one (1) meter on Limnos island and mean sea-level pressure at the record level of 972 hPa on Ikaria island, is studied from the synoptic and mostly dynamic concept. Lagouvardos and co-authors have already proved that the upper tropospheric PV anomaly was a necessary ingredient of the explosive cyclogenesis and the latter was attributed to the merger of troughs coming from North Africa and Europe. The present study is mainly concerned with the dynamic processes that led to the explosive cyclogenesis of 21 - 22 January 2004. Relying upon the use of the original ECMWF data information, a serious attempt is made to investigate, verify and justify the space and time of the "bomb explosion", the accompanied characteristics and the reasons causing the cyclolysis. Upper and lower tropospheric level forcing mechanisms are identified and monitored and a quantitative dynamical picture is provided for the explosively (pre) cyclogenetic period. The explosive cyclogenesis begins in Gabes Sea, just off the Libyan coast, the low forming on a frontogenetically active occlusion of a Saharan depression, when a tropopause fold/upper level front system crosses aloft. The occlusion is traced back to the Sahara desert, as a low level convergence/frontal zone, along which Qs vectors indicate an anticyclonic rotation of the warm part of the front. Dynamic tropopause maps show significant cold air advection just upstream the area of surface cyclogenesis on the 21st of January 2004. Consequently, an upper level vortex forms, which perturbs the thermal field, maximizing Q vector convergence above the bomb. Gradually the role of the tropopause decreases, as the upper level front system weakens. During these initial stages, when the low level vortex of the bomb is not yet well defined, the

  4. Experimental Investigation of 3-D flow fields around the mouth of the Dwarf Seahorse during attacks on planktonic prey

    Science.gov (United States)

    Gemmell, Brad; Buskey, Edward; Sheng, Jian

    2009-11-01

    Copepods are an important planktonic food source for fish species. High predation has led to the development of effective escape responses with short reaction times (less than 2 ms), maximum escape velocities of over 500 body lengths per second and shear sensitivity as low as 1.5s-1. Using high speed digital holography (2 kfps), we measure 3-D distributions of velocity generated by a dwarf seahorse (Hippocampus zosterae) during attacks on its copepod prey, Acartia tonsa. It is found that successful attacks often produce smaller or even no detectable hydrodynamic disturbances around the strike zone, when compared to unsuccessful attempts. In this paper, we will provide quantitative characterization of this ``low-flow'' zone. Further, to elucidate the role of a possible geometrical advantage of the seahorse's head in minimizing its bow wave, high-speed time resolved PIV measurements are conducted in a low-speed water tunnel. On-going analysis will provide insights and implications in understanding the dynamics of flows around the stagnation point at high Reynolds number flow. Sponsored by NSF.

  5. Surveys right after the atomic bombing and a relief squad

    Energy Technology Data Exchange (ETDEWEB)

    Mine, Mariko [Nagasaki Univ. (Japan). School of Medicine

    1998-12-01

    An outline of four survey reports right after the atomic bombing in Nagasaki and Hiroshima is introduced. The report of Manhattan District Atomic Bomb Investigating Groups: The subjects of this survey were 900 inpatients in Nagasaki (for 16 days from September 20) and Hiroshima (for 5 days from October 3). Two hundreds and forty-nine patients (16%) died. In cases died without injury, the severe symptoms were alopecia, purpura, hemorrhage, oral cavity and pharynx lesion, vomiting, diarrhea and fever. The residual radioactivity measured at six weeks later was 6-25 roentgen in Hiroshima and 30-110 roentgen in Nagasaki (Nishiyama riverhead area). These values were lower than the predicted value from the clinical consequence. The report of Joint Commission for the Investigation of the Atomic Bomb: Following the above survey, about 6500 subjects were investigated both in Nagasaki and Hiroshima. Incidence of alopecia was investigated by shielded situation at a spot of 2.1 to 2.5 km from a blast center. It was 7.2% of outdoors (shielded: 7.3%, non-shielded: 17.4%) and 2.9% of indoors. The report of the Special Committee for Atomic Bomb Casualty Investigation and Research of the Scientific Research Council of Japan: General part of the report consists of medical part and physical part, and reports from each university were classified and listed in the supplement. Survey of Nagasaki Medical College (not in public): About 8000 subjects were investigated from October to December. Data were gathered up about lethality, time of death, injury and radiation sickness, etc. There was also autograph of a relief squad of the Nagasaki Medical College. (K.H.)

  6. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  7. Allometric relationships of the dentition of the great White Shark, Carcharodon carcharias, in forensic investigations of shark attacks.

    Science.gov (United States)

    Nambiar, P; Bridges, T E; Brown, K A

    1991-06-01

    As a result of a systematic morphometric study of shark dentitions, a system of notation for describing the location of shark teeth has been developed and is proposed as a standard to be adopted for use in similar studies in the future. The macroscopic morphology of White Shark teeth has been characterised in order to gain quantitative data which might assist in identification of these sharks from bite marks on victims or objects or from shark carcasses. Using these data, a nomogram has been developed which can be used to estimate the body length of a White Shark from measurements of tooth or bite mark morphology. An example of the forensic application of such allometric data is provided as it applied to a recent fatal attack on a diver by a White Shark.

  8. The Research of Session Attack and Investigation Method%Session欺骗攻击技术及调查方法研究

    Institute of Scientific and Technical Information of China (English)

    徐国天

    2014-01-01

    Session certiifcation is a common identity recognition mechanism of dynamic website. Most websites use this mechanism to prevent unauthorized access. If the user is not authenticated, then browse to a restricted access page, the site can't read legitimate session_id from the HTTP packet, illegal visitors will be redirected to the login page. Hacker use Session attack to capture the victim's session id, and login to the site by this value. Finally, he can get the victim's identity. If victim is an administrator, then hacker can modify the website data, even plant Trojan, leading to greater harm. It is a serious threat to the security of information network. The research of session attack and investigation method is important to forensic. The key to the successful implementation of session attack is to obtain session_id of legitimate users. Research group found no relevant research results about clue survey area of session spooifng attack.In this paper, three methods to capture session_id are studied such as switch MAC address table "aging" phenomenon, MAC-PORT attack and XSS attack. Investigation method of session attack is also studied.%Session认证是目前动态网站常用的一种身份识别机制,目前大多数网站利用session认证机制防止非授权访问。如果用户没有通过身份认证,就请求浏览某个限制访问的页面,网站不能从HTTP请求报文中读出合法的session_id,通常就会将非法访问者重定向到登录页面。session欺骗是指攻击者截获受害者的session_id,使用该值登录站点,进而获得合法用户的身份。如果他获得的是管理员身份,那么他就可以修改网站数据,甚至在主页中植入木马,造成更大的危害。这种攻击方式对信息网络安全构成严重威胁,研究session攻击技术及线索调查方法对公安机关的调查、取证工作有重要意义。session欺骗攻击成功实施的关键在于获得合法用户的session_id值

  9. Pros and cons on ''Hitlers' bomb''. Studies on nuclear research in Germany; Fuer und Wider ''Hitlers Bombe''. Studien zur Atomforschung in Deutschland

    Energy Technology Data Exchange (ETDEWEB)

    Karlsch, R.; Petermann, H. (eds.)

    2007-07-01

    This book reveals a sensation: Under supervision of the SS German scientists tested 1944/45 nuclear bombs on Ruegen and in Thuringia. During this period several hundred prisoners of war and prisoners died. Besides proofs for nuclear weapon testing the author also found a draft for a patent on plutonium bombs and discovered the first functioning German atom reactor in the environs of Berlin. The succeeding book titled above enlarges the spectra of contributions from Saenger PLan to attack New York, researches on minimization of critical mass, the attempt to calculate TNT-equivalence as the presentation of important acteurs occuring during the researches. (GL)

  10. Investigation of the pathophysiological mechanisms of migraine attacks induced by pituitary adenylate cyclase-activating polypeptide-38

    DEFF Research Database (Denmark)

    Amin, Faisal Mohammad; Hougaard, Anders; Schytz, Henrik W

    2014-01-01

    Pituitary adenylate cyclase-activating polypeptide-38 (PACAP38) and vasoactive intestinal polypeptide are structurally and functionally closely related but show differences in migraine-inducing properties. Mechanisms responsible for the difference in migraine induction are unknown. Here, for the ......Pituitary adenylate cyclase-activating polypeptide-38 (PACAP38) and vasoactive intestinal polypeptide are structurally and functionally closely related but show differences in migraine-inducing properties. Mechanisms responsible for the difference in migraine induction are unknown. Here......, for the first time, we present a head-to-head comparison study of the immediate and long-lasting observations of the migraine-inducing, arterial, physiological and biochemical responses comparing PACAP38 and vasoactive intestinal polypeptide. In a double-blind crossover study 24 female migraine patients without...... the start of PACAP38 infusion only in those patients who later reported migraine attacks. Blood levels of vasoactive intestinal polypeptide and tryptase were unchanged after PACAP38 infusion. In conclusion, PACAP38-induced migraine was associated with sustained dilatation of extracranial arteries...

  11. UV spectra, bombs, and the solar atmosphere

    CERN Document Server

    Judge, Philip G

    2015-01-01

    A recent analysis of UV data from the Interface Region Imaging Spectrograph {\\em IRIS} reports plasma "bombs" with temperatures near \\hot{} within the solar photosphere. This is a curious result, firstly because most bomb plasma pressures $p$ (the largest reported case exceeds $10^3$ dyn~cm$^{-2}$) fall well below photospheric pressures ($> 7\\times10^3$), and secondly, UV radiation cannot easily escape from the photosphere. In the present paper the {\\em IRIS} data is independently analyzed. I find that the bombs arise from plasma originally at pressures between $\\lta80$ and 800 dyne~cm$^{-2}$ before explosion, i.e. between $\\lta850$ and 550 km above $\\tau_{500}=1$. This places the phenomenon's origin in the low-mid chromosphere or above. I suggest that bomb spectra are more compatible with Alfv\\'enic turbulence than with bi-directional reconnection jets.

  12. Increased relative risk of myelodysplastic syndrome in atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Oda, Kenji [Hiroshima City Hospital (Japan); Kimura, Akiro; Matsuo, Tatsuki; Tomonaga, Masao; Kodama, Kazunori; Mabuchi, Kiyohiko

    1998-12-01

    It was investigated what blood disorders except leukemia increased the relative risk with dose dependency in atomic bomb survivors. Subjects were 217 patients of atomic bomb survivors in Hiroshima and Nagasaki, who had blood disorders except leukemia and died between 1950 and 1990. Their medical records were analyzed and their diagnoses were reevaluated. Sixteen cases were diagnosed as the aplastic anemia and 12 as the myelodysplastic syndrome (MDS). In the aplastic anemia, there was no correlation between the exposure dose and the mortality. In MDS, the excess relative risk (ERR)/bone marrow exposure dose of 1 Sv was very high (13.0). These results supports the hypothesis that MDS would be broken out by the clonal abnormality of the hematopoietic stem cell and radiation exposure could cause the appearance of the abnormal stem cell clone. (K.H.)

  13. Small Diameter Bomb Increment II (SDB II)

    Science.gov (United States)

    2015-12-01

    Bomb Increment II (SDB II) DoD Component Air Force Joint Participants Department of the Navy Responsible Office References SAR Baseline ( Production ...Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-439 Small Diameter Bomb Increment II (SDB II) As of FY 2017 President’s Budget Defense...Funding 19 Low Rate Initial Production 31 Foreign Military Sales 32 Nuclear Costs 32 Unit Cost 33 Cost Variance 36 Contracts

  14. Investigation of psychiatric nurses suffering from patientsˊ attacks%精神科护士遭受患者攻击的调查

    Institute of Scientific and Technical Information of China (English)

    吕纪珍

    2016-01-01

    Objective:To investigate psychiatric nurses suffering from patientsˊ attack. Methods:POPAS(perception of the prevalence of aggression scale)was be used to investigate 140 psychiatric nurses of Taian City,and the perception of factors were ana-lyzed. Results:The 140 subjects perceived the highest frequency of five attacks occurred:the plain language attack(shouting,cur-sing),minor physical violence(shoving,kicking),passive-aggressive behavior(irritability,resistance),insulting attack behavior (abuse),and the patientˊs own mild violence(head against the wall,etc. )The total variance of gender,job title,work experience, and the combined effects on perception of aggressive behaviors was 28% . Conclusions:The male nurses have more perception of ag-gressive behavior than female nurses,and the nurses with high titles and more than five yearsˊ work experience can perceive more ag-gressive behavior.%目的:了解精神科护士遭受患者攻击的现状。方法:采用攻击行为发生情况感知量表(POPAS)对本市140名精神科护士进行调查,并分析影响其感知的因素。结果:140名研究对象感知发生频率最高的5种攻击行为:普通语言攻击(喊叫,咒骂)、身体轻微暴力(推搡,踢打)、被动攻击(易激怒,抵抗)、侮辱性攻击(辱骂)、患者自身轻微暴力(头撞墙等)。性别、职称、工作年限,共同影响对攻击行为感知情况总变异为28%。结论:男护士在感知攻击行为多于女护士,而高职称及超过5年工作年限的护士能更易感知攻击行为。

  15. Bombs, flyin' high. In-flight dynamics of volcanic bombs from Strombolian to Vulcanian eruptions.

    Science.gov (United States)

    Taddeucci, Jacopo; Alatorre, Miguel; Cruz Vázquez, Omar; Del Bello, Elisabetta; Ricci, Tullio; Scarlato, Piergiorgio; Palladino, Danilo

    2016-04-01

    Bomb-sized (larger than 64 mm) pyroclasts are a common product of explosive eruptions and a considerable source of hazard, both from directly impacting on people and properties and from wildfires associated with their landing in vegetated areas. The dispersal of bombs is mostly modeled as purely ballistic trajectories controlled by gravity and drag forces associated with still air, and only recently other effects, such as the influence of eruption dynamics, the gas expansion, and in-flight collisions, are starting to be quantified both numerically and observationally. By using high-speed imaging of explosive volcanic eruptions here we attempt to calculate the drag coefficient of free-flying volcanic bombs during an eruption and at the same time we document a wide range of in-flight processes affecting bomb trajectories and introducing deviations from purely ballistic emplacement. High-speed (500 frames per second) videos of explosions at Stromboli and Etna (Italy), Fuego (Gatemala), Sakurajima (Japan), Yasur (Vanuatu), and Batu Tara (Indonesia) volcanoes provide a large assortment of free-flying bombs spanning Strombolian to Vulcanian source eruptions, basaltic to andesitic composition, centimeters to meters in size, and 10 to 300 m/s in fly velocity. By tracking the bombs during their flying trajectories we were able to: 1) measure their size, shape, and vertical component of velocity and related changes over time; and 2) measure the different interactions with the atmosphere and with other bombs. Quantitatively, these data allow us to provide the first direct measurement of the aerodynamic behavior and drag coefficient of volcanic bombs while settling, also including the effect of bomb rotation and changes in bomb shape and frontal section. We also show how our observations have the potential to parameterize a number of previously hypothesized and /or described but yet unquantified processes, including in-flight rotation, deformation, fragmentation, agglutination

  16. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  17. An experimental investigation of thrust vectoring two-dimensional convergent-divergent nozzles installed in a twin-engine fighter model at high angles of attack

    Science.gov (United States)

    Capone, Francis J.; Mason, Mary L.; Leavitt, Laurence D.

    1990-01-01

    An investigation was conducted in the Langley 16-Foot Transonic Tunnel to determine thrust vectoring capability of subscale 2-D convergent-divergent exhaust nozzles installed on a twin engine general research fighter model. Pitch thrust vectoring was accomplished by downward rotation of nozzle upper and lower flaps. The effects of nozzle sidewall cutback were studied for both unvectored and pitch vectored nozzles. A single cutback sidewall was employed for yaw thrust vectoring. This investigation was conducted at Mach numbers ranging from 0 to 1.20 and at angles of attack from -2 to 35 deg. High pressure air was used to simulate jet exhaust and provide values of nozzle pressure ratio up to 9.

  18. Boosting Belligerence: How the July 7, 2005, London Bombings Affected Liberals' Moral Foundations and Prejudice.

    Science.gov (United States)

    Van de Vyver, Julie; Houston, Diane M; Abrams, Dominic; Vasiljevic, Milica

    2016-02-01

    Major terrorist events, such as the recent attacks in Ankara, Sinai, and Paris, can have profound effects on a nation's values, attitudes, and prejudices. Yet psychological evidence testing the impact of such events via data collected immediately before and after an attack is understandably rare. In the present research, we tested the independent and joint effects of threat (the July 7, 2005, London bombings) and political ideology on endorsement of moral foundations and prejudices among two nationally representative samples (combined N = 2,031) about 6 weeks before and 1 month after the London bombings. After the bombings, there was greater endorsement of the in-group foundation, lower endorsement of the fairness-reciprocity foundation, and stronger prejudices toward Muslims and immigrants. The differences in both the endorsement of the foundations and the prejudices were larger among people with a liberal orientation than among those with a conservative orientation. Furthermore, the changes in endorsement of moral foundations among liberals explained their increases in prejudice. The results highlight the value of psychological theory and research for understanding societal changes in attitudes and prejudices after major terrorist events.

  19. Magnetic Flux Cancellation in Ellerman Bombs

    CERN Document Server

    Reid, A; Doyle, J G; Scullion, E; Henriques, V; Nelson, C; Ray, T

    2016-01-01

    Ellerman Bombs (EBs) are often found co-spatial with bipolar photospheric magnetic fields. We use H$\\alpha$ imaging spectroscopy along with Fe I 6302.5 \\AA\\ spectro-polarimetry from the Swedish 1-m Solar Telescope (SST), combined with data from the Solar Dynamic Observatory (SDO) to study EBs and the evolution of the local magnetic fields at EB locations. The EBs are found via an EB detection and tracking algorithm. We find, using NICOLE inversions of the spectro-polarimetric data, that on average (3.43 $\\pm$ 0.49) x 10$^{24}$ ergs of stored magnetic energy disappears from the bipolar region during the EBs burning. The inversions also show flux cancellation rates of 10$^{14}$ - 10$^{15}$ Mx s$^{-1}$, and temperature enhancements of 200 K at the detection footpoints. We investigate near-simultaneous flaring of EBs due to co-temporal flux emergence from a sunspot, which shows a decrease in transverse velocity when interacting with an existing, stationary area of opposite polarity magnetic flux and the EBs are f...

  20. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  1. Prevalence of post-traumatic stress disorder in children: the case of the Mbagala bomb blasts in Tanzania.

    Science.gov (United States)

    Messo, Innocent Nasson

    2013-05-01

    In April 2009, military bombs stockpiled in Mbagala, Dar es Salaam, exploded uncontrollably, landing in the neighbourhood killing 26 people, injuring about 600 and destroying 9049 homes. This must have been a terrible experience, with psychological consequences. The purpose of this study was to investigate the prevalence of Post-Traumatic Stress Disorder (PTSD) among the children involved in the bomb blasts. It was hypothesized that children would not exhibit PTSD symptoms, as well as not showing sex differences in exhibiting PTSD symptoms. The study findings show 93% of children bomb survivors had PTSD symptoms, with no sex differences in the PTSD reported.

  2. AFSC/REFM: Bomb-produced age validation study

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Fish age validation with bomb-produced radiocarbon (14C) requires a known-age Delta14C reference chronology spanning the era of a marine increase in bomb-produced...

  3. Media's role in broadcasting acute stress following the Boston Marathon bombings.

    Science.gov (United States)

    Holman, E Alison; Garfin, Dana Rose; Silver, Roxane Cohen

    2014-01-07

    We compared the impact of media vs. direct exposure on acute stress response to collective trauma. We conducted an Internet-based survey following the Boston Marathon bombings between April 29 and May 13, 2013, with representative samples of residents from Boston (n = 846), New York City (n = 941), and the remainder of the United States (n = 2,888). Acute stress symptom scores were comparable in Boston and New York [regression coefficient (b) = 0.43; SE = 1.42; 95% confidence interval (CI), -2.36, 3.23], but lower nationwide when compared with Boston (b = -2.21; SE = 1.07; 95% CI, -4.31, -0.12). Adjusting for prebombing mental health (collected prospectively), demographics, and prior collective stress exposure, six or more daily hours of bombing-related media exposure in the week after the bombings was associated with higher acute stress than direct exposure to the bombings (continuous acute stress symptom total: media exposure b = 15.61 vs. direct exposure b = 5.69). Controlling for prospectively collected prebombing television-watching habits did not change the findings. In adjusted models, direct exposure to the 9/11 terrorist attacks and the Sandy Hook School shootings were both significantly associated with bombing-related acute stress; Superstorm Sandy exposure wasn't. Prior exposure to similar and/or violent events may render some individuals vulnerable to the negative effects of collective traumas. Repeatedly engaging with trauma-related media content for several hours daily shortly after collective trauma may prolong acute stress experiences and promote substantial stress-related symptomatology. Mass media may become a conduit that spreads negative consequences of community trauma beyond directly affected communities.

  4. Terror, tortur og den tikkende bombe

    DEFF Research Database (Denmark)

    Dige, Morten

    2012-01-01

    The so-called "war on terror" has renewed the interest in torture in practice as well as in theory. The philosophical debate about possible justifications for torture has to a large extent revolved about the ticking bomb scenario: would it be justified to torture a terrorist in order to prevent...... a catastrophe? I criticize arguments based on ticking bomb scenarios in two steps. First, I show that exceptional resort to torture will not be possible in the situations where it is most needed. Second, I state several pragmatic as well as principled objections against a state sanctioned or tolerated practice...

  5. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  6. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  7. Optimal Attack Strategy in Random Scale-Free Networks Based on Incomplete Information

    Institute of Scientific and Technical Information of China (English)

    LI Jun; WU Jun; LI Yong; DENG Hong-Zhong; TAN Yue-Jin

    2011-01-01

    @@ We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes.We investigate the optimal attack strategy in random scale-free networks both analytically and numerically.We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies.It is found that when the attack intensity is small, the attacker should attack more nodes in the "white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the "black area" in which we can not obtain attack information.Moreover, we show that there is an inflection point in the curve of optimal attack proportion.For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.%We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes. We investigate the optimal attack strategy in random scale-free networks both analytically and numerically. We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies. It is found that when the attack intensity is small, the attacker should attack more nodes in the "white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the "black area" in which we can not obtain attack information. Moreover, we show that there is an inflection point in the curve of optimal attack proportion. For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.

  8. Bomb apologetics: Farm Hall, August 1945

    Energy Technology Data Exchange (ETDEWEB)

    Bernstein, J. [Professor of Physics at Stevens Institute of Technology in Hoboken New Jersey (United States); Cassidy, D. [Professor at Hofstra University, in Hempstead, New York (United States)

    1995-08-01

    On hearing the news from Hiroshima, the incredulous internees came up with a self-serving story to explain their failures in nucleus research: To keep Hitler from winning, they had deliberately not developed the atomic bomb. {copyright} 1995 {ital American} {ital Institute} {ital of} {ital Physics}.

  9. Hurricane Ike versus an Atomic Bomb

    Science.gov (United States)

    Pearson, Earl F.

    2013-01-01

    The destructive potential of one of nature's most destructive forces, the hurricane, is compared to one of human's most destructive devices, an atomic bomb. Both can create near absolute devastation at "ground zero". However, how do they really compare in terms of destructive energy? This discussion compares the energy, the…

  10. Sulfur activation at the Little Boy-Comet Critical Assembly: a replica of the Hiroshima bomb

    Energy Technology Data Exchange (ETDEWEB)

    Kerr, G.D.; Emery, J.F.; Pace, J.V. III

    1985-04-01

    Studies have been completed on the activation of sulfur by fast neutrons from the Little Boy-Comet Critical Assembly which replicates the general features of the Hiroshima bomb. The complex effects of the bomb's design and construction on leakage of sulfur-activation neutrons were investigated both experimentally and theoretically. Our sulfur activation studies were performed as part of a larger program to provide benchmark data for testing of methods used in recent source-term calculations for the Hiroshima bomb. Source neutrons capable of activating sulfur play an important role in determining neutron doses in Hiroshima at a kilometer or more from the point of explosion. 37 refs., 5 figs., 6 tabs.

  11. Prophylaxis for blood-borne diseases during the London 7/7 mass casualty terrorist bombing: a review and the role of bioethics.

    Science.gov (United States)

    Edwards, Dafydd S; Barnett-Vanes, A; Narayan, N; Patel, H D L

    2016-10-01

    The suicide bombings in London on 7 July 2005 resulted in a mass casualty situation. Over 50% of casualties were treated at the Royal London Hospital where clinicians witnessed large numbers of severely injured patients. In some casualties human biological foreign material was found embedded in the soft tissue originating from the suicide bombers or other casualties. This had the potential of placing individuals at risk of transmission of blood-borne diseases. Advances in the fields of medicine and biology have led to increased survivorship in the context of trauma and mass casualty incidents. This has resulted in the emergence of ethical scenarios surrounding patient management. A systematic review of the literature of the 7/7 bombings, and suicide bombings reported globally, where biological implantation is noted, was performed to examine the medicolegal issues arising during such attack. Twelve casualties with human tissue implanted were recorded in the 7/7 bombings. While all patients at risk were given prophylaxis based on recommendations by the Health Protection Agency, several ethical considerations surfaced as a result. In this paper, we compare the sequence of events and the management process of the victims of the 7/7 bombings and the evidence-based research regarding blood-borne infection transmission. Furthermore, it explores the ethical dilemmas, experienced by the senior author on 7/7, surrounding prophylaxis for blood-borne diseases and protocols to avoid confusion over best practice in future bombing incidents.

  12. Requirements for estimation of doses from contaminants dispersed by a 'dirty bomb' explosion in an urban area

    Energy Technology Data Exchange (ETDEWEB)

    Andersson, K.G., E-mail: kasper.andersson@risoe.d [Riso National Laboratory for Sustainable Energy, Technical University of Denmark, Frederiksborgvej 399, P.O. Box 49, DK-4000 Roskilde (Denmark); Mikkelsen, T.; Astrup, P.; Thykier-Nielsen, S. [Riso National Laboratory for Sustainable Energy, Technical University of Denmark, Frederiksborgvej 399, P.O. Box 49, DK-4000 Roskilde (Denmark); Jacobsen, L.H. [Prolog Development Center, HJ Holst Vej 3C-5C, DK-2605 Brondby (Denmark); Hoe, S.C. [Danish Emergency Management Agency, Datavej 16, DK-3460 Birkerod (Denmark); Nielsen, S.P. [Riso National Laboratory for Sustainable Energy, Technical University of Denmark, Frederiksborgvej 399, P.O. Box 49, DK-4000 Roskilde (Denmark)

    2009-12-15

    The ARGOS decision support system is currently being extended to enable estimation of the consequences of terror attacks involving chemical, biological, nuclear and radiological substances. This paper presents elements of the framework that will be applied in ARGOS to calculate the dose contributions from contaminants dispersed in the atmosphere after a 'dirty bomb' explosion. Conceptual methodologies are presented which describe the various dose components on the basis of knowledge of time-integrated contaminant air concentrations. Also the aerosolisation and atmospheric dispersion in a city of different types of conceivable contaminants from a 'dirty bomb' are discussed.

  13. Investigations into Outbreaks of Black Fly Attacks and Subsequent Avian Haemosporidians in Backyard-Type Poultry and Other Exposed Avian Species.

    Science.gov (United States)

    Jones, Kelli; Johnson, Nora; Yang, Sharon; Stokes, John; Smith, Whitney; Wills, Robert; Goddard, Jerome; Varela-Stokes, Andrea

    2015-03-01

    In late spring of 2009 and 2010, there were reports of severe black fly (Simulium spp., shown in Fig. 1) outbreaks in various counties in Mississippi, especially those in and around the Mississippi River Delta. Complaints were of black flies attacking multiple species of backyard poultry and causing high morbidity and mortality in affected flocks. At several affected locations, black flies were readily observed swarming around and feeding on birds. A large number of these parasites were easily trapped on fly strips (Fig. 2). Multifocal to coalescing cutaneous hemorrhagic lesions, consistent with fly bites, were seen on the birds. Upon necropsy examination, a large number of black flies were also observed in the digestive tract (Fig. 3). Although black flies may cause disease directly, such as cardiopulmonary collapse and anaphylactoid reactions, detection of Leucocytozoon in blood smears (Fig. 4) of affected birds prompted further investigations of this protozoan as a cause of disease. Leucocytozoon spp. are known to be transmitted by black flies and may be associated with morbidity and mortality in birds such as poultry. From June 2009 through July 2012, the investigation included a total collection of 1068 individual blood samples, representing 371 individual premises in 89 counties/parishes across Mississippi (59), Alabama (10), Louisiana (4), and Tennessee (16). Of the 371 premises where blood samples were collected, 96 (26%) were either positive or highly suspected to be positive for Leucocytozoon spp. by blood smear analysis, and 5 (1.2%) were positive for Haemoproteus spp. by blood smear analysis. Attempts to diagnose Leucocytozoon spp. by PCR analysis and sequencing were complicated by coinfections with two closely related haemosporidians (Haemoproteus spp. and Plasmodium spp.). A novel technique involving flow cytometry was also explored. This study discusses the black fly field outbreak, the involvement of haemosporidians, molecular methods for detection

  14. Continuous Weight Attack on Complex Network

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We introduce a continuous weight attack strategy and numerically investigate the effect of continuous use a weight coefficient ω to define the attack intensity. The weight coefficient ω increases continuously from 1 to infinity, where 1 represents no attack and infinity represents complete destructive attack. Our results show that the continuous weight attack on two selected nodes with small ω (ω≈ 3) could achieve the same damage of complete elimination of a single selected node on both BA and ER networks. It is found that the continuous weight attack on a single selected edge with small ω (ω≈ 2) can reach the same effect of complete elimination of a single edge on BA network, but on ER network the damage of the continuous weight attack on a single edge is close to but always smaller than that of complete elimination of edge even if ω is very large.

  15. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  16. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  17. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  18. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  19. 36Cl bomb peak: comparison of modeled and measured data

    Directory of Open Access Journals (Sweden)

    A. Eichler

    2009-06-01

    Full Text Available The extensive nuclear bomb testing of the fifties and sixties and the final tests in the seventies caused a strong 36Cl peak that has been observed in ice cores world-wide. The measured 36Cl deposition fluxes in eight ice cores (Dye3, Fiescherhorn, Grenzgletscher, Guliya, Huascarán, North GRIP, Inylchek (Tien Shan and Berkner Island were compared with an ECHAM5-HAM general circulation model simulation (1952–1972. We find a good agreement between the measured and the modeled 36Cl fluxes assuming that the bomb test produced global 36Cl input was ~80 kg. The model simulation indicates that the fallout of the bomb test produced 36Cl is largest in the subtropics and mid-latitudes due to the strong stratosphere-troposphere exchange. In Greenland the 36Cl bomb signal is quite large due to the relatively high precipitation rate. In Antarctica the 36Cl bomb peak is small but is visible even in the driest areas. The model suggests that the large bomb tests in the Northern Hemisphere are visible around the globe but the later (end of sixties and early seventies smaller tests in the Southern Hemisphere are much less visible in the Northern Hemisphere. The question of how rapidly and to what extent the bomb produced 36Cl is mixed between the hemispheres depends on the season of the bomb test. The model results give an estimate of the amplitude of the bomb peak around the globe.

  20. 36Cl bomb peak: comparison of modeled and measured data

    Directory of Open Access Journals (Sweden)

    A. Eichler

    2009-01-01

    Full Text Available The extensive nuclear bomb testing of the fifties and sixties and the final tests in the seventies caused a strong 36Cl peak that has been observed in ice cores world-wide. The measured 36Cl deposition fluxes in eight ice cores (Dye3, Fiescherhorn, Grenzgletscher, Guliya, Huascarán, North GRIP, Inylchek (Tien Shan and Berkner Island were compared with an ECHAM5-HAM general circulation model simulation (1952–1972. We find a good agreement between the measured and the modeled 36Cl fluxes assuming that the bomb test produced global 36Cl input was ~80 kg. The model simulation indicates that the fallout of the bomb test produced 36Cl is largest in the subtropics and mid-latitudes due to the strong stratosphere-troposphere exchange. In Greenland the 36Cl bomb signal is quite large due to the relatively high precipitation rate. In Antarctica the 36Cl bomb peak is small but is visible even in the driest areas. The model suggests that the large bomb tests in the Northern Hemisphere are visible around the globe but the later (end of sixties and early seventies smaller tests in the Southern Hemisphere are much less visible in the Northern Hemisphere. The question of how rapidly and to what extent the bomb produced 36Cl is mixed between the hemispheres depends on the season of the bomb test. The model results give an estimate of the amplitude of the bomb peak around the globe.

  1. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  2. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  3. Optimal Gliding Guidance of Vertical Plane for Standoff Released Guided Bomb Unit

    Institute of Scientific and Technical Information of China (English)

    HOU Ming-shan

    2008-01-01

    Optimal gliding guidance for a guided bomb unit in the vertical plane is studied based on nonlinear dynamics and kinematics. The guidance law is designed under minimum energy loss index. To avoid the complexity in solving two-point-boundary-value problems, the steady-state solutions of the adjoint states in regular equations are suggested to be used. With these considerations, a quasi-closed, optimal gliding guidance law is obtained. The guidance law is described by the angle of attack in a simple nonlinear equation. An iterative computation method can be easily used to get the optimal angle of attack. The further simplified direct computation algorithm for the optimal angle of attack is also given. The guidance properties are compared with those of maximum lift-to-drag angle of attack control. The simulation results demonstrate that the quasi-closed, optimal gliding guidance law can improve the gliding phase terminal performance with significant increase in the altitude and much little decrease in the speed.

  4. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    Science.gov (United States)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  5. The Manhattan Project: Making the atomic bomb

    Energy Technology Data Exchange (ETDEWEB)

    Gosling, F.G.

    1994-09-01

    This article is a short history of the origins and development of the American atomic bomb program during World War II. Beginning with the scientific developments of the pre-war years, the monograph details the role of US government in conducting a secret, nationwide enterprise that took science from the laboratory and into combat with an entirely new type of weapon. The monograph concludes with a discussion of the immediate postwar period, the debate over the Atomic Energy Act of 1946, and the founding of the Atomic Energy Commission.

  6. Experimental investigation of effect of flow attack angle on thermohydraulic performance of air flow in a rectangular channel with discrete V-pattern baffle on the heated plate

    Directory of Open Access Journals (Sweden)

    Raj Kumar

    2016-05-01

    Full Text Available In this work, the effect of angle of attack ( α a of the discrete V-pattern baffle on thermohydraulic performance of rectangular channel has been studied experimentally. The baffle wall was constantly heated and the other three walls of the channel were kept insulated. The experimentations were conducted to collect the data on Nusselt number ( N u b and friction factor ( f b by varying the Reynolds number (Re = 3000–21,000 and angle of attack ( α a from 30° to 70°, for the kept values of relative baffle height ( H b / H = 0 . 50 , relative pitch ratio ( P b / H = 1 . 0 , relative discrete width ( g w / H b = 1 . 5 and relative discrete distance ( D d / L v = 0 . 67 . As compared to the smooth wall, the V-pattern baffle roughened channel enhances the Nusselt number ( N u b and friction factor ( f b by 4.2 and 5.9 times, respectively. The present discrete V-pattern baffle shapes with angle of attack ( α a of 60° equivalent to flow Reynolds number of 3000 yields the greatest thermohydraulic performance. Discrete V-pattern baffle has improved thermal performance as compared to other baffle shapes’ rectangular channel.

  7. Oscillatory thermal instability - the Bhopal disaster and liquid bombs

    CERN Document Server

    Ball, Rowena

    2011-01-01

    Thermal runaway reactions were involved in the Bhopal disaster of 1984, in which methyl isocyanate was vented from a storage tank of the liquid, and occur in liquid peroxide explosions, yet to date there have been few investigations into the mechanism of thermal runaway in such liquid thermoreactive systems. Consequently protocols for storing thermally unstable liquids and deactivating liquid bombs may be suboptimal. In this work the hydrolysis of methyl isocyanate and the thermal decomposition of triacetone triperoxide were simulated using a gradientless, continuous-flow reactor paradigm. This approximation enabled stability analyses on the steady state solutions of the dynamical mass and enthalpy equations. The results indicate that thermal runaway in both systems is due to the onset of a large amplitude, hard thermal oscillation initiated at a subcritical Hopf bifurcation. This type of thermal misbehaviour cannot be predicted using classical ignition theory, and may be typical of liquid thermoreactive syst...

  8. CALCULATION OF PER PARCEL PROBABILITY FOR DUD BOMBS IN GERMANY

    Directory of Open Access Journals (Sweden)

    S. M. Tavakkoli Sabour

    2014-10-01

    Full Text Available Unexploded aerial Bombs, also known as duds or unfused bombs, of the bombardments in the past wars remain explosive for decades after the war under the earth’s surface threatening the civil activities especially if dredging works are involved. Interpretation of the aerial photos taken shortly after bombardments has been proven to be useful for finding the duds. Unfortunately, the reliability of this method is limited by some factors. The chance of finding a dud on an aerial photo depends strongly on the photography system, the size of the bomb and the landcover. On the other hand, exploded bombs are considerably better detectable on aerial photos and confidently represent the extent and density of a bombardment. Considering an empirical quota of unfused bombs, the expected number of duds can be calculated by the number of exploded bombs. This can help to have a better calculation of cost-risk ratio and to classify the areas for clearance. This article is about a method for calculation of a per parcel probability of dud bombs according to the distribution and density of exploded bombs. No similar work has been reported in this field by other authors.

  9. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight... upon receiving information that an act or suspected act of air piracy has been committed, the...

  10. H-alpha features with hot onsets. I. Ellerman bombs

    CERN Document Server

    Rutten, R J

    2016-01-01

    Ellerman bombs are transient brightenings of the wings of the Balmer lines that uniquely mark reconnection in the solar photosphere. They are also bright in strong Ca II and ultraviolet lines and in ultraviolet continua, but they are not visible in the optical continuum and the Na I D and Mg I b lines. These discordant visibilities invalidate all published Ellerman bomb modeling. I argue that the assumption of Saha-Boltzmann lower-level populations is informative to estimate bomb-onset opacities for these diverse diagnostics, even and especially for H-alpha, and employ such estimates to gauge the visibilities of Ellerman bomb onsets in all of them. They constrain Ellerman bomb formation to temperatures 10,000 - 20,000 K and hydrogen densities around 10^15 cm^-3. Similar arguments likely hold for H-alpha visibility in other transient phenomena with hot and dense onsets.

  11. The Atomic Bomb Casualty Commission in retrospect

    Science.gov (United States)

    Putnam, Frank W.

    1998-01-01

    For 50 years, the Atomic Bomb Casualty Commission (ABCC) and its successor, the Radiation Effects Research Foundation (RERF), have conducted epidemiological and genetic studies of the survivors of the atomic bombs and of their children. This research program has provided the primary basis for radiation health standards. Both ABCC (1947–1975) and RERF (1975 to date) have been a joint enterprise of the United States (through the National Academy of Sciences) and of Japan. ABCC began in devastated, occupied Japan. Its mission had to be defined and refined. Early research revealed the urgent need for long term study. In 1946, a Directive of President Truman enjoined the National Research Council of the National Academy of Sciences to develop the program. By 1950, ABCC staff exceeded 1,000, and clinical and genetic studies were underway. Budgetary difficulties and other problems almost forced closure in 1953. In 1955, the Francis Report led to a unified epidemiological study. Much progress was made in the next decade, but changing times required founding of a binational nonprofit organization (RERF) with equal participation by Japan and the United States. New programs have been developed and existing ones have been extended in what is the longest continuing health survey ever undertaken. PMID:9576898

  12. Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack

    OpenAIRE

    2014-01-01

    We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, P...

  13. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  14. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  15. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  16. Balancing Fear: Why Counter-Terror Legislation was Blocked after the Oklahoma City and London Bombings

    Directory of Open Access Journals (Sweden)

    Gabriel Rubin

    2010-11-01

    Full Text Available Este artículo escruta las reacciones legislativas a los atentados en la ciudad de Oklahoma y los de Londres en 2005 para intentar descifrar como la legislación antiterrorista ha sustancialmente bloqueado estos ataques. Se intenta mostrar como la resistencia de los gobiernos y los ejecutivos aprueba índices críticos en las leyes antiterroristas. A la luz de una reciente encuesta sobre legislación antiterrorista mundial, los casos donde la legislación antiterrorista ha sido bloqueada ha llegado a ser verdaderamente crítica. A este fin, este artículo se pregunta por qué la legislación antiterrorista se bloquea cuando esto sucede. Para responder a esta cuestión, se han testado tres variables: la composición de los gobiernos, la opinión pública-basada en los niveles de terror en sus medios, y el nivel de acuerdos ejecutivos. Para testar estas variables, se han evaluado dos casos: la evolución de la legislación antiterrorista antes de los ataques de la ciudad de Oklahoma en 1995 y antes de los atentados de Londres de 2005. En la evaluación de los casos, los debates legislativos y ejecutivos han ocurrido antes de los ataques terroristas examinados y luego se han comparado los dos casos con el Reino Unido en 1974 y los Estados Unidos en 2001 cuando la legislación antiterrorista inicia su camino. Este artículo concluye que el nivel de acuerdos ejecutivos y la composición de los gobiernos tiene el mayor poder de explicación en determinadas decisiones antiterroristas que llevarán a secundar la legislación antiterrorista o no.Palabras clave: ataques terroristas a Londres, legislación antiterrorista, Estados Unidos, Reino Unido___________________________ABSTRACT:This article scrutinizes the legislative reactions to the Oklahoma City Bombing and the 2005 London Bombings to try to decipher why counter-terror legislation was substantially blocked after these attacks.  It finds that the partisan composition of the government and

  17. Foreign bodies radiographically-demonstrated in atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Tamura, S.; Onitsuka, H.; Lee, K.; Shimizu, Y.; Russell, W.J.

    1978-08-25

    The prevalence of roentgenologically-detected foreign bodies among atomic bomb (A-bomb) survivors was studied as an indicator of the A-bomb blast effects. Acupuncture was studied as an indicator of A-bomb-related abnormalities for which it was administered. All Adult Health Study subjects' roentgenograms demonstrating foreign bodies were reviewed. The frequency of glass and metal, and acupuncture needles were analyzed by distance from hypocenters, sex, age, body sites involved; and the subjects' shielding at the times of the A-bombs. The presence of glass fragments correlated closely with distance from hypocenter, heavy shielding from the A-bombs, and with adulthood, and they were more frequent in the chest than hand and wrist. Metal foreign bodies were more frequent in the hand and wrist than in the chest, and not associated with distance from hypocenter or heavy shielding. The prevalence of acupuncture needles increased with age, but did not correlate with A-bomb dose.

  18. Neutron and gamma ray calculation for Hiroshima-type atomic bomb

    Energy Technology Data Exchange (ETDEWEB)

    Hoshi, Masaharu; Endo, Satoru; Takada, Jun [Hiroshima Univ. (Japan). Research Inst. for Radiation Biology and Medicine; Iwatani, Kazuo; Oka, Takamitsu; Shizuma, Kiyoshi; Fujita, Shoichiro; Hasai, Hiromi

    1998-03-01

    We looked at the radiation dose of Hiroshima and Nagasaki atomic bomb again in 1986. We gave it the name of ``Dosimetry System 1986`` (DS86). We and other groups have measured the expose dose since 1986. Now, the difference between data of {sup 152}Eu and the calculation result on the basis of DS86 was found. To investigate the reason, we carried out the calculations of neutron transport and neutron absorption gamma ray for Hiroshima atomic bomb by MCNP3A and MCNP4A code. The problems caused by fast neutron {sup 32}P from sulfur in insulator of pole. To correct the difference, we investigated many models and found agreement of all data within 1 km. (S.Y.)

  19. The Potentialities of the Atomic Bomb

    Energy Technology Data Exchange (ETDEWEB)

    Meade, Roger Allen [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bradbury, Norris E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-07

    Since the first use of an atomic bomb on August 5 [sic], 1945, over the city of Hiroshima, Japan, there has been a continual flood of speculation and discussion concerning the effect of this new weapon on military technology. Much of this speculation and discussion has been intelligent and fruitful; much, I regret to say, has had neither of these characteristics. The enormity of the device, in terms of potential destruction and loss of life, and the practical necessity to surround the technical facts with full security restrictions have only combined to make the problem more difficult. At the same time, it is imperative that policymaking personnel in charge of long range national planning know the basic facts concerning atomic weapons and have these facts in a reasonable perspective. This document describes these potentialities in detail.

  20. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  1. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  2. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  3. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  4. Symptoms of Depression in Israeli Adolescents Following a Suicide Bombing: The Role of Gender

    Science.gov (United States)

    Barile, John P.; Grogan, Kathryn E.; Henrich, Christopher C.; Brookmeyer, Kathryn A.; Shahar, Golan

    2012-01-01

    This report investigated the potential role of gender in moderating the effects of terror attack exposure on depression symptoms in middle school students from Dimona, Israel (N = 90). Specifically, the effects of three aspects of terror attacks were investigated: physical exposure, relational exposure, and media exposure. Ninety early adolescents…

  5. A study on the trend of international radioactive material regulation since the terrorist attacks of September 11, 2001

    Energy Technology Data Exchange (ETDEWEB)

    Ryu, J. S. [KAERI, Taejon (Korea, Republic of)

    2003-07-01

    AI-Qaeda and other terrorist groups have tried to obtain the radioactive material which could be used to make a dirty bomb, and their documents relating to dirty bombs were found in the January 2003. International communities especially, the United States has made efforts to improve infrastructure of radiation regulation and security of radioactive material for protecting its people from radiological attacks. This study examines the likelihood of radiological terrorism and the radiological dispersal devices which could be used by determined terrorists, and the trend of international communities to respond it through improvement on radiation regulation and security.

  6. Supply Chain Attack Framework and Attack Patterns

    Science.gov (United States)

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  7. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  8. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  9. Perfection and the Bomb: Nuclear Weapons, Teleology, and Motives.

    Science.gov (United States)

    Brummett, Barry

    1989-01-01

    Uses Kenneth Burke's theory of perfection to explore the vocabularies of nuclear weapons in United States public discourse and how "the Bomb" as a God term has gained imbalanced ascendancy in centers of power. (MS)

  10. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  11. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  12. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  13. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  14. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  15. Details of Nazis' A-Bomb program surface

    CERN Document Server

    Glanz, J

    2002-01-01

    Werner Heisenberg, leader of the Nazi atomic bomb program, revealed the projects existence to Niels Bohr in a meeting in Copenhagen in 1941. But contrary to several historical accounts of the meeting, Heisenberg never expressed moral qualms about building a bomb for Hitler nor hinted that he might be willing to sabotage the project, according to secret documents cited in a London newspaper yesterday (2 pages).

  16. Simulated E-Bomb Effects on Electronically Equipped Targets

    Science.gov (United States)

    2009-09-01

    65 Figure 23. GBU-10 Paveway II (From: Bombas Guidas, 2009) ........................... 66 Figure 24. Representative Laser Guided Bomb...from the target. A picture of the GBU- 10 bomb is in Figure 23. Figure 23. GBU-10 Paveway II (From: Bombas Guidas, 2009) According to the Air...Retrieved June 16, 2009, from http://www.globalsecurity.org/military/systems/munitions/blu-82.htm Bombas Guidas. Retrieved June 23 2009, from

  17. Trash can bomb can fall into the hands of terrorists

    CERN Document Server

    2001-01-01

    Leading scientists from CERN described how if terrorists were able to get their hands on plutonium or uranium, they would be able to manufacture a 'trash can' nuclear bomb simply by inserting the radioactive material into a normal bomb. Once detonated a large area could be contaminated leading to the immediate deaths of many with many more future casualties due to cancers caused by the radiation.

  18. 余姚市儿童精神障碍罹患情况调查%Investigation of Attack Rate of Children's Mental Disorders in Yuyao City

    Institute of Scientific and Technical Information of China (English)

    宋青青; 胡里荣; 吴旭东

    2015-01-01

    目的:研究浙江省余姚市儿童精神障碍罹患水平,以便能够对儿童的心理及行为进行有效干预.方法:在余姚市随机选择40所小学4110名儿童,完成家长问卷和班主任问卷;根据问卷结果进行统计分析.结果:余姚市儿童精神障碍总罹患率达到11.97%.同时,随着年龄增加,精神障碍罹患率呈现增加的趋势,7-8岁年龄阶段精神障碍罹患率最低,为10.00%;13-14岁年龄阶段精神障碍罹患率最高,达到14.17%.男生的精神障碍罹患率为14.75%,女生的罹患率为9.35%,男女生的精神障碍发生情况差异有统计学意义(P<0.05).发生最多的精神障碍类型为注意力缺陷多动障碍,发生率达到17.07%;其次为对立违抗性障碍(15.85%)和焦虑障碍(14.63%).结论:余姚市儿童精神障碍罹患水平较高,高年级学生罹患率显著高于低年级学生,男生显著高于女生,其中注意力缺陷多动障碍是发生率较高的类型.%Objective:Study the attack rate of mental disorders in children in Yuyao to find effective intervention.Methods: We randomly selected 4110 children in 40 primary schools in Yuyao.The teachers and the parents needed to fill the Rutter questionnaires, then collected the results to come to conclusion.Results: Attack rate of children's mental disorders in Yuyao was 11.97%, which increased with the increasing of age.The rate in 7 to 8 years old children was the lowest, 10.00%,and in 13 and 14 years old children was the highest, 14.17%.The rate in boys was 14.75%, in girls was 9.35%, the comparison had statistical significance (P<0.05).Attention deficit hyperactivity disorder was major-ity of mental disorders,17.07%, and the next was oppositional defiant disorder 15.85% and anxiety disorders 14.63%.Conclusion:Attack rate of mental disorders in children in Yuyao is a little high, the rate of the seniors grade students is higher than that of lower grade students, boys is higher than girls, and attention deficit

  19. Foreign bodies radiographically demonstrated in atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Tamura, S.; Onitsuka, H.; Lee, K.K.; Shimizu, Y.; Russell, W.J.

    1978-02-01

    The prevalence of roentgenologically-detected foregin bodies among atomic bomb survivors was studied as an indicator of the A-bomb blast effects. Acupuncture was studied as an indicator of possible A-bomb-related abnormalities for which it was administered. All available roentgenograms of Adult Health Study (AHS) subjects which demonstrated foreign bodies were reviewed. The frequency of glass and metal foreign bodies and of acupuncture needles was analyzed in detail. Analyses were made by distance from the hypocenter, sex, age, body sites involved, and shielding at the time of the A-bomb (ATB). The presence of glass fragments correlated closely with distance from the hypocenter, with heavy shielding from the A-bombs, and with adulthood, and they were more frequent in the chest than in the hand and wrist. On the contrary, metal foreign bodies were more frequent in the hand and wrist than in the chest, and were not associated with distance from hypocenter or heavy shielding. The prevalence of acupuncture needles increased with age, but did not correlate with A-bomb dose.

  20. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  1. Multiple Partial Attacks on Complex Networks

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We numerically investigate the effect of four kinds of partial attacks of multiple targets on the Barabási-Albert (BA) scale-free network and the Erd(o)s-Rényi (ER) random network.Comparing with the effect of single target complete knockout we find that partial attacks of multiple targets may produce an effect higher than the complete knockout of a single target on both BA scale-free network and ER random network.We also find that the BA ecale-free network seems to be more susceptible to multi-target partial attacks than the ER random network.

  2. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  3. Observations and NLTE modeling of Ellerman bombs

    CERN Document Server

    Berlicki, Arkadiusz

    2014-01-01

    Ellerman bombs (EBs) are short-lived and compact structures that are observed well in the wings of the hydrogen H-alpha line. EBs are also observed in the chromospheric CaII lines and in UV continua. H-alpha line profiles of EBs show a deep absorption at the line center and enhanced emission in the line wings. Similar shapes of the line profiles are observed for the CaII IR line at 8542 ang. It is generally accepted that EBs may be considered as compact microflares located in lower solar atmosphere. However, it is still not clear where exactly the emission of EBs is formed in the solar atmosphere. High-resolution spectrophotometric observations of EBs were used for determining of their physical parameters and construction of semi-empirical models. In our analysis we used observations of EBs obtained in the H-alpha and CaII H lines. We also used NLTE numerical codes for the construction of grids of 243 semi-empirical models simulating EBs structures. In this way, the observed emission could be compared with th...

  4. Ellerman Bombs with Jets: Cause and Effect

    CERN Document Server

    Reid, A; Scullion, E; Doyle, J G; Shelyag, S; Gallagher, P

    2015-01-01

    Ellerman Bombs (EBs) are thought to arise as a result of photospheric magnetic reconnection. We use data from the Swedish 1-m Solar Telescope (SST), to study EB events on the solar disk and at the limb. Both datasets show that EBs are connected to the foot-points of forming chromospheric jets. The limb observations show that a bright structure in the H$\\alpha$ blue wing connects to the EB initially fuelling it, leading to the ejection of material upwards. The material moves along a loop structure where a newly formed jet is subsequently observed in the red wing of H$\\alpha$. In the disk dataset, an EB initiates a jet which propagates away from the apparent reconnection site within the EB flame. The EB then splits into two, with associated brightenings in the inter-granular lanes (IGLs). Micro-jets are then observed, extending to 500 km with a lifetime of a few minutes. Observed velocities of the micro-jets are approximately 5-10 km s$^{-1}$, while their chromospheric counterparts range from 50-80 km s$^{-1}$....

  5. Statistical Analysis of Small Ellerman Bomb Events

    CERN Document Server

    Nelson, C J; Erdelyi, R; Huang, Z; Madjarska, M; Mathioudakis, M; Mumford, S; Reardon, K; 10.1007/s11207-012-0222-3

    2013-01-01

    The properties of Ellerman bombs (EBs), small-scale brightenings in the H-alpha line wings, have proved difficult to establish due to their size being close to the spatial resolution of even the most advanced telescopes. Here, we aim to infer the size and lifetime of EBs using high-resolution data of an emerging active region collected using the Interferometric BIdimensional Spectrometer (IBIS) and Rapid Oscillations of the Solar Atmosphere (ROSA) instruments as well as the Helioseismic and Magnetic Imager (HMI) onboard the Solar Dynamics Observatory (SDO). We develop an algorithm to track EBs through their evolution, finding that EBs can often be much smaller (around 0.3") and shorter lived (less than 1 minute) than previous estimates. A correlation between G-band magnetic bright points and EBs is also found. Combining SDO/HMI and G-band data gives a good proxy of the polarity for the vertical magnetic field. It is found that EBs often occur both over regions of opposite polarity flux and strong unipolar fie...

  6. Ellerman Bombs with Jets: Cause and Effect

    Science.gov (United States)

    Reid, A.; Mathioudakis, M.; Scullion, E.; Doyle, J. G.; Shelyag, S.; Gallagher, P.

    2015-05-01

    Ellerman Bombs (EBs) are thought to arise as a result of photospheric magnetic reconnection. We use data from the Swedish 1 m Solar Telescope to study EB events on the solar disk and at the limb. Both data sets show that EBs are connected to the foot points of forming chromospheric jets. The limb observations show that a bright structure in the Hα blue wing connects to the EB initially fueling it, leading to the ejection of material upwards. The material moves along a loop structure where a newly formed jet is subsequently observed in the red wing of Hα. In the disk data set, an EB initiates a jet which propagates away from the apparent reconnection site within the EB flame. The EB then splits into two, with associated brightenings in the inter-granular lanes. Micro-jets are then observed, extending to 500 km with a lifetime of a few minutes. Observed velocities of the micro-jets are approximately 5-10 km s-1, while their chromospheric counterparts range from 50 to 80 km s-1. MURaM simulations of quiet Sun reconnection show that micro-jets with properties similar to those of the observations follow the line of reconnection in the photosphere, with associated Hα brightening at the location of increased temperature.

  7. Simulating an Exploding Fission-Bomb Core

    Science.gov (United States)

    Reed, Cameron

    2016-03-01

    A time-dependent desktop-computer simulation of the core of an exploding fission bomb (nuclear weapon) has been developed. The simulation models a core comprising a mixture of two isotopes: a fissile one (such as U-235) and an inert one (such as U-238) that captures neutrons and removes them from circulation. The user sets the enrichment percentage and scattering and fission cross-sections of the fissile isotope, the capture cross-section of the inert isotope, the number of neutrons liberated per fission, the number of ``initiator'' neutrons, the radius of the core, and the neutron-reflection efficiency of a surrounding tamper. The simulation, which is predicated on ordinary kinematics, follows the three-dimensional motions and fates of neutrons as they travel through the core. Limitations of time and computer memory render it impossible to model a real-life core, but results of numerous runs clearly demonstrate the existence of a critical mass for a given set of parameters and the dramatic effects of enrichment and tamper efficiency on the growth (or decay) of the neutron population. The logic of the simulation will be described and results of typical runs will be presented and discussed.

  8. The radiological management of bomb blast injury.

    Science.gov (United States)

    Hare, S S; Goddard, I; Ward, P; Naraghi, A; Dick, E A

    2007-01-01

    A need to understand the nature and patterns of bomb blast injury, particularly in confined spaces, has come to the fore with the current worldwide threat from terrorism. The purpose of this review article is to familiarize the radiologist with the imaging they might expect to see in a mass casualty terrorist event, illustrated by examples from two of the main institutions receiving patients from the London Underground tube blasts of 7 July 2005. We present examples of injuries that are typical in blast victims, as well as highlighting some blast sequelae that might also be found in other causes of multiple trauma. This should enable the radiologist to seek out typical injuries, including those that may not be initially clinically apparent. Terror-related injuries are often more severe than those seen in other trauma cases, and multi-system trauma at distant anatomical sites should be anticipated. We highlight the value of using a standardized imaging protocol to find clinically undetected traumatic effects and include a discussion on management of multiple human and non-human flying fragments. This review also discusses the role of radiology in the management and planning for a mass casualty terrorist incident and the optimal deployment of radiographic services during such an event.

  9. Some investigations on the pitting attack of magnesium and its alloys; Contribution a l'etude de la corrosion par piqures du magnesium et de ses alliages

    Energy Technology Data Exchange (ETDEWEB)

    Blanchet, J. [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1964-03-01

    The pitting attack of magnesium and its alloys has been studied by means of potentio-kinetic polarisation curves; the following parameters have been considered: structural state and composition of the metal, chloride concentration and pH of the medium. The electrochemical data obtained demonstrate that when pH = 12, a localized corrosion might appear as soon as a 10{sup -3} M NaCl concentration is reached; on the other hand, when pH = 13, a much higher concentration (five times) has no effect. In the same conditions, the coupling of magnesium with various noble materials (graphite, platinum, 18/10 stainless steel) also dramatically increases its susceptibility to pitting, but only when chloride ions are present in the solution. Usual corrosion tests have confirmed these electrochemical results. A micrographic study of the pits has shown that their morphology is connected with the metallurgical state of the specimens. (author) [French] La corrosion par piqures du magnesium est etudiee a l'aide des courbes de polarisation potentiocinetiques en fonction des parametres suivants etat structural et composition du metal, concentration en chlorure et pH de la solution. De ces mesures electrochimiques on deduit qu'a pH 12, des la concentration 10{sup -3} M en NaCl, il existe un risque de corrosion localisee, tandis qu'a pH 13 une concentration cinq fois plus forte doit etre sans effet. Dans les memes conditions on montre que le couplage du magnesium avec differents elements nobles (graphite, platine, acier inoxydable 18/10) accroit fortement sa susceptibilite a l'attaque par piqures, excepte dans les solutions exemptes d'ions chlorures. Des essais classiques de corrosion dans les differentes solutions envisagees precedemment confirment les resultats de cette etude electrochimique. L'examen micrographique des piqures montre que leur morphologie est liee a l'etat metallurgique des echantillons. (auteur)

  10. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  11. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  12. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  13. Link-layer jamming attacks on S-MAC

    OpenAIRE

    Law, Yee Wei; Hartel, Pieter; Hartog, den, D.N.; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. In this paper, we investigate some jamming attacks on S-MAC, the level of effectiveness and efficiency the attacks can potentially achieve, and a countermeasure that can be implemented against one o...

  14. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  15. Telomere loss: mitotic clock or genetic time bomb?

    Science.gov (United States)

    Harley, C B

    1991-01-01

    The Holy Grail of gerontologists investigating cellular senescence is the mechanism responsible for the finite proliferative capacity of somatic cells. In 1973, Olovnikov proposed that cells lose a small amount of DNA following each round of replication due to the inability of DNA polymerase to fully replicate chromosome ends (telomeres) and that eventually a critical deletion causes cell death. Recent observations showing that telomeres of human somatic cells act as a mitotic clock, shortening with age both in vitro and in vivo in a replication dependent manner, support this theory's premise. In addition, since telomeres stabilize chromosome ends against recombination, their loss could explain the increased frequency of dicentric chromosomes observed in late passage (senescent) fibroblasts and provide a checkpoint for regulated cell cycle exit. Sperm telomeres are longer than somatic telomeres and are maintained with age, suggesting that germ line cells may express telomerase, the ribonucleoprotein enzyme known to maintain telomere length in immortal unicellular eukaryotes. As predicted, telomerase activity has been found in immortal, transformed human cells and tumour cell lines, but not in normal somatic cells. Telomerase activation may be a late, obligate event in immortalization since many transformed cells and tumour tissues have critically short telomeres. Thus, telomere length and telomerase activity appear to be markers of the replicative history and proliferative potential of cells; the intriguing possibility remains that telomere loss is a genetic time bomb and hence causally involved in cell senescence and immortalization.

  16. Small-Scale Structuring Of Ellerman Bombs at Solar Limb

    CERN Document Server

    Nelson, C J; Doyle, J G; Freij, N; Erdélyi, R

    2014-01-01

    Ellerman bombs (EBs) have been widely studied in recent years due to their dynamic, explosive nature and apparent links to the underlying photospheric magnetic field implying that they may be formed by magnetic reconnection in the photosphere. Despite a plethora of researches discussing the morphologies of EBs, there has been a limited investigation of how these events appear at the limb, specifically, whether they manifest as vertical extensions away from the disc. In this article, we make use of high-resolution, high-cadence observations of an AR at the solar limb, collected by the CRISP instrument, to identify EBs and infer their physical properties. The upper atmosphere is also probed using the SDO/AIA. We analyse 22 EB events evident within these data, finding that 20 appear to follow a parabolic path away from the solar surface at an average speed of 9 km s^(-1), extending away from their source by 580 km, before retreating back at a similar speed. These results show strong evidence of vertical motions ...

  17. Bioassays for bomb-makers: proof of concept.

    Science.gov (United States)

    Bell, Suzanne C; Gayton-Ely, Melissa; Nida, Corey M

    2009-09-01

    Clandestine bomb-makers are exposed to significant amounts of explosives and allied materials. As with any ingested xenobiotic substance, these compounds are subject to biotransformation. As such, the potential exists that characteristic suites of biomarkers may be produced and deposited in matrices that can be exploited for forensic and investigative purposes. However, before such assays can be developed, foundational data must be gathered regarding the toxicokinetics, fate, and transport of the resulting biomarkers within the body and in matrices such as urine, hair, nails, sweat, feces, and saliva. This report presents an in vitro method for simulation of human metabolic transformations using human liver microsomes and an assay applicable to representative nitro-explosives. Control and metabolized samples of TNT, RDX, HMX, and tetryl were analyzed using high-performance liquid chromatography coupled to tandem mass spectrometry (LC/MS/MS) and biomarkers identified for each. The challenges associated with this method arise from solubility issues and limitations imposed by instrumentation, specifically, modes of ionization.

  18. Why did the Germans not produce an atomic bomb?

    Science.gov (United States)

    Lustig, Harry

    2003-04-01

    The question has been examined and debated in books and articles by physicists and historians of science for the past half century. Since 2000,the controversy has been heightened by Michael Frayn's play Copenhagen. Was the reason for the failure that Werner Heisenberg, the leader of Germany's Uranium Project,for moral reasons, gave incomplete and misleading information to the Nazis, such as withholding the knowledge that fissionable plutonium can be produced in a uranium reactor? Was Heisenberg's science the cause, because it resulted in a critically wrong critical mass for fission of tons instead of kilograms? Did he not make the calculation at all because he was convinced, for practical reasons, that a bomb couldn't be assembled in time to be of use to anyone in World War II? And what about Hans Bethe's assertion that Walter Bothe's mistake in ruling out graphite as a moderator, which obliged the Germans to embark on the difficult, long range effort to obtain enough heavy water, doomed even Heisenberg's reactor program to failure? Can the different answers that have been given to these and other questions be reconciled? If not, which are likely to be correct and which should be abandoned? The talk will be a progress report on this investigation.

  19. Fine-scale Photospheric Connections of Ellerman Bombs

    Science.gov (United States)

    Yang, Heesu; Chae, Jongchul; Lim, Eun-Kyung; Song, Donguk; Cho, Kyuhyoun; Kwak, Hannah; Yurchyshyn, Vasyl B.; Kim, Yeon-Han

    2016-10-01

    We investigate the photospheric and magnetic field structures associated with Ellerman bombs (EBs) using the 1.6 m New Solar Telescope at Big Bear Solar Observatory. The nine observed EBs were accompanied by elongated granule-like features (EGFs) that showed transverse motions prior to the EBs with an average speed of about 3.8 km s-1. Each EGF consisted of a sub-arcsecond bright core encircled by a dark lane around its moving front. The bright core appeared in the TiO broadband filter images and in the far wings of the Hα and Ca ii 8542 Å lines. In four EBs, the bi-directional expanding motion of the EGFs was identified in the TiO images. In those cases, the EGFs were found to be accompanied by an emerging flux (EF). In four other EBs, the EGF developed at the edge of a penumbra and traveled in the sunspot’s radial direction. The EGFs in these cases were identified as a moving magnetic feature (MMF). Our results show a clear connection among the magnetic elements, photospheric features, and EBs. This result suggests that the EBs result from magnetic reconnection forced by EFs or MMFs that are frequently manifested by EGFs.

  20. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  1. An operated case with post-traumatic epilepsy following atomic bombing injury

    Energy Technology Data Exchange (ETDEWEB)

    Morioka, Takato; Nishio Shunji; Muraishi; Mitsuteru; Hisada, Kei; Takase, Keiichirou; Matsukado, Koichiro; Sasaki, Masayuki; Fukui, Masashi [Kyushu Univ., Fukuoka (Japan). Graduate School of Medicine; Ohta, Michiya

    1999-12-01

    The case was 54-years-old man who was bombed at 4-years old 1.5 km apart from the center of explosion in Hiroshima, and had intractable epilepsy after 10 years or more. He suffered from systemic convulsion from 18 years old and took anti-convulsant drugs from 23 years old. The frequency of seizure increased from once a half year to thrice 2 months for these 3-4 years. The attack mainly occurred at night, and it was generalized tonicoclonic convulsion accompanied with unconsciousness and urinary incontience. Valproate (1,800 mg) and clonazepam (1 mg) failed to control the attack, and then he was referred to author's hospital. By CT scanning, MRI and HMPAO-SPECT, the area around the ossified lesion in the right frontal lobe was considered the focus of the epilepsy, and the focus was removed on June 4, 1998. No neurodegeneration and convulsive seizure occurred after surgery. The ossified lesion was confirmed to be bone tissue containing osteoblasts from histological findings and was accompanied by severe gliosis to the brain surface. A large number of active astrocytes were found around the nerve cells in the cortex showing spine-like wave focus, but there were no significant changes in blood vessels in the brain. (K.H.)

  2. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure......Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...

  3. Forensic applications of {sup 14}C bomb-pulse dating

    Energy Technology Data Exchange (ETDEWEB)

    Zoppi, U. E-mail: ugo@ansto.gov.au; Skopec, Z.; Skopec, J.; Jones, G.; Fink, D.; Hua, Q.; Jacobsen, G.; Tuniz, C.; Williams, A

    2004-08-01

    After a brief review of the basics of {sup 14}C bomb-pulse dating, this paper presents two unique forensic applications. Particular attention is dedicated to the use of the {sup 14}C bomb-pulse to establish the time of harvest of illicit drugs such as heroin and opium. Preliminary measurements of {sup 14}C concentrations in milligram samples taken from seized drugs are presented. {sup 14}C bomb-pulse dating can determine whether drug distribution originates from stockpiles or recent manufacture, and support the action of law enforcement authorities against criminal organisations involved in drug trafficking. In addition, we describe the dating of wine vintages for a number of authenticated single label vintage red wines from the Barossa Valley - South Australia. Our results show that radiocarbon dating can be used to accurately determine wine vintages and therefore reveal the addition of unrelated materials of natural and synthetic origin.

  4. Reassessing the Bunbury Bombing: Juxtaposition of Political and Media Narratives

    Directory of Open Access Journals (Sweden)

    Kate O’Donnell

    2017-03-01

    Full Text Available This paper examines an Australian newspaper’s coverage of the bombing of an export port terminal in Bunbury, Western Australia on 19 July, 1976. We wanted to see how The West Australian newspaper framed the story, its precursor events, and the events that followed. We were particularly interested in whether the bombing was reported as an act of terrorism because the then Premier of Western Australia, Sir Charles Court, immediately decried it as “a gross act of terrorism.” We find the newspaper resisted the lure to apply this label, and couched the story in terms of serious criminality. However, it did so before the 1978 Hilton Hotel bombing; an event the news media heralded as the “arrival” of terrorism in Australia. Also, this occurred before what could be argued the sensationalist and politicised reporting of terror-related events became normalised.

  5. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  6. The development of the atomic bomb, Los Alamos

    Energy Technology Data Exchange (ETDEWEB)

    Seidel, R.W.

    1993-11-01

    The historical presentation begins with details of the selection of Los Alamos as the site of the Army installation. Wartime efforts of the Army Corps of Engineers, and scientists to include the leader of Los Alamos, Robert Oppenheimer are presented. The layout and construction of the facilities are discussed. The monumental design requirements of the bombs are discussed, including but not limited to the utilization of the second choice implosion method of detonation, and the production of bomb-grade nuclear explosives. The paper ends with a philosophical discussion on the use of nuclear weapons.

  7. Hot-spring cure of atomic-bomb survivors, 16

    Energy Technology Data Exchange (ETDEWEB)

    Ouchi, Tamon (Beppu Genbaku Senta (Japan))

    1984-03-01

    Though a cold winter with snowfalls, in the fiscal year 1983, the number of the atomic-bomb sufferers using the Beppu Atomic-bomb Center (a medical hot spring) was large in January and February, 1984; throughout the fiscal year, the total number was about 3,800 persons. The diseases of the sufferers, mostly in locomotion organs, are such as osteoarthritis of spine, lame hip and knee arthropathy. Being the typical diseases for which hot spring treatment is good, the effect is clear, and those desiring to enter the Center twice in a year are increasing. The situation of usage of the Center from April, 1983, to March, 1984, is described.

  8. Deconstructing The Bomb: Confessions of a Nuclear Archeologist

    Science.gov (United States)

    Coster-Mullen, John

    2017-01-01

    I am the author of the groundbreaking book Atom Bombs: The Top Secret Inside Story of Little Boy and Fat Man. I will be sharing some of my quarter century of research and methodology that has allowed me to be the first researcher ever to unravel with an unprecedented level of accuracy, the most closely-guarded secrets of the first two Atomic Bombs (``Little Boy'' and ``Fat Man'') created by the Manhattan Project that were used to end WWII. I refer to this methodology as ``Nuclear Archeology'' and will demonstrate that this was done using entirely ``Open Sources'' of information.

  9. The Manhattan Project: Making the Atomic Bomb. 1999 edition.

    Energy Technology Data Exchange (ETDEWEB)

    Gosling, F.G.

    1999-01-01

    ``The Manhattan Project: Making the Atomic Bomb`` is a short history of the origins and development of the American atomic bomb program during World War II. Beginning with the scientific developments of the pre-war years, the monograph details the role of the United States government in conducting a secret, nationwide enterprise that took science from the laboratory and into combat with an entirely new type of weapon. The monograph concludes with a discussion of the immediate postwar period, the debate over the Atomic Energy Act of 1946, and the founding of the Atomic Energy Commission.

  10. The Manhattan Project: Making the Atomic Bomb. 1999 edition.

    Science.gov (United States)

    Gosling, F. G.

    1999-01-01

    "The Manhattan Project: Making the Atomic Bomb" is a short history of the origins and development of the American atomic bomb program during World War II. Beginning with the scientific developments of the pre-war years, the monograph details the role of the United States government in conducting a secret, nationwide enterprise that took science from the laboratory and into combat with an entirely new type of weapon. The monograph concludes with a discussion of the immediate postwar period, the debate over the Atomic Energy Act of 1946, and the founding of the Atomic Energy Commission.

  11. Lack of tissue renewal in human adult Achilles tendon is revealed by nuclear bomb (14)C

    DEFF Research Database (Denmark)

    Heinemeier, Katja Maria; Schjerling, Peter; Heinemeier, Jan;

    2013-01-01

    the 14C bomb-pulse method. This method takes advantage of the dramatic increase in atmospheric levels of 14C, produced by nuclear bomb tests in 1955-1963, which is reflected in all living organisms. Levels of 14C were measured in 28 forensic samples of Achilles tendon core and 4 skeletal muscle samples...... is revealed by nuclear bomb 14C....

  12. Locating bomb factories by detecting hydrogen peroxide.

    Science.gov (United States)

    Romolo, Francesco Saverio; Connell, Samantha; Ferrari, Carlotta; Suarez, Guillaume; Sauvain, Jean-Jacques; Hopf, Nancy B

    2016-11-01

    The analytical capability to detect hydrogen peroxide vapour can play a key role in localizing a site where a H2O2 based Improvised Explosive (IE) is manufactured. In security activities it is very important to obtain information in a short time. For this reason, an analytical method to be used in security activity needs portable devices. The authors have developed the first analytical method based on a portable luminometer, specifically designed and validated to locate IE manufacturing sites using quantitative on-site vapour analysis for H2O2. The method was tested both indoor and outdoor. The results demonstrate that the detection of H2O2 vapours could allow police forces to locate the site, while terrorists are preparing an attack. The collected data are also very important in developing new sensors, able to give an early alarm if located at a proper distance from a site where an H2O2 based IE is prepared.

  13. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  14. Did NATO attacks in Yugoslavia cause a detectable environmental effect in Hungary?

    Science.gov (United States)

    Kerekes, A; Capote-Cuellar, A; Köteles, G J

    2001-02-01

    Because of the intensive NATO bombardment of the neighboring region to Hungary, i.e., Vojvodina, North Yugoslavia, air monitoring for detection of depleted uranium particles supposed to be used as a component of bullets was extended to the Southern region of the country. Alpha spectrometry was applied as a sensitive analytical technique able to detect uranium. Though no depleted uranium was detected in air by the sensitive technique of alpha-spectrometry, the increased uranium content in natural ratio as a component of normal soil, natural gas, etc., is suggested to originate from well dispersed dust (2.5 microm size) emitted to the atmosphere by explosions during bombing. This observation is supported by the geographical distribution and the relatively rapid decrease of pollution after the bomb attacks ceased.

  15. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  16. Detailed analysis of a quench bomb for the study of aluminum agglomeration in solid propellants

    Science.gov (United States)

    Gallier, S.; Kratz, J.-G.; Quaglia, N.; Fouin, G.

    2016-07-01

    A standard quench bomb (QB) - widely used to characterize condensed phase from metalized solid propellant combustion - is studied in detail. Experimental and numerical investigations proved that collected particles are mostly unburned aluminum (Al) agglomerates despite large quenching distances. Particles are actually found to quench early as propellant surface is swept by inert pressurant. Further improvements of the QB are proposed which allow measuring both Al agglomerates and alumina residue with the same setup. Finally, the results obtained on a typical aluminized ammonium perchlorate (AP) / hydroxyl-terminated polybutadiene (HTPB) propellant are briefly discussed.

  17. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  18. New trends in Internet attacks: Clickjacking in detail

    OpenAIRE

    Thoresen, Torgeir Dahlqvist

    2009-01-01

    While the complexity of web applications and their functionality continually increase, so do the number of opportunities for an attacker to launch successful attacks against a web application's users. In this thesis we investigate and describe clickjacking in great detail. To our knowledge, this work represent the first systematic scientific approach to assess clickjacking that also consider the attack's social consequences for users' security through an experiment and survey. We address the...

  19. Health survey of atomic bomb survivors in South Korea

    Energy Technology Data Exchange (ETDEWEB)

    Arita, Ken-ichi; Iwamori, Hiroshi; Kishi, Akihiro; Koutoku, Michiya.

    1988-05-01

    Health survey was undertaken among Korea survivors exposed to atomic bomb in Japan who now reside in South Korea. Of 232 A-bomb survivors on whom raditation exposure information was available, all were exposed to atomic bomb in Hiroshima. According to the distance from the hypocenter, one (0.4 %) A-bomb survior was exposed at < 1,000 m, 60 (25.9 %) at 1,000 - 2,000 m, 124 (53.4 %) at > 2,000 - 3,000 m, and 43 (18.5 %) at < 3,000 m. In the four remaining, it was unknown. According to age, 14.7 % were in their forties, 33.6 % in their fifties, 32.6 % in their sixties, 16.0 % in their severties, and 3.1 % in their eighties, indicating the tendency for the aging of older persons. Common subjective symptoms were lumbar pain and joint pain, which seemed atributable to osteoarthritis. Other diseases included hypertension, chronic obstructive pulmonary disease, sequelae of cerebral stroke, eczema, and mycosis. (Namekawa, K.).

  20. Alabama University Professor's View of the Birmingham Bombing Trial.

    Science.gov (United States)

    Journal of Blacks in Higher Education, 2001

    2001-01-01

    Presents the views of Alabama university scholars regarding the historical significance of the 2001 trial of Thomas Blanton for his role in the Ku Klux Klan bombing of the Sixteenth Street Baptist church in Birmingham, Alabama thet killed four girls. Their discussions note the need to examine the American judicial system, the weak case against Mr.…

  1. Lack of strategic insight: the "dirty bomb" effort.

    Science.gov (United States)

    Goffman, Tom

    2009-01-01

    Multiple countries including the United States and France are investing heavily in countermeasures to the threat of a "dirty bomb." All of the machinery simply involves a variation on a Geiger counter that picks up excess photon irradiation. Classically, a "dirty bomb" is defined as a dangerous radioactive material mixed in a variety of ways with high explosive, so when detonated, radioactive material is dispersed. Solid radioactive material such as Cesium or Cobalt sends off very penetrating ('hard') photons from which one cannot simply be protected by sheet lead or a heavy door. For official occasions with dignitaries of State, such a bomb could prove a modest distraction, but simple radiation physics suggests such a bomb would be limited in the damage it could cause, would largely be a mess to be cleaned up by an appropriately trained crew, would involve a very confined area, and thoroughly fails to comprehend the mentality of al-Queda 'central' that wishes to follow 9/11 with an equal or greater show of terrorist force. The author would argue this sort of mind-think occurs when you have too few people in the hard sciences in your intelligence sections.

  2. Uranium tetrafluoride reduction closed bomb. Part I: Reduction process general conditions; Reduccion del tetrafluoruro de uranio en bomba cerrada. Part I. estudio de las variables generales del proceso de reduccion

    Energy Technology Data Exchange (ETDEWEB)

    Anca Abati, R.; Lopez Rodriguez, M.

    1961-07-01

    General conditions about the metallo thermic reduction in small bombs (250 and 800 gr. of uranium) has been investigated. Factors such as kind and granulometry of the magnesium used, magnesium excess and preheating temperature, which affect yields and metal quality have been considered. magnesium excess increased yields in a 15% in the small bomb, about the preheating temperature, there is a range between which yields and metal quality does not change. All tests have been made with graphite linings. (Author) 18 refs.

  3. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  4. The mental health state of atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Nakane, Yoshibumi; Imamura, Yoshihiro; Yoshitake, Kazuyasu; Honda, Sumihisa; Mine, Mariko; Hatada, Keiko; Tomonaga, Masao [Nagasaki Univ. (Japan). School of Medicine; Tagawa, Masuko

    1997-03-01

    Our department of Neuropsychiatry has clarified the clinical features of several mental disorders and surveyed the causes of those disorders from the psychosocial aspect using the methodology of epidemiological psychiatric approach. Using this previous research experience, we began a long-planned study to examine the mental health state of atomic bomb survivors. Fifty-one years have passed since the atomic bombing, and the survivors must have suffered various psychosocial stresses, other than any direct effect on the central nervous system from exposure to radiation, and it is assumed that victims` mental state has been affected in various ways as a result. The subjects of the survey were 7,670 people who had regular health examinations for atomic bomb survivors during the study period of three years and who consented to participate in the study. Of the total, 226 subjects were selected for a second phase according to the results of the General Health Questionnaire 12-item Version which was used in the first phase of the survey. The results were as follows: 1. The distance from the hypocenter was related to the degree of ill health, and the percentage of people with a high score was greater among those exposed to the atomic bomb in proximity to the hypocenter. 2. 14.6% of the subjects were diagnosed as having some kind of mental disorders according to clinical interviews by trained psychiatrists. These results had not expected prior to the study. On the based of the study, we will try to establish a mental health support system for atomic bomb survivors. (author)

  5. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  6. Imaginary Savior: the image of the nuclear bomb in Korea, 1945-1960.

    Science.gov (United States)

    Kim, Dong-Won

    2009-01-01

    Two atomic bombs dropped on Hiroshima and Nagasaki in August 1945 brought the unexpected liberation of Korea from the 35-year Japanese occupation. Koreans therefore had a very favorable and positive image of the nuclear bomb and nuclear energy from the beginning. The image of the nuclear bomb as "savior" was strengthened during the Korean War when the United States openly mentioned the possible use of the nuclear bomb against North Korean and Chinese military. After the end of the Korean War in July 1953 South Koreans strongly supported the development of the nuclear bomb in order to deter another North Korean invasion. When the US government provided South Korea with a research nuclear reactor in the late 1950s, most South Koreans hailed it as the first step to developing their own nuclear bomb. This paper will analyze how and why the savior image of the nuclear bomb originated and spread in Korea during the 1950s.

  7. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  8. Medical examination of A-bomb survivors on Nagasaki A-bomb Casualty

    Energy Technology Data Exchange (ETDEWEB)

    Tagawa, Masuko [Nagasaki Atomic Bomb Casualty Council (Japan)

    1996-03-01

    Medical examination of A-bomb survivors was described and discussed on history, time change of examinee number, action for subjects not examined, change of prevalence, cancer examination, examination for the second generation, and education and enlightenment. Free examination of the survivors was begun in 1953 and the present casualty was made in 1958 on the law for medical care for the survivors. Systematic examination started from 1967 and the examination for the 2nd generation, from 1974. Cancer examination was from 1988. The number of the survivors was the maximum of 82,439 in 1974 and decreased to 61,388 in 1994, when the actual number of examinees, which being rather settled recently, was 32,294 and their average age was 64 y. The examination is done by tour or at the Center. Subjects receive the information of the examination twice by mail. Hematopoietic diseases like anemia, hepatic ones, metabolic and endocrinic ones like diabetes, renal impairment and others (mostly hyperlipidemia) are increasing recently. The number of examinees for cancer is increasing. Lung cancer is examined by the direct roentgenography, gastric cancer by transillumination, and other cancers like myeloma, those in large bowel, uterus and mammary gland, by the respective suitable methods. Health education and enlightenment have been conceivably effective. (H.O.)

  9. Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures

    CERN Document Server

    Xing, Xinyu; Han, Richard; Liu, Xue; Mishra, Shivakant

    2010-01-01

    Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-on-one via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper presents one of the first investigations of the privacy threats found in such video chat systems, identifying three such threats, namely de-anonymization attacks, phishing attacks, and man-in-the-middle attacks. The paper further describes countermeasures against each of these attacks.

  10. The diagnosis of transient ischemic attacks

    NARCIS (Netherlands)

    P.J. Koudstaal (Peter Jan)

    1989-01-01

    textabstractThe diagnosis of transient ischemic attack (TIA) is fraught with difficulty, since the diagnosis rests entirely upon the history of the patient's symptoms and the neurologist's skill in questioning the patient. The aim of this thesis is to investigate various measures to improve the reli

  11. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  12. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  13. 'What to do if it happens': planners, pamphlets and propaganda in the age of the H-bomb.

    Science.gov (United States)

    Smith, Melissa

    2009-06-01

    In 1955, a highly secret Government report painted a bleak picture of Britain after a nuclear war. Without greatly improved civil defence measures, the report warned, a hydrogen bomb attack on Britain could kill one-third of the population within 24h and leave swathes of land uninhabitable. But Government advice to the public told a different story, offering cheerful advice about vacuuming up radioactive fallout and building shelters from books and furniture. Meanwhile, civil defence spending cuts left the public lacking even the standard of protection they had enjoyed during the Second World War. This seemingly paradoxical Government response was shaped by conflicting financial and political pressures, and by the work of the Home Office scientists whose research underpinned British civil defence planning.

  14. Pattern association--a key to recognition of shark attacks.

    Science.gov (United States)

    Cirillo, G; James, H

    2004-12-01

    Investigation of a number of shark attacks in South Australian waters has lead to recognition of pattern similarities on equipment recovered from the scene of such attacks. Six cases are presented in which a common pattern of striations has been noted.

  15. Air Attack on America?: Vulnerabilities, Capabilities, and Implications of the Air Defense of the United States

    Science.gov (United States)

    2013-06-01

    development of anti-ballistic missile ( ABM ) technology is outside the purview of the individual services. The threat is limited to ballistic... ABCs .” This article was supposed to answer questions such as: “Will the Russians make an atom-bomb attack on the U.S.? If it comes, what is the...We Accuse!,” Harper’s Magazine, October 1954, 43. 28 Time, “Atomic ABCs ,” Time, 21 August 1950, 16. 60 Service Has Entered the Supersonic Age

  16. An assessment of the terrorist threat to use a nuclear or radiological device in an attack

    Energy Technology Data Exchange (ETDEWEB)

    Kingshott, B.F. [Grand Valley State University, 275C DeVos Center, 401 West Fulton Street, Grand Rapids, MI 49504 (United States)]. E-mail: kingshob@gvsu.edu

    2006-07-01

    This paper will discuss terrorism from the perspective of a terrorist organisation acquiring nuclear material to build weapons and how security of radiological material world wide will minimise the risk of such devices being used. It will discuss the need to improve security at nuclear waste processing and storage sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device containing nuclear material be detonated. (author)

  17. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  18. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  19. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  20. By emotion, no atomic bomb and no blackhole

    Science.gov (United States)

    Shin, Philip

    2011-10-01

    As to be, we glory to God and that is basic theology for christian. And I want to say that BE means just thinking. There is no clue of nature and no proposition to prove it. I just believe by feeling and emotion. I trust that it can be the physic really. As for me, I believe when there is atomic bomb, than anytime it has to blow out the world each time of we are living. So the atomic bomb we thinking is just accident and not by the atomic theory. Also when there is blackhole, than there must be the wall to block me forever and never to walk again. So there are no blackhole. And these two subject is the best two subject for the physic.

  1. Physicists and the 1945 Decision to Drop the Bomb

    CERN Document Server

    Byers, N

    2002-01-01

    In 1943 fear that the German war machine might use atomic bombs was abating and among physicists another fear was taking its place - that of a postwar nuclear arms race with worldwide proliferation of nuclear weapons. Manhattan Project scientists and engineers began to discuss uses of nuclear energy in the postwar world. Niels Bohr, Leo Szilard, James A. Franck and others launched a concerted effort to lay groundwork for international control of the technology. Realizing the devastation nuclear weapons could cause and that they could be made and delivered much more cheaply than conventional weapons of the same power, they tried to persuade policy makers to take into account long range consequences of using atomic bombs and not base their decisions on short range military expediency alone. They met with little success. The scientists' main message, unheeded then and very relevant now, is that worldwide international agreements are needed to provide for inspection and control of nuclear weapons technology. Thei...

  2. Aerosolization of Water Ejected from a Full Container Impacted by Bomb Fragments

    Directory of Open Access Journals (Sweden)

    Leo W. Stockham

    2012-01-01

    Full Text Available In assessing the potential collateral effects of bomb attacks on tanks of stored liquids, it is useful to separate the liquid that is aerosolized as an escaping cloud from that which remains inside the tank or rapidly falls to the nearby ground. One relationship currently in use partitions the two categories using a linear model of aerosolized fraction versus fragment energy deposited per unit mass of liquid which is based on calculations and a few test data points. Since this model is incorporated in popular programs used by an expanding number of first responders to assess potential hazards, there is a need for high-confidence test data across the parameter space of interest to improve and/or validate the model. Such a series of tests was conducted during November of 2008 in which 7.57-liter (ℓ sized cans of water were impacted with fragments of known mass using scored cased explosive charges. Impact velocities were measured, and the remaining water in the can and on the nearby ground platform was collected and weighed. The missing water was assumed to be aerosolized. This new data establishes an S-curve as a more accurate relationship between aerosolized fraction (AF and the fragment energy deposited per unit mass of liquid in the container.

  3. Blast Injuries: From Improvised Explosive Device Blasts to the Boston Marathon Bombing.

    Science.gov (United States)

    Singh, Ajay K; Ditkofsky, Noah G; York, John D; Abujudeh, Hani H; Avery, Laura A; Brunner, John F; Sodickson, Aaron D; Lev, Michael H

    2016-01-01

    Although most trauma centers have experience with the imaging and management of gunshot wounds, in most regions blast wounds such as the ones encountered in terrorist attacks with the use of improvised explosive devices (IEDs) are infrequently encountered outside the battlefield. As global terrorism becomes a greater concern, it is important that radiologists, particularly those working in urban trauma centers, be aware of the mechanisms of injury and the spectrum of primary, secondary, tertiary, and quaternary blast injury patterns. Primary blast injuries are caused by barotrauma from the initial increased pressure of the explosive detonation and the rarefaction of the atmosphere immediately afterward. Secondary blast injuries are caused by debris carried by the blast wind and most often result in penetrating trauma from small shrapnel. Tertiary blast injuries are caused by the physical displacement of the victim and the wide variety of blunt or penetrating trauma sustained as a result of the patient impacting immovable objects such as surrounding cars, walls, or fences. Quaternary blast injuries include all other injuries, such as burns, crush injuries, and inhalational injuries. Radiography is considered the initial imaging modality for assessment of shrapnel and fractures. Computed tomography is the optimal test to assess penetrating chest, abdominal, and head trauma. The mechanism of blast injuries and the imaging experience of the victims of the Boston Marathon bombing are detailed, as well as musculoskeletal, neurologic, gastrointestinal, and pulmonary injury patterns from blast injuries.

  4. Forensic Medicine: Age Written in Teeth by Nuclear Bomb Tests

    Energy Technology Data Exchange (ETDEWEB)

    Lawrence Livermore National Laboratory

    2005-05-04

    Establishing the age of individuals is an important step in identification and a frequent challenge in forensic medicine. This can be done with high precision up to adolescence by analysis of dentition, but establishing the age of adults has remained difficult. Here we show that measuring {sup 14}C from nuclear bomb tests in tooth enamel provides a sensitive way to establish when a person was born.

  5. A-bomb radiation and diseases; M proteinemia

    Energy Technology Data Exchange (ETDEWEB)

    Fujimura, Kingo (Hiroshima Univ. (Japan). Research Inst. for Nuclear Medicine and Biology); Ito, Chikako

    1994-03-01

    Mass health screening was conducted in 65,483 A-bomb survivors (23,153 men and 42,336 women). Among them, 553 (0.84%) was found to have M proteinemia. The incidence of M proteinemia was higher in men (1.1%) than women (0.72%). M proteinemia was simply classified as benign monoclonal gammopathy (BMG) in 372 A-bomb survivors (67.3%), pre-myeloma (PreMM) in 81 (14.6%), myeloma (MM) in 77 (13.9%), and macroglobulinemia in 23 (4.2%). A higher incidence of M proteinemia was associated with aging; it was rapidly increased in the age-group of 70. Death was seen in 45 (8%) of all cases, frequently due to vascular disorder and cancer. Some of the BMG cases had a long process or developed either PreMM or MM. The incidence of BMG was significantly higher in the group of A-bomb survivors exposed to 100 rad or more than the control group. (N.K.).

  6. Genetic effect of A-bomb radiation- Analysis of minisatellite regions detected by DNA fingerprint probe

    Energy Technology Data Exchange (ETDEWEB)

    Kodaira, Mieko [Radiation Effects Research Foundation, Hiroshima (Japan)

    1999-06-01

    In author's laboratory, screening of mutation in germ cells of A-bomb survivors is under investigation with use of 8 single-locus minisatellite probes and no increase in mutation rate has been detected hitherto. This paper reported results of screening on the minisatellite region, which consisting of short repeated base sequence, using a DNA fingerprint probe for 33.15 core sequence. Subjects were 50 A-bomb survivor families exposed to mean dose of 1.9 Sv (exposed group) or 0 Gy (control), having 64 or 60 children, respectively. DNA was extracted from their B cells established by EB virus and subjected to agarose-gel electrophoresis followed by southern blotting with some improvements for fingerprinting. On the fingerprints, numbers of the band detected in regions of >3.5 kb were 1080 in children of the exposed group (16.9/child) and 1024 (17.1) in the control group, indicating no detectable effect of exposure on the germ cell mutation rate in the region.(K.H.)

  7. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    Science.gov (United States)

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  8. Age validation of quillback rockfish (Sebastes maliger) using bomb radiocarbon

    Energy Technology Data Exchange (ETDEWEB)

    Kerr, L A; Andrews, A H; Munk, K; Coale, K H; Frantz, B R; Cailliet, G M; Brown, T A

    2005-01-05

    Rockfishes (Sebastes spp.) support one of the most economically important fisheries of the Pacific Northwest and it is essential for sustainable management that age estimation procedures be validated for these species. Atmospheric testing of thermonuclear devices during the 1950s and 1960s created a global radiocarbon ({sup 14}C) signal in the ocean environment that scientists have identified as a useful tracer and chronological marker in natural systems. In this study, we first demonstrated that fewer samples are necessary for age validation using the bomb-generated {sup 14}C signal by emphasizing the utility of the time-specific marker created by the initial rise of bomb-{sup 14}C. Second, the bomb-generated {sup 14}C signal retained in fish otoliths was used to validate the age and age estimation methodology of the quillback rockfish (Sebastes maliger) in the waters of southeast Alaska. Radiocarbon values from the first year's growth of quillback rockfish otoliths were plotted against estimated birth year producing a {sup 14}C time series spanning 1950 to 1985. The initial rise of bomb-{sup 14}C from pre-bomb levels ({approx} -90 {per_thousand}) occurred in 1959 {+-} 1 year and {sup 14}C levels rose relatively rapidly to peak {Delta}{sup 14}C values in 1967 (+105.4 {per_thousand}), with a subsequent declining trend through the end of the record in 1985 (+15.4 {per_thousand}). The agreement between the year of initial rise of {sup 14}C levels from the quillback rockfish record and the chronometer determined for the waters of southeast Alaska from yelloweye rockfish (S. ruberrimus) otoliths validated the ageing methodology for the quillback rockfish. The concordance of the entire quillback rockfish {sup 14}C record with the yelloweye rockfish time series demonstrated the effectiveness of this age validation technique, confirmed the longevity of the quillback rockfish up to a minimum of 43 years, and strongly supports higher age estimates of up to 90 years.

  9. Research on Semi-automatic Bomb Fetching for an EOD Robot

    Directory of Open Access Journals (Sweden)

    Qian Jun

    2008-11-01

    Full Text Available An EOD robot system, SUPER-PLUS, which has a novel semi-automatic bomb fetching function is presented in this paper. With limited support of human, SUPER-PLUS scans the cluttered environment with a wrist-mounted laser distance sensor and plans the manipulator a collision free path to fetch the bomb. The model construction of manipulator, bomb and environment, C-space map, path planning and the operation procedure are introduced in detail. The semi-automatic bomb fetching function has greatly improved the operation performance of EOD robot.

  10. SURVEY ON SURVIVAL APPROACHES IN WIRELESS NETWORK AGAINST JAMMING ATTACK

    Directory of Open Access Journals (Sweden)

    FARAZ AHSAN

    2011-08-01

    Full Text Available Wireless networks are more depicted to intentional or unintentional threats than their wired based equivalent networks. Major reason being the wireless medium which can be approached by others, who can listen and interfere in an on-going valid communication. In the absence of a collision detection mechanism and relying mainly on cooperation of each other for packet routing, the standard defined for wireless network is unable to identify any malicious activity, by default. Among attacks the ones which create isolation of the nodes on the network are considered more severe. If they last long enough, can result in denial-of-service and hence network collapses completely. The simplest form of such attacks is jamming attack which can block any current legitimate communication. It is easy to launch as no especial hardware is required and the area in range for a particular time can be jammed for any legal communication. Jamming is a specialized Denial of Service attack in which purpose is not to overflow buffers, instead to choke the physical communication channel, hence avoiding jammer is much harder than other forms of denial of service attacks. Unlike other attacks, especially routing attacks, no network parameter and topology etc need to be known in advance before launching jamming attack. However, if the network parameters are known and the attack is intelligently placed, a jammer can last longer resulting in more survival time on the network and damage. This paper surveys on different types of jamming attack and the mitigation techniques generally used. Besides this, we investigate about the approaches proposed that are considered efficient to survive in a jammed region, actively. Finally, we conclude by highlighting the potential areas which can be targeted to optimize in minimizing the effects of a jamming attack, as future directions.

  11. Attack Vulnerability of Network with Duplication-Divergence Mechanism

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    We study the attack vulnerability of network with duplication-divergence mechanism. Numerical results have shown that the duplication-divergence network with larger retention probability a is more robust against target attack relatively. Furthermore, duplication-divergence network is broken down more quickly than its counterpart BA network under target attack. Such result is consistent with the fact of WWW and Internet networks under target attack. So duplication-divergence model is a more realistic one for us to investigate the characteristics of the world wide web in future. We also observe that the exponent 7 of degree distribution and average degree are important parameters of networks, reflecting the performance of networks under target attack. Our results are helpful to the research on the security of network.

  12. Expected losses, insurability, and benefits from reducing vulnerability to attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Nozick, Linda Karen (Cornell University, Ithaca, NY); Carlson, Rolf Erik; Turnquist, Mark Alan (Cornell University, Ithaca, NY)

    2004-03-01

    A model of malicious attacks against an infrastructure system is developed that uses a network representation of the system structure together with a Hidden Markov Model of an attack at a node of that system and a Markov Decision Process model of attacker strategy across the system as a whole. We use information systems as an illustration, but the analytic structure developed can also apply to attacks against physical facilities or other systems that provide services to customers. This structure provides an explicit mechanism to evaluate expected losses from malicious attacks, and to evaluate changes in those losses that would result from system hardening. Thus, we provide a basis for evaluating the benefits of system hardening. The model also allows investigation of the potential for the purchase of an insurance contract to cover the potential losses when safeguards are breached and the system fails.

  13. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  14. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  15. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made

  16. Attack Robustness of Scale-Free Networks Based on Grey Information

    Institute of Scientific and Technical Information of China (English)

    LI Jun; WU Jun; LI Yong; DENG Hong-Zhong; TAN Yue-Jin

    2011-01-01

    We introduce an attack robustness model of scale-free networks based on grey information, which means that one can obtain the information of all nodes, but the attack information may be imprecise. The known random failure and the intentional attack are two extreme cases of our investigation. Using the generating function method, we derive the analytical value of the critical removal fraction of nodes for the disintegration of networks, which agree with the simulation results well. We also investigate the effect of grey information on the attack robustness of scale-free networks and find that decreasing the precision of attack information can remarkably enhance the attack robustness of scale-free networks.%@@ We introduce an attack robustness model of scale-free networks based on grey information,which means that one can obtain the information of al1 nodes,but the attack information may be imprecise.The known random failure and the intentional attack are two extreme cases of our investigation.Using the generating function method,we derive the analytical value of the critical removal fraction of nodes for the disintegration of networks,which agree with the simulation results well.We also investigate the effect of grey information on the attack robustness of scale-free networks and find that decreasing the precision of attack information can remarkably enhance the attack robustness of scale-free networks.

  17. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  18. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  19. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  20. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  1. Coal Slag Attack-A Review

    Institute of Scientific and Technical Information of China (English)

    GUO Zongqi

    2004-01-01

    Although slagging coal gasifiers have served the commercial systems of electricity and chemical fertilizer productions for more than ten years, refractory service life still is a critical factor for gasifier availability. Some investigations were attracted, focusing on coal slag attack on high chromia refractories. A general introduction is made in order to have further understanding about slag corrosion in coal gasification environment. Microstructural deterioration and wear process of high chromia refractory in slagging gasifiers are discussed.

  2. 360° FILM BRINGS BOMBED CHURCH TO LIFE

    Directory of Open Access Journals (Sweden)

    K. Kwiatek

    2012-09-01

    Full Text Available This paper explores how a computer-generated reconstruction of a church can be adapted to create a panoramic film that is presented in a panoramic viewer and also on a wrap-around projection system. It focuses on the fundamental principles of creating 360º films, not only in 3D modelling software, but also presents how to record 360º video using panoramic cameras inside the heritage site. These issues are explored in a case study of Charles Church in Plymouth, UK that was bombed in 1941 and has never been rebuilt. The generation of a 3D model of the bombed church started from the creation of five spherical panoramas and through the use of Autodesk ImageModeler software. The processed files were imported and merged together in Autodesk 3ds Max where a visualisation of the ruin was produced. A number of historical images were found and this collection enabled the process of a virtual reconstruction of the site. The aspect of merging two still or two video panoramas (one from 3D modelling software, the other one recorded on the site from the same locations or with the same trajectories is also discussed. The prototype of 360º non-linear film tells a narrative of a wartime wedding that occurred in this church. The film was presented on two 360º screens where members of the audience could make decisions on whether to continue the ceremony or whether to run away when the bombing of the church starts. 3D modelling software made this possible to render a number of different alternati ves (360º images and 360º video. Immersive environments empower the visitor to imagine the building before it was destroyed.

  3. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  4. UNCOVERING THEIR STORIES: THE RUBBLE OF MEMORY AND BOMBING WAR

    OpenAIRE

    Rasch, William; Universidad de Indiana

    2006-01-01

    In this brilliant essay, WILLIAM RASCH traces current ideas about global war to their first installment in the post-war climate of occupied Germany. RASCH takes issue, in particular, with the current transformation in the nature of war —so called zero casualties war or war at a distance—, hailed as the most important transformation in the field of international relations and international law in the 21st century, and rediscovers its articulation with the carpet bombing (bombenkrieg) of World ...

  5. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  6. Analytic treatment of the charged black-hole-mirror bomb in the highly explosive regime

    CERN Document Server

    Hod, Shahar

    2013-01-01

    A charged scalar field impinging upon a charged Reissner-Nordstrom black hole can be amplified as it scatters off the hole, a phenomenon known as superradiant scattering. This scattering process in the superradiant regime w>1 and for mirror radii r_m in the near-horizon region x_m=(r_m-r_+)/r_+>(tau/x_m)^2>>1 regime, which implies that the instability timescale 1/w_I of the system can be made arbitrarily short in the qQ-->infinity limit. The short instability timescale found in the linear regime along with the spherical symmetry of the system, make the charged bomb a convenient toy model for future numerical studies aimed to investigate the non-linear end-state of superradiant instabilities.

  7. Total 9 Illegal RE Mining Districts in Dingnan County Were Bombed out

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    On October 17th, mineral managing departments in Dingnan county of Jiangxi province took actions toward illegal mining activity. Total 9 mining districts without licenses were bombed out. Rare earth is the protectively strategic resources in China. They are major minerals with good prospect in Dingnan county.Total 9 Illegal RE Mining Districts in Dingnan County Were Bombed out

  8. A Confusion of Signals: James Franck, the Chicago Scientists and Early Efforts to Stop the Bomb

    Science.gov (United States)

    Villa, Brian Loring

    1975-01-01

    If the scientists working on the Manhattan Project had realized the consequences of the atomic bomb earlier, formulated their recommendations more precisely, and approached the statesmen in time, American policy on use and control of the bomb might well have been different. (Author/BT)

  9. Reducing the Impact of Attacks against Healthcare by Curbing the Use of Explosive Weapons in Populated Areas: Developments at the Global Level.

    Science.gov (United States)

    Bagshaw, Simon

    2016-01-01

    Attacks against healthcare in situations of armed conflict have emerged as an issue of increasing concern with explosive weapons - such as aircraft bombs, mortars and improvised explosive devices - accounting for more deaths, injuries and damage than any other type of weapon in attacks on healthcare facilities. While this is perhaps unsurprising, it offers some insight into a possible course of action for dealing with the problem of attacks against healthcare - by curbing the use of explosive weapons in populated areas. There has been growing recognition in recent years of the humanitarian problems caused by the use of such weapons in populated areas. Steps are now being taken at the global level to curb this use which could, in time, make an important contribution to reducing the incidence and devastating impact of attacks against healthcare.

  10. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Nichols, Jeff A. {Cyber Sciences} [ORNL; Curtis, Laura [Pacific Northwest National Laboratory (PNNL)

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.

  11. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  12. Not to be forgotten: The bombing of Novi Sad: An ecological black area

    Directory of Open Access Journals (Sweden)

    Nježić Zvonko B.

    2009-01-01

    Full Text Available During the 1999 NATO bombing of Yugoslavia, the second largest Yugoslav city Novi Sad was one of the cities that bore the brunt of the bombing. According to NATO press releases, the bombing targeted oil refineries, roads, bridges, and telecommunications relay stations, facilities which had used for military purposes. The bombing of Novi Sad's refinery caused fires which burned 50000 tons of crude oil, sending toxins and carcinogens into the air and contaminating groundwater. The bombing of the city caused great damage to local civilians, including severe pollution and widespread ecological damage, health consequences which will remain for years as well as permanent psychological consequences caused by almost 3 months of trauma and fear.

  13. Bonebrake Theological Seminary - Most Secret A-Bomb Project Site

    Science.gov (United States)

    Sopka, Katherine R.; Sopka, Elisabeth M.

    2004-05-01

    In late 1943, a small number of nuclear scientists was urgently assembled in Dayton, Ohio by the U.S. Army Manhattan District Engineers and Monsanto Chemical Company Research Division to set up a top secret research project essential to counteract the German atomic bomb threat. The site chosen was an old stone building built in 1879 by the United Brethren Church in a residential area known locally as the Bonebrake Seminary. Centered on a sizeable open plot, the austere three story building was surrounded by a tall cyclone fence with a narrow gate and a minimal guard post - nothing revealed the site's intense research activity then or even in the post-WWII Cold War period. Bonebrake scientists would produce the highly radioactive polonium sources for the plutonium (Pu-239) bomb igniter used in August over Nagasaki just before the end of WWII against Japan. The existence of Bonebrake and its research/production work remained classified top secret throughout the Cold War. Only in recent times can any reference be found even to the existence of this project (unlike , for example, Los Alamos or Oak Ridge) and few, if any details, have ever been published. The primary source of information for this paper is Dr. John J. Sopka who was recruited from Princeton University by the Manhattan District in 1943 as physicist for this project.

  14. Axial length of atomic bomb survivors in Nagasaki

    Energy Technology Data Exchange (ETDEWEB)

    Wakiyama, Harumi; Kishikawa, Yasuhiro; Imamura, Naoki [Nagasaki Atomic Bomb Hospital (Japan); Amemiya, Tsugio [Nagasaki Univ. (Japan). School of Medicine

    2002-03-01

    We reviewed a series of 778 patients who had cataract surgery during the past 4 years at the Nagasaki Atomic Bomb Memorial Hospital. We evaluated the history of exposure to radiation by atomic bomb in 1945, axial length and state of refraction. All were born before 1945. The series comprised 263 males and 515 females. Their ages averaged 76.5{+-}8.6 years. History of exposure to radiation was present in 356 patients. The remaining 422 patients served as control. There was no difference in the type of cataract between the two groups. High myopia was present in 11 irradiated patients (3.2%) and in 24 patients in the control group (6.0%). The difference was not significant (p=0.083). There was no high myopia among 24 patients who were aged 18 years or less at the time of radiation and who were within 2 km from the epicenter. No difference was present regarding the axial length between the two groups or between both sexes. The present result is not definitive because ''irradiated group'' would include those with little or no exposure and because precise data has not been available about the dosis of radiation. (author)

  15. Genetic radiation effects of Hiroshima and Nagasaki atomic bombs

    Energy Technology Data Exchange (ETDEWEB)

    Srsen, S. (Komenskeho Univ., Bratislava (Czechoslovakia). Lekarska Fakulta)

    1984-05-01

    A group of researchers examined persons who had survived the Hiroshima and Nagasaki bombs and were irradiated and their progeny with the aim of getting an idea of the genetic effects of these explosions. Teratogenic effects are not discussed. In the lymphocytes of the peripheral blood of persons who had been exposed to high dose irradiation the researchers found a significant increase in chromosomal aberrations by conventional and more recent methods of chromosomal analysis. In parents who had survived the atomic holocaust there were no significant deviations as against the rest of the population in still births, neonatal defects, infant mortality, and mortality of first generation progeny, in neonate weight, the sex ratio, increased occurence of leukosis and chromosomal aberrations in their children. These negative findings in the first generation do not signify that there is no danger from atomic bomb blasts for human kind. They only indicate that the effects of radiation were too small to be found by routine methods or that the methods used were not suitable.

  16. Bomb radiocarbon in annual tree rings from Thailand and Australia

    Science.gov (United States)

    Hua, Q.; Barbetti, M.; Jacobsen, G. E.; Zoppi, U.; Lawson, E. M.

    2000-10-01

    We have examined the atmospheric 14C excess in the tropics and the southern hemisphere temperate region in the bomb pulse period, using two sets of cross-dated tree rings. One set was from a medium-sized three-leaf pine ( Pinus kesiya) grown in northwestern Thailand and the other was from a Huon pine ( Lagarostrobos franklinii) grown in northwestern Tasmania, Australia. A total of 48 annual tree rings (24 pairs) from 1952 to 1975 AD were pretreated to alpha-cellulose, combusted to CO 2 and converted to graphite for 14C measurement in the tandem accelerator at ANSTO. Excellent agreement was found between our measured 14C data from tree rings and atmospheric 14C records at similar latitudes. A large depletion of atmospheric 14C for Thailand in 1953-1954 AD was observed. This might be due to a combination of the Suess effect and upwelling in the tropical Indian Ocean. The results also showed the rise and decay of bomb 14C peaks from north to south with a time delay of about 1.5 yr, and the effects of minor atmospheric nuclear tests in the late 1960s and early 1970s. A delay of at least one month for 14C in tree cellulose of Huon pine compared with that in the atmosphere was also found.

  17. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.

    Science.gov (United States)

    Feng, Zhi; Wen, Guanghui; Hu, Guoqiang

    2016-04-12

    This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.

  18. Resistance maximization principle for defending networks against virus attack

    Science.gov (United States)

    Li, Angsheng; Zhang, Xiaohui; Pan, Yicheng

    2017-01-01

    We investigate the defending of networks against virus attack. We define the resistance of a network to be the maximum number of bits required to determine the code of the module that is accessible from random walk, from which random walk cannot escape. We show that for any network G, R(G) =H1(G) -H2(G) , where R(G) is the resistance of G, H1(G) and H2(G) are the one- and two-dimensional structural information of G, respectively, and that resistance maximization is the principle for defending networks against virus attack. By using the theory, we investigate the defending of real world networks and of the networks generated by the preferential attachment and the security models. We show that there exist networks that are defensible by a small number of controllers from cascading failure of any virus attack. Our theory demonstrates that resistance maximization is the principle for defending networks against virus attacks.

  19. Sweden and the bomb. The Swedish plans to acquire nuclear weapons, 1945 - 1972

    Energy Technology Data Exchange (ETDEWEB)

    Jonter, T [Uppsala Univ. (Sweden). Dept. of History

    2001-09-01

    This study analyses the Swedish nuclear weapons research since 1945 carried out by the Swedish National Defence Research Establishment (FOA). The most important aspect of this research was dealing with protection in broad terms against nuclear weapons attacks. However, another aspect was also important from early on - to conduct research aiming at a possible production of nuclear weapons. FOA performed an extended research up to 1968, when the Swedish government signed the Non-Proliferation Treaty (NPT), which meant the end of these production plans. Up to this date, five main investigations about the technical conditions were made, 1948, 1953, 1955, 1957 and 1965, which all together expanded the Swedish know-how to produce a bomb. The Swedish plans to procure nuclear weapons were not an issue in the debate until the mid-50's. The reason for this was simple, prior to 1954 the plans were secretly held within a small group of involved politicians, military and researchers. The change of this procedure did take place when the Swedish Supreme Commander in a public defence report in 1954 favoured a Swedish Nuclear weapons option. In 1958 FOA had reached a technical level that allowed the parliament to make a decision. Two programs were proposed - the L-programme (the Loading Programme), to be used if the parliament would say yes to a production of nuclear weapons, and the S-programme (the Protection Programme), if the parliament would say no. The debate on the issue had now created problems for the Social Democratic Government. The prime minister, Tage Erlander, who had earlier defended a procurement of nuclear weapons, was now forced to reach a compromise. The compromise was presented to the parliament in a creative manner that meant that only the S-programme would be allowed. The government argued that the technical level did allow a 'freedom of action' up to at least the beginning of the 60's when Sweden was mature to make a decision on the issue

  20. Attack resilience of the evolving scientific collaboration network.

    Directory of Open Access Journals (Sweden)

    Xiao Fan Liu

    Full Text Available Stationary complex networks have been extensively studied in the last ten years. However, many natural systems are known to be continuously evolving at the local ("microscopic" level. Understanding the response to targeted attacks of an evolving network may shed light on both how to design robust systems and finding effective attack strategies. In this paper we study empirically the response to targeted attacks of the scientific collaboration networks. First we show that scientific collaboration network is a complex system which evolves intensively at the local level--fewer than 20% of scientific collaborations last more than one year. Then, we investigate the impact of the sudden death of eminent scientists on the evolution of the collaboration networks of their former collaborators. We observe in particular that the sudden death, which is equivalent to the removal of the center of the egocentric network of the eminent scientist, does not affect the topological evolution of the residual network. Nonetheless, removal of the eminent hub node is exactly the strategy one would adopt for an effective targeted attack on a stationary network. Hence, we use this evolving collaboration network as an experimental model for attack on an evolving complex network. We find that such attacks are ineffectual, and infer that the scientific collaboration network is the trace of knowledge propagation on a larger underlying social network. The redundancy of the underlying structure in fact acts as a protection mechanism against such network attacks.

  1. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  2. COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Bose

    2012-01-01

    Full Text Available Mobile Adhoc Networks (MANETs are dynamic in nature. Any nodes can join and leave the network at any time. Hence any type of intruders can attack the communication at any time, especially the routing mechanism between the nodes. In this study, we study and understand two types of attacks which cause more damage to the routing performance of MANET; the attacks are Black Hole attacks and Gray Hole attacks and compare the impact of these attacks on MANET. “Send Fake Route Reply to the nodes” type of attack is used to understand the behavior of these two types of attacks. Existing AODV protocol is modified in order to study these types of attacks in MANET. Performance evaluation of the proposed method is carried out using NS-2. In the presence of these attacks the network performance degrades for various network attributes. The performance of MANET under attack is thoroughly investigated, by applying it on various network parameters with various node densities. Not only had that which attack causes more damage to the environment also studied.

  3. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error...

  4. Countermeasures Against Blinding Attack on Superconducting Nanowire Detectors for QKD

    Directory of Open Access Journals (Sweden)

    Elezov M.S.

    2015-01-01

    Full Text Available Nowadays, the superconducting single-photon detectors (SSPDs are used in Quantum Key Distribution (QKD instead of single-photon avalanche photodiodes. Recently bright-light control of the SSPD has been demonstrated. This attack employed a “backdoor” in the detector biasing technique. We developed the autoreset system which returns the SSPD to superconducting state when it is latched. We investigate latched state of the SSPD and define limit conditions for effective blinding attack. Peculiarity of the blinding attack is a long nonsingle photon response of the SSPD. It is much longer than usual single photon response. Besides, we need follow up response duration of the SSPD. These countermeasures allow us to prevent blind attack on SSPDs for Quantum Key Distribution.

  5. A SURVEY ON PROTOCOLS & ATTACKS IN MANET ROUTING

    Directory of Open Access Journals (Sweden)

    Meenakshi

    2012-09-01

    Full Text Available A mobile ad hoc network (MANET is a dynamic wirelessnetwork that can be formed without any pre-existinginfrastructure in which each node can act as a router.MANET has no clear line of defense, so, it is accessible toboth legitimate network users and malicious attackers. Inthe presence of malicious nodes, one of the main challengesin MANET is to design the robust security solution that canprotect MANET from various routing attacks. Differentmechanisms have been proposed using variouscryptographic techniques to countermeasure the routingattacks against MANET. However, these mechanisms arenot suitable for MANET resource constraints, i.e., limitedbandwidth and battery power, because they introduce heavytraffic load to exchange and verifying keys. In this paper,the current security issues in MANET are investigated.Particularly, we have examined different routing attacks,such as flooding, blackhole, link spoofing, wormhole, andcolluding misrelay attacks, as well as existing solutions toprotect MANET protocols.

  6. Quantum cloning attacks against PUF-based quantum authentication systems

    Science.gov (United States)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-08-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  7. The Radium Terrors. Science Fiction and Radioactivity before the Bomb.

    Science.gov (United States)

    Candela, Andrea

    2015-01-01

    At the beginning of the 20th century the collective imagination was fascinated and terrified by the discovery of radium. A scientific imagery sprang up around radioactivity and was disseminated by public lectures and newspaper articles discussing the ambiguous power of this strange substance. It was claimed that radium could be used to treat cholera, typhus and tuberculosis, but at the same time there were warnings that it could be used for military purposes. The media and the scientists themselves employed a rich vocabulary influenced by religion, alchemy and magic. The ambivalent power of radioactive elements exerted a great influence on science fiction novelists. This paper will examine some significant works published in Europe, America and Russia during the first decades of the 20th century and their role in the creation of the complex imagery of radioactivity that seized the public imagination long before the invention of the atomic bomb.

  8. Explosion and final state of the charged black hole bomb

    CERN Document Server

    Sanchis-Gual, Nicolas; Montero, Pedro J; Font, José A; Herdeiro, Carlos

    2015-01-01

    A Reissner-Nordstr\\"om black hole (BH) is superradiantly unstable against spherical perturbations of a charged scalar field, enclosed in a cavity, with frequency lower than a critical value. We use numerical relativity techniques to follow the development of this unstable system -- dubbed charged BH bomb -- into the non-linear regime, solving the full Einstein--Maxwell--Klein-Gordon equations, in spherical symmetry. We show that: $i)$ the process stops before all the charge is extracted from the BH; $ii)$ the system settles down into a hairy BH: a charged horizon in equilibrium with a scalar field condensate, whose phase is oscillating at the (final) critical frequency. For low scalar field charge, $q$, the final state is approached smoothly and monotonically. For large $q$, however, the energy extraction overshoots and an explosive phenomenon, akin to a $bosenova$, pushes some energy back into the BH. The charge extraction, by contrast, does not reverse.

  9. Laser Proximity Sensor for Fuel-air Explosive Bomb

    Directory of Open Access Journals (Sweden)

    Durga Singh

    2007-05-01

    Full Text Available Present study deals with design and development aspects of a diode laser proximity sensorbased on principle of optical triangulation. This sensor incorporates a laser transmitter and anoptical receiver. The beam divergence of laser transmitter and look angle of receiver are orientedin such a way that they intersect at a predetermined measuring segment. The sensor can be setto give signal output at predetermined distance from the target. Theoretical studies have beencarried out to determine the minimum power required for transmitter with a trade-off between S/Nratio, aperture of receiver optics, reflectivity of target and range requirement. The scattered laserradiation from the target in this segment is utilised in deriving a signal output to detonate thebomb at a predetermined distance from the target. The laser proximity sensor has been developedfor 3 ± 0.5 m operational range and has qualified various environmental tests and live fuel-airexplosive bomb trials.

  10. Detecting body cavity bombs with nuclear quadrupole resonance

    Science.gov (United States)

    Collins, Michael London

    Nuclear Quadrupole Resonance (NQR) is a technology with great potential for detecting hidden explosives. Past NQR research has studied the detection of land mines and bombs concealed within luggage and packages. This thesis focuses on an NQR application that has received less attention and little or no publicly available research: detecting body cavity bombs (BCBs). BCBs include explosives that have been ingested, inserted into orifices, or surgically implanted. BCBs present a threat to aviation and secure facilities. They are extremely difficult to detect with the technology currently employed at security checkpoints. To evaluate whether or not NQR can be used to detect BCBs, a computational model is developed to assess how the dielectric properties of biological tissue affect the radio frequency magnetic field employed in NQR (0.5-5MHz). The relative permittivity of some biological tissue is very high (over 1,000 at 1MHz), making it conceivable that there is a significant effect on the electromagnetic field. To study this effect, the low-frequency approximation known as the Darwin model is employed. First, the electromagnetic field of a coil is calculated in free space. Second, a dielectric object or set of objects is introduced, and the free-space electric field is modified to accommodate the dielectric object ensuring that the relevant boundary conditions are obeyed. Finally, the magnetic field associated with the corrected electric field is calculated. This corrected magnetic field is evaluated with an NQR simulation to estimate the impact of dielectric tissue on NQR measurements. The effect of dielectric tissue is shown to be small, thus obviating a potential barrier to BCB detection. The NQR model presented may assist those designing excitation and detection coils for NQR. Some general coil design considerations and strategies are discussed.

  11. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  12. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  13. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  14. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  15. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  16. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  17. 前景理论视角下的日本突袭珍珠港事件%An Investigation of Japan's Attack on Pearl Harbor According to Prospect Theory

    Institute of Scientific and Technical Information of China (English)

    徐振伟

    2012-01-01

    The comprehensive economic embargo of United States toward Japan which led to fatal threat to Japanese military machine and economy,together with the long-term pessimism caused Japan to take any risk to attack Pearl Harbor suddenly without hesitation.Considering the US is more powerful than Japan,it's hard to understand Japan's attack making use of traditional rational choice theory.This paper analyses the motivation of Japanese behavior applying Prospect theory and tries to explain the reasons for the incident from the perspective of irrational factors.%美国对日本实行全面的经济禁运使日本军事武器和经济受到致命威胁,加上长期以来日本形成的悲情情绪使日本不惜铤而走险,突袭美国珍珠港。面对一个国力十倍于己的国家,日本的做法是传统的理性选择理论所无法解释的。运用前景理论的分析框架来分析日本发动自杀性进攻的动机和原因,会启发人们从一个新的视角来认识这一事件的原因。

  18. Assassination in the United States: an operational study of recent assassins, attackers, and near-lethal approachers.

    Science.gov (United States)

    Fein, R A; Vossekuil, B

    1999-03-01

    This study is the first operational exploration of the thinking and behavior of all 83 persons known to have attacked, or approached to attack, a prominent public official or public figure in the United States since 1949. In addition to data about each attack or near-attack and each subject's demographic and background characteristics, information was gathered about each subject's ideas and actions in the days and weeks before their attacks or near-lethal approaches. Questions were examined about each subject's movement from the idea of attack to actual attack, motives, selection of targets, planning, communication of threat and intent, symptoms of mental illness, and significant life experiences. In every case, the attack or near-attack was the end result of an understandable, and often discernible, process of thinking and action. Implications for protectors, investigators, and researchers are discussed.

  19. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made

  20. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  1. Atomic Bomb: Memory and its Power on Japanese Pacifism

    Science.gov (United States)

    2008-05-01

    would help repel attacks from unjust samurai and became popular heroes in many instances. The yakuza often resolved disputes but generally solved...in a person. Seppuku occurred during the Samurai period but continues today. Although Seppuku is not unheard of, Mishima’s seppuku, especially for

  2. Accident in science history. Hitler's atomic bomb; Stoerfall der Wissenschaftsgeschichte. Hitlers Atombombe

    Energy Technology Data Exchange (ETDEWEB)

    Popp, Manfred

    2016-07-01

    Up to now the historical explanation for the fact that NS Germany did not develop an atomic bomb was that there was enough scientific and technical knowledge but not enough resources. Recent historical research showed that the German scientists in the ''Uranverein'' did not know the cross section of U-235 and had no possibility to measure these cross sections. There exist only very few documents dealing with the bomb. The bomb was treated as a special case of a reactor. Obviously the German scientists did not know he bomb technology. It seems that the project was not success-oriented because the scientists expected to be sent to the front in case of a project stop.

  3. The recovery and analysis of mitochondrial DNA from exploded pipe bombs.

    Science.gov (United States)

    Foran, David R; Gehring, Michael E; Stallworth, Shawn E

    2009-01-01

    Improvised explosive devices (IEDs) represent one of the most common modes of arbitrarily injuring or killing human beings. Because of the heat generated by, and destruction to, an IED postconflagration, most methods for identifying who assembled the device are ineffective. In the research presented, steel pipe bombs were mock-assembled by volunteers, and the bombs detonated under controlled conditions. The resultant shrapnel was collected and swabbed for residual cellular material. Mitochondrial DNA profiles were generated and compared blind to the pool of individuals who assembled the bombs. Assemblers were correctly identified 50% of the time, while another 19% could be placed into a group of three individuals with shared haplotypes. Only one bomb was assigned incorrectly. In some instances a contaminating profile (mixture) was also observed. Taken together, the results speak to the extreme sensitivity the methods have for identifying those who assemble IEDs, along with precautions needed when collecting and processing such evidence.

  4. Long-Term Health Effects of Atom Bomb on Japan Not as Bad as Feared: Study

    Science.gov (United States)

    ... Long-Term Health Effects of Atom Bomb on Japan Not as Bad as Feared: Study Survivors of ... 2011 at a nuclear power plant in Fukushima, Japan, after an earthquake triggered a massive tsunami shows ...

  5. Threat perception after the Boston Marathon bombings: The effects of personal relevance and conceptual framing.

    Science.gov (United States)

    Wormwood, Jolie Baumann; Lynn, Spencer K; Feldman Barrett, Lisa; Quigley, Karen S

    2016-01-01

    We examined how the Boston Marathon bombings affected threat perception in the Boston community. In a threat perception task, participants attempted to "shoot" armed targets and avoid shooting unarmed targets. Participants viewing images of the bombings accompanied by affectively negative music and text (e.g., "Terror Strikes Boston") made more false alarms (i.e., more errors "shooting" unarmed targets) compared to participants viewing the same images accompanied by affectively positive music and text (e.g., "Boston Strong") and participants who did not view bombing images. This difference appears to be driven by decreased sensitivity (i.e., decreased ability to distinguish guns from non-guns) as opposed to a more liberal bias (i.e., favouring the "shoot" response). Additionally, the more strongly affected the participant was by the bombings, the more their sensitivity was reduced in the negatively framed condition, suggesting that this framing was particularly detrimental to the most vulnerable individuals in the affected community.

  6. Leo Szilard Lectureship Award Lecture: North Korea: Reactors, bombs and people

    Science.gov (United States)

    Hecker, Siegfried

    2012-03-01

    In November 2010, during my seventh trip to North Korea, Pyongyang produced a big surprise--it decided to build its own light-water reactor and uranium enrichment plant. During my first visit I was shown plutonium produced in its Yongbyon nuclear complex to convince me they have the bomb. For nearly 40 years, Pyongyang has moved along parallel paths of nuclear energy and nuclear weapons, opting to chose bombs over electricity. I will discuss how North Korea got the bomb, why it got it, and the prospects of whether or not it will give up the bomb. Finally, I will try to show with photos and stories of how North Korea is not such a hermit kingdom after all.

  7. Ellerman bombs at high resolution III. Simultaneous observations with IRIS and SST

    CERN Document Server

    Vissers, Gregal J M; Rutten, Robert J; Carlsson, Mats; De Pontieu, Bart

    2015-01-01

    Ellerman bombs are transient brightenings of the extended wings of the solar Balmer lines in emerging active regions. We describe their properties in the ultraviolet lines sampled by the Interface Region Imaging Spectrograph (IRIS), using simultaneous imaging spectroscopy in H$\\alpha$ with the Swedish 1-m Solar Telescope (SST) and ultraviolet images from the Solar Dynamics Observatory for Ellerman bomb detection and identification. We select multiple co-observed Ellerman bombs for detailed analysis. The IRIS spectra strengthen the view that Ellerman bombs mark reconnection between bipolar kilogauss fluxtubes with the reconnection and the resulting bi-directional jet located within the solar photosphere and shielded by overlying chromospheric fibrils in the cores of strong lines. The spectra suggest that the reconnecting photospheric gas underneath is heated sufficiently to momentarily reach stages of ionization normally assigned to the transition region and the corona. We also analyze similar outburst phenome...

  8. Pattern of injury in those dying from traumatic amputation caused by bomb blast.

    Science.gov (United States)

    Hull, J B; Bowyer, G W; Cooper, G J; Crane, J

    1994-08-01

    Traumatic amputation of limbs caused by bomb blast carries a high risk of mortality. This paper describes 73 amputations in 34 deaths from bomb blast in Northern Ireland. The principal aim was to determine the sites of traumatic amputation to provide a biophysical basis for the development of protective measures. Few amputations were through joints; nearly all were through the bone shafts. The most common site in the tibia was the upper third. The distribution of femoral sites resulting from car bombs differed from that characterizing other types of explosion. For car bombs the principal site of amputation was the upper third; for other types of device it was the lower third. It is concluded that flailing is not a notable contributor to limb avulsion. The pattern of amputation is consistent with direct local pressure loads leading to bone fracture; the amputation itself is a secondary event arising from the flow of combustion products.

  9. Medical Database for the Atomic-Bomb Survivors at Nagasaki University

    OpenAIRE

    Mori, Hiroyuki; Mine, Mariko; Kondo, Hisayoshi; Okumura, Yutaka

    1992-01-01

    The Scientific Data Center for Atomic-Bomb Disasters at Nagasaki University was established in 1974. The database of atomicbomb survivors has been in operation since 1977. The database is composed of following 6 physical database : (1) Fundamental information database. (2) Atomic-Bomb Hospital database, (3) Pathological database, (4) Household reconstruction database, (5) Second generation database, and (6) Address database. We review the current contents of the database for its further appli...

  10. Multiple endocrine tumors in A-bomb survivors, autopsy cases, Hiroshima. Preliminary report

    Energy Technology Data Exchange (ETDEWEB)

    Takeichi, Nobuo; Fujikura, Toshio (Radiation Effects Research Foundation, Hiroshima (Japan)); Ezaki, Haruo

    1984-03-01

    Multiple endocrine tumors (MET) were observed in 27 of 4,136 autopsy cases (0.3%) of the fixed population including Hiroshima atomic bomb survivors and the control group. The thyroid was the most common organ in which MET occurred, followed by the ovary. Thirteen cases, including two cases of three MET, had MET in both the tyroid and the ovary, 11 of which had been exposed to one rad or more of atomic bomb.

  11. Bomb disposal in the Tropics:a cocktail of metabolic and environmental heat

    OpenAIRE

    Stewart, Ian B; Townshend, Andrew; Rojek, Amanda M.; Costello, Joseph

    2013-01-01

    Bomb technicians perform their work while encapsulated in explosive ordnance disposal (EOD) suits. Designed primarily for safety, these suits have an unintended consequence of impairing the body’s natural mechanisms for heat dissipation. Purpose: To quantify the heat strain encountered during an EOD operational scenario in the tropical north of Australia. Methods: All active police male bomb technicians, located in a tropical region of Australia (n=4, experience 7 ± 2.1 yrs, age 34 ± 2 yrs, h...

  12. Factors Determining Satisfaction with Daily Life of Elderly A-bomb Survivors

    OpenAIRE

    Mine, Mariko; Okumura, Yutaka; Kondo, Hisayoshi; Yokota, Kenichi

    1993-01-01

    From the analysis of questionnaires to elderly A-bomb survivors of over 65 years old, we analysed factors which determined satisfaction with daily life. Analysed categories were housing condition, life style, occupational status, health condition and family status. From the analysis, to be an A-bomb survivor was not a factor for satisfaction with daily life, and it became clear that living in a rented room, not satisfying one's job and low income were serious factors which kept elderly people...

  13. Zika Attacks Nerves, Muscles, Other Tissues

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  14. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  15. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore......AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... side-channels attacks can be applied to ECC. This paper reflects an ongoing research in the field of countermeasures against the attacks mentioned above....

  16. The night of the physicists. Heisenberg, Hahn, Weizsaecker, and the German bomb; Die Nacht der Physiker. Heisenberg, Hahn, Weizsaecker und die deutsche Bombe

    Energy Technology Data Exchange (ETDEWEB)

    Schirach, Richard von

    2014-07-01

    Finally the German atomic physicists around Heisenberg, von Weizsaecker, and Hahn worked on their ''uranium machine'' in a Swabian beer-cellar - and took themselves for the world elite of nuclear research. In imprisonment they heared from the dropping of the Hiroshima bomb - a shock. Richard von Schirach shows the hindered ''fathers of the German atomic bomb'' in close-up, their eagerness, their hybris, their true importance, and their attempts to give after the war a new interpretation of their own role. A book, which raises in the sense of Duerrenmatt the question for the responsibility of science.

  17. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  18. Personality and Major Depression among Directly Exposed Survivors of the Oklahoma City Bombing

    Directory of Open Access Journals (Sweden)

    Carol S. North

    2012-01-01

    Full Text Available Background. Few disaster studies have specifically examined personality and resilience in association with disaster exposure, posttraumatic stress disorder (PTSD, and major depression. Methods. 151 directly-exposed survivors of the Oklahoma City bombing randomly selected from a bombing survivor registry completed PTSD, major depression, and personality assessments using the Diagnostic Interview Schedule for DSM-IV and the Temperament and Character Inventory, respectively. Results. The most prevalent postdisaster psychiatric disorder was bombing-related PTSD (32%; major depression was second in prevalence (21%. Bombing-related PTSD was associated with the combination of low self-directedness and low cooperativeness and also with high self-transcendence and high harm avoidance in most configurations. Postdisaster major depression was significantly more prevalent among those with (56% than without (5% bombing-related PTSD (P<.001 and those with (72% than without (14% predisaster major depression (P<.001. Incident major depression was not associated with the combination of low self-directedness and low cooperativeness. Conclusions. Personality features can distinguish resilience to a specific life-threatening stressor from general indicators of well-being. Unlike bombing-related PTSD, major depression was not a robust marker of low resilience. Development and validation of measures of resilience should utilize well-defined diagnoses whenever possible, rather than relying on nonspecific measures of psychological distress.

  19. Was Nazi Germany on the Road to an Atomic Bomb after all?

    Science.gov (United States)

    Lustig, Harry

    2006-04-01

    The story of Germany's efforts to develop a nuclear weapon during World War II is a much written about and contentious subject. However there has been agreement on one thing: by the end of the War the Germans had not achieved and were nowhere near to building a bomb. The dispute therefore has been about why Germany did not succeed. Now, from Germany, comes a challenge to this truth, in the provocative book Hitlers Bombe by Rainer Karlsch. The bombshell in Hitler's Bombe is the assertion that German scientists developed and tested a primitive fission and fusion nuclear weapon in March 1945. Karlsch bases this claim on testimony of witnesses in 1962, previously secret Russian documents, and the results of soil tests carried out in 2004 and 2005. However the physics is very murky and it seems out of the question that Germany had enough Uranium 235 or produced any Plutonium for a bomb. Hitlers Bombe also makes other, better documented and more credible revisionist assertions. These include the claim that the Nazis did continue to try to build a bomb after 1942 and that not Werner Heisenberg, but Kurt Diebner and Walther Gerlach were then the leaders of the German Uranium project. Karlsch's book therefore deserves more attention from physicists and historians than it has received in the United States.

  20. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  1. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin , S.; M. FAIZAL A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  2. A Probabilistic Analysis to Quantify the Effect of March 11, 2004, Attacks in Madrid on the March 14 Elections in Spain: A Dynamic Modelling Approach

    Directory of Open Access Journals (Sweden)

    Juan-Carlos Cortés

    2015-01-01

    Full Text Available The bomb attacks in Madrid three days before the general elections of March 14, 2004, and their possible influence on the victory of PSOE (Spanish Workers Socialist Party, defeating PP (Popular Party, have been a matter of study from several points of view (i.e., sociological, political, or statistical. In this paper, we present a dynamic model based on a system of differential equations such that it, using data from Spanish CIS (National Center of Sociological Research, describes the evolution of voting intention of the Spanish people over time. Using this model, we conclude that the probability is very low that the PSOE would have won had the attack not happened. Moreover, after the attack, the PSOE increased an average of 5.6% in voting on March 14 and an average of 11.2% of the Spanish people changed their vote between March 11 and March 14. These figures are in accordance with other studies.

  3. Strictosidine activation in Apocynaceae: towards a "nuclear time bomb"?

    Directory of Open Access Journals (Sweden)

    Guirimand Grégory

    2010-08-01

    strictosidine vacuolar pool upon enzyme-substrate reunion occurring during potential herbivore feeding constituting a so-called "nuclear time bomb" in reference to the "mustard oil bomb" commonly used to describe the myrosinase-glucosinolate defence system in Brassicaceae.

  4. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like...

  5. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  6. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  7. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  8. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... and interictal plasma levels of MMP-7, -8, -10 and TIMP-2 (P > 0.05). Our data suggest that plasma MMP-9 cannot be used as a biomarker of BBB disruption in migraine without aura. Decreased MMP-3 levels are an interesting and unexpected finding warranting further investigation....

  9. Composition Attacks and Auxiliary Information in Data Privacy

    CERN Document Server

    Ganta, Srivatsava Ranjit; Smith, Adam

    2008-01-01

    Privacy is an increasingly important aspect of data publishing. Reasoning about privacy, however, is fraught with pitfalls. One of the most significant is the auxiliary information (also called external knowledge, background knowledge, or side information) that an adversary gleans from other channels such as the web, public records, or domain knowledge. This paper explores how one can reason about privacy in the face of rich, realistic sources of auxiliary information. Specifically, we investigate the effectiveness of current anonymization schemes in preserving privacy when multiple organizations independently release anonymized data about overlapping populations. 1. We investigate composition attacks, in which an adversary uses independent anonymized releases to breach privacy. We explain why recently proposed models of limited auxiliary information fail to capture composition attacks. Our experiments demonstrate that even a simple instance of a composition attack can breach privacy in practice, for a large ...

  10. A NASA study of the impact of technology on future sea based attack aircraft

    Science.gov (United States)

    Hahn, Andrew S.

    1992-01-01

    A conceptual aircraft design study was recently completed evaluating carrier-based, subsonic attack aircraft using contemporary and future technology assumptions. The study examined a configuration matrix that was made up of light and medium bomb loads, one and two man crews, internal and external weapons carriage, as well as conventional and flying wing planforms. Use of common technology assumptions, engine cycle simulation code, design mission, and consistent application of methods allow for direct comparison of the aircraft. This paper describes the design study ground rules and the aircraft designed. The aircraft descriptions include weights, dimensions, layout, design mission, design constraints, maneuver performance, and fallout mission performance. The strengths, and weaknesses of each aircraft are highlighted.

  11. Diagnostics of Ellerman Bombs with High-resolution Spectral Data

    CERN Document Server

    Li, Z; Guo, Y; Chen, P F; Xu, Z; Cao, W

    2015-01-01

    Ellerman bombs (EBs) are tiny brightenings often observed near sunspots. The most impressive characteristic of the EB spectra is the two emission bumps in both wings of the H$\\alpha$ and \\ion{Ca}{II} 8542 {\\AA} lines. High-resolution spectral data of three small EBs were obtained on 2013 June 6 with the largest solar telescope, the 1.6 meter New Solar Telescope (NST), at the Big Bear Solar Observatory. The characteristics of these EBs are analyzed. The sizes of the EBs are in the range of 0.3\\arcsec\\--0.8\\arcsec\\ and their durations are only 3--5 minutes. Our semi-empirical atmospheric models indicate that the heating occurs around the temperature minimum region with a temperature increase of 2700--3000 K, which is surprisingly higher than previously thought. The radiative and kinetic energies are estimated to be as high as 5$\\times$10$^{25}$--3.0$\\times$10$^{26}$ ergs despite the small size of these EBs. Observations of the magnetic field show that the EBs appeared just in a parasitic region with mixed polar...

  12. METROLOGICAL PERFORMANCES OF BOMB CALORIMETERS AT REAL CONDITIONS

    Directory of Open Access Journals (Sweden)

    Yu. V. Maksimuk

    2016-01-01

    Full Text Available The high-usage measurement equipment for heat of combustion of organic fuels are bomb isoperibol calorimeters with a water thermostat. The stability of work of calorimeters at real conditions is important for maintenance of reliability of measurement results. The article purpose – the analysis of stability for parameters of calorimeters to environment changes. In this work influence room temperature (Тк and heat exchange conditions on metrological characteristics of two models of calorimeters is considered with different degree of thermal protection: V-08МА and BIC 100. For calorimeters V-08МА the increase in a effective heat capacity (W on 0,1 % by growth of Tк on everyone 5 °С is established. To use value W in all interval laboratory temperatures Tк = 14–28 °С it is necessary to correct W on 2,8 J/°C on everyone 1 °С changes of Tк. Updating W is required, if the correction exceeds error in determination W. For calorimeter BIC 100 it is not revealed dependences W from Tк. BIC 100 have constant-temperature cap, high stability a temperature in thermostat and stabilized heat exchange. It is established that an standard deviation of cooling constant for all calorimeters in direct proportional to standard deviation W. 

  13. Diagnostics of Ellerman bombs with high-resolution spectral data

    Science.gov (United States)

    Li, Zhen; Fang, Cheng; Guo, Yang; Chen, Peng-Fei; Xu, Zhi; Cao, Wen-Da

    2015-09-01

    Ellerman bombs (EBs) are tiny brightenings often observed near sunspots. The most impressive characteristic of EB spectra is the two emission bumps in both wings of the Hα and Ca II 8542Å lines. High-resolution spectral data of three small EBs were obtained on 2013 June 6 with the largest solar telescope, the 1.6 m New Solar Telescope at the Big Bear Solar Observatory. The characteristics of these EBs are analyzed. The sizes of the EBs are in the range of 0.3‧ - 0.8‧ and their durations are only 3-5 min. Our semi-empirical atmospheric models indicate that the heating occurs around the temperature minimum region with a temperature increase of 2700-3000 K, which is surprisingly higher than previously thought. The radiative and kinetic energies are estimated to be as high as 5 × 1025 - 3.0 × 1026 erg despite the small size of these EBs. Observations of the magnetic field show that the EBs just appeared in a parasitic region with mixed polarities and were accompanied by mass motions. Nonlinear force-free field extrapolation reveals that the three EBs are connected with a series of magnetic field lines associated with bald patches, which strongly implies that these EBs should be produced by magnetic reconnection in the solar lower atmosphere. According to the lightcurves and the estimated magnetic reconnection rate, we propose that there is a three phase process in EBs: pre-heating, flaring and cooling phases.

  14. Application of Bomb Radiocarbon Chronologies to Shortfin Mako (Isurus oxyrinchus)

    Energy Technology Data Exchange (ETDEWEB)

    Ardizzone, D; Cailliet, G M; Natanson, L J; Andrews, A H; Kerr, L A; Brown, T A

    2007-07-16

    and the number of samples for MIA analysis was insufficient for some months. Hence, unequivocal validation of shortfin mako age estimates has yet to be accomplished. Atmospheric testing of thermonuclear devices in the 1950s and 1960s effectively doubled the natural atmospheric radiocarbon ({sup 14}C). The elevated {sup 14}C levels were first recorded in 1957-58, with a peak around 1963. As a consequence, {sup 14}C entered the ocean through gas exchange with the atmosphere at the ocean surface and in terrestrial runoff. Despite variable oceanographic conditions, a worldwide rise of the bomb {sup 14}C signal entered the ocean mixed layer as dissolved inorganic carbon (DIC) in 1957-58. The large amounts of {sup 14}C released from the bomb tests produced a signature that can be followed through time, throughout the marine food web, and into deeper waters. The marked increase of radiocarbon levels was first measured in the DIC of seawater and in biogenic marine carbonates of hermatypic corals in Florida. Subsequently, this record was documented in corals from other regions and in the thallus of rhodoliths. The accumulation of radiocarbon in the hard parts of most marine organisms in the mixed layer (such as fish otoliths and bivalves) was synchronous with the coral time-series. This technique has been used to validate age estimates and longevity of numerous bony fishes to date, as well as to establish bomb radiocarbon chronologies from different oceans. In the first application of this technique to lamnoid sharks, validated annual band-pair deposition in vertebral growth bands for the porbeagle (Lamna nasus) aged up to 26 years. Radiocarbon values from samples obtained from 15 porbeagle caught in the western North Atlantic Ocean (some of which were known-age) produced a chronology similar in magnitude to the reference carbonate chronology for that region. The observed phase shift of about 3 years was attributed to different sources of carbon between vertebrae and those for

  15. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  16. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  17. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  18. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  19. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identifi...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  20. Ophthalmologic survey of atomic bomb survivors in Japan, 1949. Atomic bomb radiation cataract case report with histopathologic study. Medical examination of Hiroshima patients with radiation cataracts

    Energy Technology Data Exchange (ETDEWEB)

    Cogan, D.G.; Martin, S.F.; Kimura, S.J.; Ikui, Hiroshi; Fillmore, P.G.

    1959-01-01

    This document contains 3 reports dealing with the delayed effects of radiation on the eyes of survivors of the atomic explosions in Hiroshima and Nagasaki. In the first study, 1000 persons who were listed as having been in the open and within two kilometers of the hypocenter at the time of the explosion were selected at random from the census files of the Atomic Bomb Casualty Commission for study. In addition, 231 others, comprising the total available number of surviving persons listed at present in the census files as having been within one kilometer of the hypocenter, were examined, as were several hundred others who were contacted through newspaper publicity, referrals from local ophthalmologists, or through hearsay. The survey resulted in bringing in persons having, or having had, a variety of ocular conditions. Those connected with the atomic bomb included the following diagnoses; multiple injuries of eyes and eyelids; keratoconjunctivitis from ultraviolet and ionizing radiations; thermal burn of the cornea and of the retina; retinitis proliferans; and radiation cataracts. The cataracts were the only delayed manifestations of ocular injury from the atomic bomb. The second paper is a case report of a histopathologic study of atomic bomb radiation cataract. The third paper presents the results of medical examinations of survivors having radiation induced cataracts. 32 references, 8 figures. (DMC)

  1. Hepatitis virus infection and chronic liver disease among atomic-bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Fujiwara, Saeko; Cologne, John; Akahoshi, Masazumi [Radiation Effects Research Foundation, Hiroshima (Japan); Kusumi, Shizuyo [Institute of Radiation Epidemiology, Radiation Effects Association, Tokyo (Japan); Kodama, Kazunori; Yoshizawa, Hiroshi [Hiroshima University School of Medicine, Hiroshima (Japan)

    2000-05-01

    Hepatitis C and B virus (HCV, HBV) infection plays a crucial role in the etiology of chronic hepatitis, liver cirrhosis, and hepatocellular carcinoma, which have been reported to increase with radiation dose among the atomic bomb survivors. The purpose of this study is to investigate whether radiation exposure altered the prevalence of hepatitis virus infection or accelerated the progress toward chronic hepatitis after hepatitis virus infection. Levels of serum antibody to hepatitis C virus (anti-HCV), HBs antigen (HBsAg), and anti-HBs antibody (anti-HBs) were measured for 6,121 participants in the Adult Health Study of atomic bomb survivors in Hiroshima and Nagasaki. No relationship was found between anti-HCV prevalence and radiation dose, after adjusting for age, sex, city, history of blood transfusion, acupuncture, and family history, but prevalence of anti-HCV was significantly lower overall among the radiation-exposed people (relative prevalence 0.84, p=0.022) compared to people with estimated radiation dose 0 Gy. No significant interaction was found between any of the above mentioned risk factors and radiation dose. People with anti-HCV positive had 13 times higher prevalence of chronic liver disease than those without anti-HCV. However, the radiation dose response for chronic liver disease among anti-HCV positive survivors may be greater than that among anti-HCV negative survivors (slope ratio 20), but the difference was marginally significant (p=0.097). Prevalence of HBsAg increased with whole-body kerma. However, no trend with radiation dose was found in the anti-HBs prevalence. In the background, prevalence of chronic liver disease in people with HBsAg-positive was approximately three times higher that in those without HBsAg. No difference in slope of the dose was found among HBsAg positive and negative individuals (slope: HBsAg positive 0.91/Gy, HBsAg negative 0.11/Gy, difference p=0.66). In conclusion, no dose-response relationship was found between

  2. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  3. Design, Development, and Innovation of an Interactive Multimedia Training Simulator for Responding to Air Transportation Bomb Threats

    Science.gov (United States)

    Chung, Christopher A.; Marwaha, Shweta

    2005-01-01

    This paper describes an interactive multimedia simulator for air transportation bomb threat training. The objective of this project is to improve the air transportation sector s capability to respond to bomb threats received by commercial airports and aircraft. The simulator provides realistic training on receiving and responding to a variety of bomb threats that might not otherwise be possible due to time, cost, or operational constraints. Validation analysis indicates that the use of the simulator resulted in statistically significant increases in individual ability to respond to these types of bomb threats.

  4. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  5. The bomb black market - Inquiry about nuclear proliferation; Le marche noir de la bombe - Enquete sur la proliferation nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, B

    2009-07-01

    Nuclear weapons remain for a long time in the hands of the five big powers: USA, Soviet Union, Great Britain, France and China. Things started to change when Israel, and then India acquired the atomic bomb as well. Pakistan took up the race too but Abdul Qadeer Khan, one of the nuclear program maker of the country, took profit of the situation to set up a huge international proliferation network for the spreading of the technologies, tools and materials necessary for weapons fabrication. He offered his services not only to Iran and North Korea, but to Iraq and Libya as well and probably to some other countries. Today, the Iranian nuclear program generates both envy and fear in the Middle East. Who is going to be the next domino of the nuclear game? Egypt, Saudi Arabia, Algeria and Turkey are potential candidates. But while Pakistan sinks into crisis, the terrorists are taking interest in nukes. The author of this book has worked for more than 10 years on this dossier. He has had access to the most sensible documents and to essential testimonies. He now lifts the curtain on the secrets of nuclear proliferation. In this book, where reality sometimes surpasses fiction, he explains how the CIA finally succeeded in infiltrating the 'Khan ring' after having closed its eyes on his deals for a long time. He describes the branches of the Pakistani atomic complex and analyses with lucidity the nuclear terrorism risk.

  6. Adaptive Consensus of Distributed Varying Scale Wireless Sensor Networks under Tolerable Jamming Attacks

    Directory of Open Access Journals (Sweden)

    Jinping Mou

    2013-01-01

    Full Text Available Consensus problem is investigated for a varying scale wireless sensor network (VSWSN under tolerable jamming attacks, where the scale of the network is increasing or decreasing due to the newly joined nodes or the removed nodes, respectively; the tolerable jamming attack means that the attack strength is limited. It supposes that during the communications, all nodes may encounter with the tolerable jamming attacks; when the attack power is larger than the given value, the attacked nodes fall asleep, or otherwise the nodes are awakened. Under the sleep method, based on the Lyapunov method, it shows that if the communicating graph is the global limited intersectional connection (GLI connection and the system has the enough dwell time in the intersectional topology, then under the designed consensus protocol, all nodes achieve the global average consensus.

  7. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  8. Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator

    CERN Document Server

    Esmaili, H A; gharaee, Hossein

    2011-01-01

    Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the black hole. In this attack, a malicious node advertises itself as having freshest or shortest path to specific node to absorb packets to itself. The effect of black hole attack on ad hoc network using AODV as a routing protocol will be examined in this research. Furthermore, we investigate solution for increasing security in these networks. Simulation results using OPNET simulator depict that packet delivery ratio in the presence of malicious nodes, reduces notably.

  9. Analytical Investigation of Attack and Defense Ability Between Asian Men's Basketball Team and the World Top Ranked Team%亚洲男篮与世界诸强攻防能力分析

    Institute of Scientific and Technical Information of China (English)

    黄丽华

    2016-01-01

    The paper utilizes many methods,such as document literature,comparative analysis,videotape observation,mathe⁃matical statistics,etc. to analyze the index of attack and defense ability of Asian men�s basketball team in the 16th annual world basketball championship. The outcome shows that there is a big difference between Asian basketball team and world basketball team. 1) On the offensive,Asian basketball team shows few attempts of shoot and low rate of hits,especially 2 points ball which obviously fall behind his opponents;2)Asian basketball team has a poor ability to scramble for offensive rebound. 3) In a fierce competition Asian basketball team has weak secondary attack ability,and the error probability is rather high. 4) In defense the Steal ability of Asian basketball team is poor. 5) The Block Shot ability of Asian basketball team is inferior to his rival. 6) The robbing offensive rebound ability of Asian basketball team is weak. On account of the above questions,the officials propose that Asian basketball team should improve the players�confidence,intensify the practice of fast shooting,improve the consciousness of rushing for the offensive rebound,strengthen the practice of passing and catching ball ability,enhance the positivity,eager⁃ness and adaptability of defense,intensify the players�consciousness of grabbing the advantage spot first and then the ball when they grab the offensive rebound,reinforce the practice of the players� physical quality in order to improve the body�s withstan⁃ding ability.%运用文献资料、对比分析、录像观察、数据数理统计等方法,对第16届男篮世锦赛亚洲男篮攻防能力的指标进行研究,分析亚洲球队与世界强队之间存在着哪些差距。结果表明:亚洲球队在进攻方面表现为投篮的出手次数少、命中率低,尤其是2分球的出手次数和命中率与对手差距明显;抢进攻篮板球能力差;助攻能力弱,在强对抗中失误

  10. Vulnerability of complex networks under three-level-tree attacks

    Science.gov (United States)

    Hao, Yao-hui; Han, Ji-hong; Lin, Yi; Liu, Lin

    2016-11-01

    We investigate vulnerability of complex networks including model networks and real world networks subject to three-level-tree attack. Specifically, we remove three different three-level-tree structures: RRN (Random Root Node), MaxDRN (Max Degree Root Node) and MinDRN (Min Degree Root Node) from a network iteratively until there is no three-level-tree left. Results demonstrate that random network is more robust than scale-free network against three tree attacks, and the robustness of random network decreases as the increases. And scale-free network shows different characteristics in different tree attack modes. The robustness of scale-free is not affected by the parameters for RRN, but increases as the increases for MinDRN. The important thing is that MaxDRN is the most effective in the three tree attack modes, especially for scale-free network. These findings supplement and extend the previous attack results on nodes and edges, and can thus help us better explain the vulnerability of different networks, and provide an insight into more tolerant real complex systems design.

  11. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  12. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to ...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs.......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...

  13. Is adiponectin a risk factor for transient ischaemic attacks?

    Science.gov (United States)

    Sener, Ufuk; Uludag, Irem Fatma; Kose, Sukran; Ozcelik, Murat; Zorlu, Yasar

    2015-01-01

    Adiponectin is an adipocytokine, and it plays a role in atherosclerosis. The role of adiponectin in the development of ischaemic stroke is controversial. Up to now, adiponectin was not evaluated in transient ischaemic stroke. In this study, we investigated the relationship between adiponectin and transient ischaemic attack. Forty patients with transient ischaemic attack were included into the study. In all patients, traditional risk factors of ischaemic stroke and intima-media thickness of carotid arteries were determined. Also, the relationship between these parameters and adiponectin levels were examined. No difference was found in terms of adiponectin levels between patients and healthy subjects. In addition, there was no association between adiponectin levels and traditional risk factors. Our results suggest that adiponectin may not be a predictive risk factor of transient ischaemic attack.

  14. ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL

    Institute of Scientific and Technical Information of China (English)

    Wei Baodian; Liu Dongsu; Wang Xinmei

    2004-01-01

    The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.

  15. Proteinuria in Hiroshima and Nagasaki atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Freedman, L.R.; Seki, Masafumi; Phair, J.P.; Nefzger, M.D.

    1966-08-25

    A study of the epidemiology of proteinuria was conducted on about 5000 persons comprising a portion of the clinical sample under study at the Atomic Bomb Casualty Commission. In addition, data from previous examinations of similar samples were analyzed. Proteinuria was more common in Hiroshima than in Nagasaki. The rates for men and women did not differ within cities. Age-specific rates of proteinuria were peculiar, peaking in adolescence and old age. In the subjects under study proteinuria was frequently inconstant and usually represented excretion of less than 1.0 g of protein per day. Prior exposure to radiation as measured by distance from the hypocenter was correlated with increased proteinuria rates in 18-year-old subjects who were in utero ATB. Subjects exposed after birth did not show this tendency. It is unsettled whether radiation results in renal disease by increasing the subject's susceptibility to the usual causes of glomerulonephritis or by some more direct mechanism. Persons with proteinuria had higher mean blood pressures and serum urea nitrogen levels than controls and had other findings indicative of generalized cardiovascular-renal disease. Persons with thyroid disease had an increased risk of proteinuria whereas the converse was true of those with a history of treatment for peptic ulcer. Many other factors were tested for a relation to proteinuria, including family history of renal disease, socioeconomic status, urinary symptoms, ingestion of medications, physical findings, hemoglobin levels, height, weight, ABO blood groups, audiometry, vibrometry, and serum cholesterol levels. Although urinary symptoms were more common in persons with proteinuria, the findings in other areas were not sufficiently different to suggest meaningful relations. 20 references, 2 figures, 13 tables.

  16. Application of Bomb Radiocarbon Chronologies to Shortfin Mako (Isurus oxyrinchus)

    Energy Technology Data Exchange (ETDEWEB)

    Ardizzone, D; Cailliet, G M; Natanson, L J; Andrews, A H; Kerr, L A; Brown, T A

    2007-07-16

    and the number of samples for MIA analysis was insufficient for some months. Hence, unequivocal validation of shortfin mako age estimates has yet to be accomplished. Atmospheric testing of thermonuclear devices in the 1950s and 1960s effectively doubled the natural atmospheric radiocarbon ({sup 14}C). The elevated {sup 14}C levels were first recorded in 1957-58, with a peak around 1963. As a consequence, {sup 14}C entered the ocean through gas exchange with the atmosphere at the ocean surface and in terrestrial runoff. Despite variable oceanographic conditions, a worldwide rise of the bomb {sup 14}C signal entered the ocean mixed layer as dissolved inorganic carbon (DIC) in 1957-58. The large amounts of {sup 14}C released from the bomb tests produced a signature that can be followed through time, throughout the marine food web, and into deeper waters. The marked increase of radiocarbon levels was first measured in the DIC of seawater and in biogenic marine carbonates of hermatypic corals in Florida. Subsequently, this record was documented in corals from other regions and in the thallus of rhodoliths. The accumulation of radiocarbon in the hard parts of most marine organisms in the mixed layer (such as fish otoliths and bivalves) was synchronous with the coral time-series. This technique has been used to validate age estimates and longevity of numerous bony fishes to date, as well as to establish bomb radiocarbon chronologies from different oceans. In the first application of this technique to lamnoid sharks, validated annual band-pair deposition in vertebral growth bands for the porbeagle (Lamna nasus) aged up to 26 years. Radiocarbon values from samples obtained from 15 porbeagle caught in the western North Atlantic Ocean (some of which were known-age) produced a chronology similar in magnitude to the reference carbonate chronology for that region. The observed phase shift of about 3 years was attributed to different sources of carbon between vertebrae and those for

  17. Scaling Laws for Impacts into Wet Substrates: Applied to the Bomb Sag at Home Plate, Mars

    Science.gov (United States)

    Birch, S. P.; Manga, M.; Delbridge, B. G.; Patel, A.; Knappe, E.; Dufek, J.

    2013-12-01

    The Mars Exploration Rover Spirit imaged a volcanic bomb sag in Gusev crater at Home Plate (Squyres et al., Science 2007). In order to gain a more complete understanding of these types of craters, we perform laboratory experiments to identify controls on the main features of bomb sags. In our previous work (Manga et al., GRL 2012), we were able to identify clear qualitative differences in the crater morphology, which allowed us to determine that the substrate at Home Plate was fully saturated. The current study focuses on further understanding the relationship between the depth of particle penetration, crater radius, impact velocity, impactor radius and substrate grain size for impacts into a fully saturated substrate. The results of these measurements provide a physical understanding to the previous empirical scaling relationships in crater morphology at intermediate impact velocities between 10 m/s and 100 m/s. By gaining insight into the mechanisms of how a saturated granular medium deforms under the load of an impacting sphere we are able to obtain revised scaling laws for the penetration depth of bomb sags with respect to impact velocity for observable bomb sags. With an inferred impact velocity for the case of the Home Plate bomb sag, we can provide a more accurate estimate of a paleo-Mars atmospheric density.

  18. Noncancer mortality based on the Hiroshima Atomic Bomb survivors registry over 30 years, 1968-1997

    Energy Technology Data Exchange (ETDEWEB)

    Kasagi, Keiko [Hiroshima Univ. (Japan). Research Inst. for Radiation Biology and Medicine

    2002-04-01

    The relation of radiation exposure with noncancer mortality was examined on 44,514 atomic bomb survivors (17,935 males, 26,579 females, and mean age 22.8{+-}15.7 yrs at the time of bombing) registered at Research Institute for Radiation Biology and Medicine, Hiroshima University, based on mortality follow-up over 30 years, 1968-1997. Noncancer mortality was significantly related to radiation dose with relative risk of 1.06 at 1 Sv radiation dose, although weaker than the dose response in solid cancer mortality. The significant dose responses were observed especially in circulatory disease, stroke and urinary organ disease, and suggestive dose response in pneumonia. The temporal pattern in dose response by age at the time of bombing indicated that the relative risk of noncancer mortality was higher with follow-up period, which is contrary to a decreasing dose response in solid cancer mortality with follow-up period. The tendency was remarkable in those survivors younger at the time of bombing. These findings suggest that the significant radiation risk observed in noncancer mortality might increase as the proportion of younger survivors among atomic bomb survivors increases. (author)

  19. Nuclear shadows on silvered walls: Atomic Bomb Cinema, from 1935 to 1991

    Energy Technology Data Exchange (ETDEWEB)

    Shapiro, J.F.

    1991-01-01

    The cinema and the atomic bomb are two of the most significant technological innovations of the past-century - their influence on culture has provoked tremendous political, academic, and popular debate. The point at which these two technologies intersect is what the author calls Atomic Bomb Cinema.' Since 1945 almost six hundred films with images of nuclear weapons have been released in the US, and they have been virtually ignored by everyone but the film going public. This study shows how Bomb films' use recurring themes and formal structures, and therefore must be treated as a coherent body of films; identifies historical, mythological, and contemporary motifs; and analyzes these films from two points of view: interdisciplinary (history, politics, economics, sociology, and aesthetics) and cross-cultural (American, Japanese, British, and Australian). The most important element of Atomic Bomb Cinema is the Apocalyptic Imagination; film makers use it to structure their narratives and explore a wide range of ideological issues. In contrast to commonly held beliefs, Atomic Bomb Cinema is undeniably part of a process that helps people to understand the threat of nuclear war. In this instance, the cinema is one cultural institution that contributes to a healthy society.

  20. Denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping; Lu, Bao-Liang; Zhang, Liqing; Kwok, James

    2011-01-01

    The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis approach to investigate and extract second-order s

  1. Resveratrol products resulting by free radical attack

    Science.gov (United States)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  2. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  3. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  4. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  5. Impact of Alleged Russian Cyber Attacks

    Science.gov (United States)

    2009-05-01

    March 14, 2009). 96 Ivan Buranov, Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal...Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated by Open Source...Buranov, Ivan; Vodo, Vladimir; and Yegikyan, Seda Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated

  6. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  7. Attacks on Local Searching Tools

    CERN Document Server

    Nielson, Seth James; Wallach, Dan S

    2011-01-01

    The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

  8. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  9. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  10. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  11. Ellerman Bombs at High Resolution. IV. Visibility in Na I and Mg I

    Science.gov (United States)

    Rutten, R. J.; Rouppe van der Voort, L. H. M.; Vissers, G. J. M.

    2015-08-01

    Ellerman bombs are transient brightenings of the wings of the solar Balmer lines that mark reconnection in the photosphere. Ellerman noted in 1917 that he did not observe such brightenings in the Na i D and Mg i b lines. This non-visibility should constrain EB interpretation, but has not been addressed in published bomb modeling. We therefore test Ellerman’s observation and confirm it using high-quality imaging spectrometry with the Swedish 1-m Solar Telescope. However, we find a diffuse brightness in these lines that seems to result from prior EBs. We tentatively suggest this is a post-bomb hot-cloud phenomenon also found in recent EB spectroscopy in the ultraviolet.

  12. Ellerman bombs at high resolution. IV. Visibility in Na I and Mg I

    CERN Document Server

    Rutten, R J; Vissers, G J M

    2015-01-01

    Ellerman bombs are transient brightenings of the wings of the solar Balmer lines that mark reconnection in the photosphere. Ellerman noted in 1917 that he did not observe such brightenings in the Na I D and Mg I b lines. This non-visibility should constrain EB interpretation, but has not been addressed in published bomb modeling. We therefore test Ellerman's observation and confirm it using high-quality imaging spectrometry with the Swedish 1-m Solar Telescope. However, we find diffuse brightness in these lines that seems to result from prior EBs. We tentatively suggest this is a post-bomb hot-cloud phenomenon also found in recent EB spectroscopy in the ultraviolet.

  13. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

      - Data collection is difficult to any network analysis because it is difficult to create a complete network.  It is not easy to gain information on terrorist networks.  It is fact that terrorist organizations do not provide information on their members and the government rarely allows researchers...... to use their intelligence data (Ressler S., 2006).  Very few researchers (Krebs, V., 2002, Sageman, M., 2004 and Rodriguez, J. A., 2004) collected data from open sources, and to the best of our knowledge, no knowledge base is available in academia for the analysis of the terrorist events.   To counter...... of Investigative Data Mining (IDM). In addition, we present iMiner Information Harvesting System and describe how intelligence agencies could be benefited from detecting hierarchy in non-hierarchical terrorist networks.  In this paper we present results of detection of hidden hierarchy of Riyadh Bombing Terrorist...

  14. Incidence and impact of dog attacks on guide dogs in the UK: an update.

    Science.gov (United States)

    Moxon, R; Whiteside, H; England, G C W

    2016-04-09

    Data on dog attacks on Guide Dogs' stock were reviewed to investigate the characteristics of the attacks. An average of 11.2 attacks occurred each month. Nearly all of the attacks occurred in public areas, 68.4 per cent of victim dogs were qualified guide dogs and 55.5 per cent of victim dogs were working in harness when they were attacked. Guide Dogs' stock were injured in 43.2 per cent of attacks and veterinary costs for attacks were estimated at £34,514.30. Over 40 per cent of qualified guide dogs' working ability was affected and >20 per cent of qualified guide dogs required some time off from working after a dog attack. Twenty dogs were permanently withdrawn from the Guide Dogs' programme as a result of dog attacks, 13 of which were qualified and working with guide dog owners at the time of the withdrawal; this resulted in a financial cost of >£600,000 to the charity. More importantly perhaps, temporary and permanent withdrawals have a significant impact upon the mobility and independence of guide dog owners and in many cases significantly impacted their emotional well-being.

  15. A community study of the psychological effects of the Omagh car bomb on adults.

    Directory of Open Access Journals (Sweden)

    Michael Duffy

    Full Text Available BACKGROUND: The main aims of the study were to assess psychological morbidity among adults nine months after a car bomb explosion in the town of Omagh, Northern Ireland and to identify predictors of chronic posttraumatic stress disorder symptoms. METHOD: A questionnaire was sent to all adults in households in The Omagh District Council area. The questionnaire comprised established predictors of PTSD (such as pre-trauma personal characteristics, type of exposure, initial emotional response and long-term adverse physical or financial problems, predictors derived from the Ehlers and Clark (2000 cognitive model, a measure of PTSD symptoms and the General Health Questionnaire. RESULTS: Among respondents (n = 3131 the highest rates of PTSD symptoms and probable casesness (58.5% were observed among people who were present in the street when the bomb exploded but elevated rates were also observed in people who subsequently attended the scene (21.8% probable caseness and among people for whom someone close died (11.9%. People with a near miss (left the scene before the explosion did not show elevated rates. Exposure to the bombing increased PTSD symptoms to a greater extent than general psychiatric symptoms. Previously established predictors accounted for 42% of the variance in PTSD symptoms among people directly exposed to the bombing. Predictors derived from the cognitive model accounted for 63%. CONCLUSIONS: High rates of chronic PTSD were observed in individuals exposed to the bombing. Psychological variables that are in principle amenable to treatment were the best predictors of PTSD symptoms. Teams planning treatment interventions for victims of future bombings and other traumas may wish to take these results into account.

  16. Seeing the Light: Visibility of the July '45 Trinity Atomic Bomb Test from the Inner Solar System

    Science.gov (United States)

    Reed, B. Cameron

    2006-01-01

    In his "The Making of the Atomic Bomb," Richard Rhodes remarks of the July 16, 1945, Trinity atomic bomb test in New Mexico that "had astronomers been watching they could have seen it reflected from the moon, literal moonshine," an allusion to Ernest Rutherford's famous dismissal of the prospect of atomic energy. Investigating…

  17. Aerodynamic Configuration Design of Gliding Extended Range Guided Bomb%滑翔增程制导航弹气动外形设计

    Institute of Scientific and Technical Information of China (English)

    雷娟棉; 吴甲生

    2011-01-01

    To improve the range of guided bomb, the scheme of aerodynamic configuration of extended range GPS guided bomb was put forward based on the gliding extended range technique. The designed aerodynamic configuration was the tail control configuration having great span-chord ratio up-wing and the tail/rudder with " X " form. By aerodynamic characteristics calculation and analysis, the parameters of configuration geometry were determined. Wind tunnel experiments were conducted for two models of wing stretch-out and wing folded model, respectively. The experiment conditions were as follows. The rolling angles are (ψ)=0(wing is horizontal, tail is" X "form) , 22. 5° and 45. 0°. The Mach number are Ma = 0.6, 0. 8 and 1. 0. The angles of attack are a = 0 ~ 12°. The rudder deflection angles are δz - 0; δs = - 5°, - 10° (pitching control); δy = - 5°, - 10° (yawing control); δX = - 5°, - 10° (rolling control). Experiment results indicate that the designed GPS guided bomb' s longitudinal stability and controllability match well, and the controlling efficiency of tail rudder is very high. The angle of attack being propitious to gliding flight is from 4° to 6° and the maximal lift-drag ratio is greater than 10. From the experiment result, it could be concluded that the effective range of the guided bomb would over 120 km while it is released at 12 km altitude.%为了提高制导航弹的射程,在滑翔增程技术研究基础上提出了远程卫星制导炸弹的气动布局方案,即采取大展弦比上弹翼、“×”形全动尾舵的正常式气动布局,通过计算选择了外形参数.对所提出的外形方案进行了风洞测力实验.实验条件为:滚转角(φ)=0(弹翼水平,尾翼呈“×”形),22.5°,45.0°;马赫数Ma=0.6,0.8,1.0;攻角α=0~12°;舵偏角δ=0,δz=-5°,-10°(俯仰控制),δy=-5°,-10°(偏航控制),δr=-5°,-10°(滚转控制).模型有弹翼张开与折叠两种状态.实验结果表明,所设计的卫星制导炸弹

  18. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  19. Genius in the shadows a biography of Leo Szilard, the man behind the bomb

    CERN Document Server

    Lanouette, William

    2013-01-01

    Well-known names such as Albert Einstein, Enrico Fermi, J. Robert Oppenheimer, and Edward Teller are usually those that surround the creation of the atom bomb. One name that is rarely mentioned is Leo Szilard, known in scientific circles as "father of the atom bomb." The man who first developed the idea of harnessing energy from nuclear chain reactions, he is curiously buried with barely a trace in the history of this well-known and controversial topic.Born in Hungary and educated in Berlin, he escaped Hitler's Germany in 1933 and that first year developed his concept of nucle

  20. MSCT findings in a controlled bus bombing using a pig model

    DEFF Research Database (Denmark)

    Hansen, Nikolaj Friis

    2009-01-01

    In terrorist acts such as car and bus bombings by a suicide bomber using home made or other explosives, there may be many fatalities and wounded. From a forensic pathological point of view this poses a challenge regarding identification of the fatalities, recording the injuries and identifying...... and recovering relevant foreign bodies that might have been used in the bomb to inflict more damages to bystanders. The author will present MSCT findings and the injuries found at autopsy in 10 dead pigs were positioned inside the bus in a controlled explosion. This will be done in correlation to the individual...

  1. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  2. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    Science.gov (United States)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  3. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  4. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  5. Minimization and Reliability Analyses of Attack Graphs

    Science.gov (United States)

    2002-02-01

    they model only attacks. Since we have a generic state machine model , we can simultaneously model not just attacks, but also seemingly benign system...Finite State Machine Model The Network We model the network as a set of facts, each represented as a relational predicate. The state of the network

  6. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  7. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  8. Attack tree generation by policy invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified th

  9. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  10. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  11. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash......In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... function Skein, a finalist of the SHA-3 competition. Our attack penetrates more than two thirds of the Skein core—the cipher Threefish, and made the designers to change the submission in order to prevent it. The rebound part of our attack has been significantly enhanced to deliver results on the largest...

  12. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  13. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  14. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  15. Metabolic Profile as a Potential Modifier of Long-Term Radiation Effects on Peripheral Lymphocyte Subsets in Atomic Bomb Survivors.

    Science.gov (United States)

    Yoshida, Kengo; Nakashima, Eiji; Kyoizumi, Seishi; Hakoda, Masayuki; Hayashi, Tomonori; Hida, Ayumi; Ohishi, Waka; Kusunoki, Yoichiro

    2016-09-01

    Immune system impairments reflected by the composition and function of circulating lymphocytes are still observed in atomic bomb survivors, and metabolic abnormalities including altered blood triglyceride and cholesterol levels have also been detected in such survivors. Based on closely related features of immune and metabolic profiles of individuals, we investigated the hypothesis that long-term effects of radiation exposure on lymphocyte subsets might be modified by metabolic profiles in 3,113 atomic bomb survivors who participated in health examinations at the Radiation Effect Research Foundation, Hiroshima and Nagasaki, in 2000-2002. The lymphocyte subsets analyzed involved T-, B- and NK-cell subsets, and their percentages in the lymphocyte fraction were assessed using flow cytometry. Health examinations included metabolic indicators, body mass index, serum levels of total cholesterol, high-density lipoprotein cholesterol, C-reactive protein and hemoglobin A1c, as well as diabetes and fatty liver diagnoses. Standard regression analyses indicated that several metabolic indicators of obesity/related disease, particularly high-density lipoprotein cholesterol levels, were positively associated with type-1 helper T- and B-cell percentages but were inversely associated with naïve CD4 T and NK cells. A regression analysis adjusted for high-density lipoprotein cholesterol revealed a radiation dose relationship with increasing NK-cell percentage. Additionally, an interaction effect was suggested between radiation dose and C-reactive protein on B-cell percentage with a negative coefficient of the interaction term. Collectively, these findings suggest that radiation exposure and subsequent metabolic profile changes, potentially in relationship to obesity-related inflammation, lead to such long-term alterations in lymphocyte subset composition. Because this study is based on cross-sectional and exploratory analyses, the implications regarding radiation exposure, metabolic

  16. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  17. Algebraically special resonances of the Kerr-black-hole-mirror bomb

    CERN Document Server

    Hod, Shahar

    2014-01-01

    A co-rotating bosonic field interacting with a spinning Kerr black hole can extract rotational energy and angular momentum from the hole. This intriguing phenomenon is known as superradiant scattering. As pointed out by Press and Teukolsky, the black-hole-field system can be made unstable (explosive) by placing a reflecting mirror around the black hole which prevents the extracted energy from escaping to infinity. This composed black-hole-mirror-field bomb has been studied extensively by many researchers. It is worth noting, however, that most former studies of the black-hole bomb phenomenon have focused on the specific case of confined scalar (spin-$0$) fields. In the present study we explore the physical properties of the higher-spin (electromagnetic and gravitational) black-hole bombs. It is shown that this composed system is amenable to an analytic treatment in the physically interesting regime of rapidly-rotating black holes. In particular, we prove that the composed black-hole-mirror-field bomb is chara...

  18. A-BOMB SURVIVOR SITE-SPECIFIC RADIOGENIC CANCER RISKS ESTIMATES

    Science.gov (United States)

    A draft manuscript is being prepared that describes ways to improve estimates of risk from radiation that have been derived from A-bomb survivors. The work has been published in the journal Radiation Research volume 169, pages 87-98.

  19. The Phenomenon of Suicide Bombing: A Review of Psychological and Nonpsychological Factors

    NARCIS (Netherlands)

    Grimland, M.; Apter, A.; Kerkhof, A.J.F.M.

    2006-01-01

    This article reviews the literature on the phenomenon of suicide bombing. It addresses the question of just how much a psychological understanding of the individuals involved can aid in prevention. The article looks at historical, epidemiological, and cultural perspectives and compares the nonpsycho

  20. Bombs Away: Visual Thinking and Students' Engagement in Design Studios Contexts

    Science.gov (United States)

    Chamorro-Koc, Marianella; Scott, Andrew; Coombs, Gretchen

    2015-01-01

    In design studio, sketching or visual thinking is part of processes that assist students to achieve final design solutions. At Queensland University of Technology's (QUT's) First and Third Year industrial design studio classes we engage in a variety of teaching pedagogies from which we identify "Concept Bombs" as instrumental in the…

  1. Ellerman Bombs at high resolution: II. Visibility, triggering and effect on upper atmosphere

    CERN Document Server

    Vissers, Gregal J M; Rutten, Robert J

    2013-01-01

    We use high-resolution imaging spectroscopy with the Swedish 1-m Solar Telescope (SST) to study the transient brightenings of the wings of the Balmer Halpha line in emerging active regions that are called Ellerman bombs. Simultaneous sampling of Ca II 854.2 nm with the SST confirms that most Ellerman bombs occur also in the wings of this line, but with markedly different morphology. Simultaneous images from the Solar Dynamics Observatory (SDO) show that Ellerman bombs are also detectable in the photospheric 170 nm continuum, again with differing morphology. They are also observable in 160 nm SDO images, but with much contamination from C IV emission in transition-region features. Simultaneous SST spectropolarimetry in Fe I 630.1 nm shows that Ellerman bombs occur at sites of strong-field magnetic flux cancelation between small bipolar strong-field patches that rapidly move together over the solar surface. Simultaneous SDO images in He II 30.4 nm, Fe IX 17.1 nm, and Fe XIV 21.1 nm show no clear effect of the E...

  2. The marine radiocarbon bomb pulse across the temperate North Atlantic: a compilation of Delta

    NARCIS (Netherlands)

    Scourse, J.D.; Wanamaker jr., A.D.; Weidman, C.; Heinemeier, J.; Reimer, P.J.; Butler, P.G.; Witbaard, R.; Richardson, C.A.

    2012-01-01

    Marine radiocarbon bomb-pulse time histories of annually resolved archives from temperate regions have been underexploited. We present here series of Delta C-14 excess from known-age annual increments of the long-lived bivalve mollusk Arctica islandica from 4 sites across the coastal North Atlantic

  3. The Strategic Bombing of German Cities during World War II and its Impact for Germany

    NARCIS (Netherlands)

    Brakman, S.; Garretsen, H; Schramm, M.

    2003-01-01

    We construct a unique data set in order to analyze whether or not a large temporary shock has an impact on city growth. Following recent work by Davis and Weinstein (2002) on Japan, we take the strategic bombing of German cities during WWII as an example of such a shock, and analyze its impact on po

  4. Books, Not Bombs: Teaching Peace since the Dawn of the Republic. Peace Education

    Science.gov (United States)

    Howlett, Charles; Harris, Ian,

    2010-01-01

    "Books Not Bombs: Teaching Peace Since the Dawn of the Republic" is an important work relevant to peace scholars, practitioners, and students. This incisive book offers an exciting and comprehensive historical analysis of the origins and development of peace education from the creation of the New Republic at the end of the Eighteenth Century to…

  5. An Intrusion Detection System Against UDP Flood Attack and Ping of Death Attack (DDOS in MANET

    Directory of Open Access Journals (Sweden)

    Ankur Ashok Acharya

    2016-04-01

    Full Text Available DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death attack are considered to be important as these two attacks may cause severe damage to the network. To provide better security to the network, efficient intrusion detection (IDS system is required to monitor the network continuously, keeping track of malicious activities and policy violations and produce report to the network administrator. UDP flood attack and ping of death attack are given importance in this paper as they are not well addressed in the existing research works. Packet capture and packet decoder is used to identify the packets and retrieve the packet details. A threshold is set for each node that is connected to the network. If the packet flow into the node exceeds the threshold that is set then the administrator is notified about the same.

  6. Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense

    Directory of Open Access Journals (Sweden)

    Muhammad Aamir

    2013-07-01

    Full Text Available Different types and techniques of DDoS attacks & defense are studied in this paper with some recent information on attacks dominated in year 2012 (1st Quarter. We further provide simulation based analysis of an FTP server’s performance in a typical enterprise network under distributed denial of service attack. Simulations in OPNET show noticeable variations in connection capacity, task processing and delay parameters of the attacked server as compared to the performance without attack. DDoS detection and mitigation mechanisms discussed in this paper mainly focus on some recently investigated techniques. Finally, conclusions are drawn on the basis of survey based study as well as simulation results.

  7. Effect of hydrogen attack on acoustic emission behavior of low carbon steel

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    In order to investigate the effect of hydrogen attack degree on acoustic emission (AE) behavior of low carbon steel during tensiling, specimens made of low carbon steel was exposed to hydrogen gas of 18 MPa at 450 and 500℃ for 240, 480 and 720 h respectively. Experimental results show that with increase of the hydrogen attack degree, the totally AE activity decreases during tensiling. In addition, the count of AE signals with high amplitude for the specimens with hydrogen attack keeps a constant which is less than that without hydrogen attack. It is concluded that AE signals originate in the specimens with hydrogen attack from intergranular fracture induced by methane blisterings or/and microcracks on grain boundaries.

  8. PERFORMANCE ANALYSIS OF ADHOC ON DEMAND DISTANCE VECTOR PROTOCOL WITH BLACKHOLE ATTACK IN WSN

    Directory of Open Access Journals (Sweden)

    Adnan Ahmed

    2014-01-01

    Full Text Available The security is major challenging issue in wireless sensor network applications because they are operated in public and unrestrained areas which also makes difficult to protect against tampering or captured by an adversary force that can launch insider attacks to make a node compromised. One type of such attack is black hole attack. Existing AODV routing protocol does not have mechanism to defend against such attacks. In this study, we comprehensively investigates the performance of AODV protocol by simulating it on the various network parameters with various number of blackhole nodes. The metrics for evaluation has been considered as packet delivery ratio, end to end delay, normalized routing overhead and total number of packets drop. The simulation results show that blackhole attack severely degrades the performance of WSN.

  9. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  10. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  11. Radiation effect on non-cancer diseases among a-bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Suzuki, G.; Akahoshi, M.; Fujiwara, S.; Neriishi, K.; Yamada, M.; Hakoda, M. [Radiation Effect Research Foundation, Hiroshima (Japan)

    2002-07-01

    It has been well documented in the literature that radiation induces DNA damages and increases cancer risk. Besides cancer risk, the Life Span Study (LSS) on A-bomb survivors in Hiroshima and Nagasaki that has been conducted since 1950 by RERF demonstrated an increase in non-cancer death by cardiovascular diseases and chronic liver diseases (1). Since LSS analysis depends on death certificate, a physiological mechanism has not been elucidated how radiation increases the incidence of non-cancer diseases. In order to elucidate radiation effect on non-fatal disorders, RERF has conducted the Adult Health Study (AHS) since 1958 where 23,000 A-bomb survivors have been examined every other year. This study suggested that radiation exposure about 55 years before reduced the immune response to pathogens such as HB virus and Chlamydia pneumoniae, increased the levels of serum inflammatory markers, the prevalence of chronic hepatitis/liver cirrhosis and senile cataract, and the incidence of cardiovascular diseases. Our colleagues reported a dose-dependent decrease in the CD4 T cell number among A-bomb survivors (2,3). Since chronic inflammation and oxidative stress are causative of atherogenic cardiovascular diseases or cataract, we speculate a decrease in the immune response to pathogens, at least in part, is one of the mechanisms that A-bomb exposure increased non-cancer diseases. When the levels of inflammatory marker, C-reactive protein (CRP), were analyzed among subjects with evidence of Chlamydia pneumoniae infection, significantly higher levels of CRP were associated with antibodies to Chlamydia pneumoniae in those subjects receiving >1Gy than those receiving <5mGy. It is well known that high CRP is one of the risk factors of arteriosclerosis (4,5). Thus, A-bomb exposure seems to augment inflammatory response to pathogens, though of which mechanisms are not clear now.

  12. ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX

    Institute of Scientific and Technical Information of China (English)

    Wang Shaohui; Liu Sujuan

    2013-01-01

    Most of the Radio Frequency IDentification (RFID) authentication protocols,proposed to preserve security and privacy,are analysed to show that they can not provide security against some passive or active attacks.In this paper,the security of two matrix-based protocols,proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al.(RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard,are investigated.Using the linear relationship of multiplication of matrix and vector,we point out that both protocols can not provide scalability,and they are vulnerable to passive impersonation attack.In addition,both protocols are totally insecure if the adversary can compromise one tag to extract the secrets.A modified lightweight matrix-based authentication protocol is presented,which can resist mainly common attacks on an RFID authentication system including eavesdropping,relay attack,desynchronization attack,impersonation attack and tag tracking attack.The new protocol also has the desirable scalability property and can keep secure under compromising attack.

  13. Measuring a System’s Attack Surface

    Science.gov (United States)

    2004-01-01

    fold: • In terms of a state machine model of the system, we present formal definitions of attack, attack surface, and attack class. Our definitions are...versions. The rest of this paper is organized as follows. In Section 2, we introduce our state machine model and point out the key differences from...approach in Section 6 and compare it to related work in Section 7. We conclude in Section 8. 2 State Machine Model We use a state machine to model the

  14. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  15. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  16. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks ... symptoms are called silent heart attacks. Most Common Symptoms The most common warning symptoms of a heart ...

  17. On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks †

    OpenAIRE

    Qiu Wang; Hong-Ning Dai; Xuran Li; Hao Wang; Hong Xiao

    2016-01-01

    The security and privacy of underwater acoustic sensor networks has received extensive attention recently due to the proliferation of underwater activities. This paper proposes an analytical model to investigate the eavesdropping attacks in underwater acoustic sensor networks. Our analytical framework considers the impacts of various underwater acoustic channel conditions (such as the acoustic signal frequency, spreading factor and wind speed) and different hydrophones (isotropic hydrophones ...

  18. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  19. Taxonomy of SSL/TLS Attacks

    Directory of Open Access Journals (Sweden)

    Keerthi Vasan K.

    2016-02-01

    Full Text Available Secure Socket Layer (SSL and Transport Layer Security (TLS protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.

  20. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  1. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  2. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  3. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  4. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  5. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  6. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... medicines also keep existing clots from getting larger. Beta blockers . Beta blockers decrease your heart’s workload. These medicines also are ... discomfort and to help prevent another heart attack. Beta blockers also are used to treat arrhythmias (irregular heartbeats). ...

  7. Preventing Coordinated Attacks Via Distributed Alert Exchange

    CERN Document Server

    Garcia-Alfaro, Joaquin; Muehl, Gero; Borrell, Joan

    2008-01-01

    Attacks on information systems followed by intrusions may cause large revenue losses. The prevention of both is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to recognize and react to the different actions of such an attack. The design and deployment of a decentralized system targeted at detecting as well as reacting to information system attacks might benefit from the loose coupling realized by publish/subscribe middleware. In this paper, we present the advantages and convenience in using this communication paradigm for a general decentralized attack prevention framework. Furthermore, we present the design and implementation of our approach based on existing publish/subscribe middleware and evaluate our approach for GNU/Linux systems.

  8. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  9. Study Shows How Zika Attacks Infant Brain

    Science.gov (United States)

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  10. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  11. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  12. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  13. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  14. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment...... sequences to treat four moderate-to-severe migraine attacks. Control patients received placebo for three attacks and telcagepant 140 mg for one attack. Efficacy for the first attack (Attack 1) and consistency of efficacy over multiple attacks were assessed. For an individual patient, consistent efficacy...

  15. Cancer and non-cancer effects in Japanese atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Little, M P [Department of Epidemiology and Public Health, Imperial College, London W2 1PG (United Kingdom)], E-mail: mark.little@imperial.ac.uk

    2009-06-01

    The survivors of the atomic bombings in Hiroshima and Nagasaki are a general population of all ages and sexes and, because of the wide and well characterised range of doses received, have been used by many scientific committees (International Commission on Radiological Protection (ICRP), United Nations Scientific Committee on the Effects of Atomic Radiation (UNSCEAR), Biological Effects of Ionizing Radiations (BEIR)) as the basis of population cancer risk estimates following radiation exposure. Leukaemia was the first cancer to be associated with atomic bomb radiation exposure, with preliminary indications of an excess among the survivors within the first five years after the bombings. An excess of solid cancers became apparent approximately ten years after radiation exposure. With increasing follow-up, excess risks of most cancer types have been observed, the major exceptions being chronic lymphocytic leukaemia, and pancreatic, prostate and uterine cancer. For most solid cancer sites a linear dose response is observed, although in the latest follow-up of the mortality data there is evidence (p = 0.10) for an upward curvature in the dose response for all solid cancers. The only cancer sites which exhibit (upward) curvature in the dose response are leukaemia, and non-melanoma skin and bone cancer. For leukaemia the dose response is very markedly upward curving, indeed largely describable as a pure quadratic dose response, particularly in the low dose (0-2 Sv) range. Even 55 years after the bombings over 40% of the Life Span Study cohort remain alive, so continued follow-up of this group is vital for completing our understanding of long-term radiation effects in people. In general, the relative risks per unit dose among the Japanese atomic bomb survivors are greater than those among comparable subsets in studies of medically exposed individuals. Cell sterilisation largely accounts for the discrepancy in relative risks between these two populations, although other

  16. Heart Attack Prediction System Based Neural Arbitration

    OpenAIRE

    Helwan, Abdulkader

    2015-01-01

    Heart attack is an asymptomatic and epidemic medical condition that may suddenly occur and causes “death”. Therefore, it is a life-threatening condition and it should be detected before it occurs. Heart attack is so far predicted using the conventional ways of doctor’s examination and by performing some medical tests such as stress test, ECG, and heart CTScan etc. The coronary vessels constriction, the cholesterol levels in the arteries, and other attributes can be good indicators for making ...

  17. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  18. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  19. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical

  20. Penetrating injury of the lungs and multiple injuries of lower extremities caused by aircraft bombs splinters

    Directory of Open Access Journals (Sweden)

    Golubović Zoran

    2010-01-01

    Full Text Available Introduction. Injuries caused by aircraft bombs cause severe damages to the human body. They are characterized by massive destruction of injured tissues and organs, primary contamination by polymorph bacterial flora and modified reactivity of the body. Upon being wounded by aircraft bombs projectiles a victim simultaneously sustains severe damages of many organs and organ systems due to the fact that a large number of projectiles at the same time injure the chest, stomach, head and extremities. Case report. We presented a patient, 41 years of age, injured by aircraft bomb with hemo-pneumothorax and destruction of the bone and soft tissue structures of the foot, as well as the treatment result of such heavy injuries. After receiving thoracocentesis and short reanimation, the patient underwent surgical procedure. The team performed thoracotomy, primary treatment of the wound and atypical resection of the left lung. Thoracic drains were placed. The wounds on the lower leg and feet were treated primarily. Due to massive destruction of bone tissue of the right foot by cluster bomb splinters, and impossibility of reconstruction of the foot, guillotine amputation of the right lower leg was performed. Twelve days after the wounding caused by cluster bomb splinters, soft tissue of the left lower leg was covered by Tirsch free transplantant and the defect in the area of the left foot was covered by dorsalis pedis flap. The transplant and flap were accepted and the donor sites were epithelized. Twenty-six days following the wounding reamputation was performed and amputation stump of the right lower leg was closed. The patient was given a lower leg prosthesis with which he could move. Conclusion. Upon being wounded by aircraft bomb splinters, the injured person sustains severe wounds of multiple organs and organ systems due to simultaneous injuries caused by a large number of projectiles. It is necessary to take care of the vital organs first because they

  1. A Review of Network Forensics Techniques for the Analysis of Web Based Attack

    Directory of Open Access Journals (Sweden)

    Mr. Sudhakar Parate, Ms. S. M. Nirkhi

    2012-12-01

    Full Text Available Network forensics has been the most prevalenttechnology to investigate different attack. It used fortroubleshooting connection issues and helping tosolve various network security problems, such assystem log, router log, and access control. NetworkForensic help to identify the evidences of datasource as intermediate side and the end sides. Thispaper gives comprehensive review on varioustechniques that helps to improve the system,analysis of different attack, detection of attack. Itfocuses on the critical stages of preservation andacquisition of digital evidence from the differentsource to be used as evidence for aidinginvestigation.

  2. SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    SHEENU SHARMA

    2009-06-01

    Full Text Available A wireless ad hoc network is a temporary network set up by wireless nodes usually moving randomly and communicating without a network infrastructure. Due to security vulnerabilities of the routing protocols, however, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. In this study we investigated the effects of Blackhole attacks on the network performance. We simulated Blackhole attacks in Qualnet Simulator and measured the packet loss in the network with and without a blackhole. The simulation is done on AODV (Ad hoc On Demand Distance Vector Routing Protocol. The network performance in the presence of a blackhole is reduced up to 26%.

  3. Applying the Principles of Homicide by Heart Attack.

    Science.gov (United States)

    Hlavaty, Leigh; Sung, LokMan

    2016-06-01

    Homicide by heart attack is a well-established model in forensic pathology that describes death elicited during or immediately after a criminal act where a threat or fear of physical injury is present. After its introduction nearly 4 decades ago, the principle has undergone a handful of modifications but still maintains its core concepts. All cases of this nature during a 20-year period at the Wayne County Medical Examiner's Office were compared and contrasted for demographics, circumstances and scene investigation, and autopsy and toxicology findings. Of the cases fulfilling the previously established criteria for homicide by heart attack, more than 80% displayed significant changes because of hypertension. This finding coincides with the high prevalence of hypertension in our urban population and highlights the significance of this disease. Also present were minor external and internal injuries in select cases, which reinforce the understanding that physical contact between the decedent and assailant does not preclude this diagnosis.

  4. Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems

    Energy Technology Data Exchange (ETDEWEB)

    Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh; Chatterjee, Samrat

    2016-09-15

    We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. We develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.

  5. Very low cost stand-off suicide bomber detection system using human gait analysis to screen potential bomb carrying individuals

    Science.gov (United States)

    Greneker, Gene, III

    2005-05-01

    Individuals who carry bombs on their bodies and detonate those bombs in public places are a security problem. There is belief that suicide bombings currently used in the mid-east may spread to the United States if the organized terrorist groups operating in the United States are not identified and the cell members arrested. While bombs in vehicles are the primary method currently used to spread terror in Iraq, U. S. warfighters are starting to face suicide bombers. This may become more of the situation if a stand-off detection capability is developed for the vehicle bomb case. This paper presents a concept, that if developed and commercialized, could provide an inexpensive suicide bomber screening system that could be used to screen individuals approaching a checkpoint while the individual is still 500 to 1,000 feet from the checkpoint. The proposed system measures both the radar cross-section of the individual and the radar derived gait characteristics that are associated with individuals carrying a bomb on their body. GTRI researchers propose to use human gait characteristics, as detected by radar, to determine if a human subject who is carrying no visible load on the body is actually carrying a concealed load under their clothes. The use of radar gait as a metric for the detection (as opposed to a video system) of a suicide bomber is being proposed because detection of gait characteristics are thought to be less sensitive to where the bomb is located on the body, lighting conditions, and the fact that the legs may be shrouded in a robe. The detection of a bomb using radar gait analysis may also prove to be less sensitive to changing tactics regarding where the bomb is placed on the body. An inert suicide bomb vest was constructed using water pipes to simulate the explosive devices. Wiring was added to simulated detonators. The vest weighs approximately 35 pounds. Radar data was taken on the volunteer subject wearing the vest that simulated the suicide bomb. This

  6. Embracing the Bomb: Ethics, Morality, and Nuclear Deterrence in the U.S. Air Force, 1945-1955

    Science.gov (United States)

    2007-11-02

    U.S. constitution, a personal and professional devotion to strategic bombing, and an ardent belief lThe United States Strategic Bombing Survey...largely wait until after hostilities ceased, so it naturally focused on, and was severely complicated by, the closing epic event of the war: the...activities, from machines to morals, from physics to philosophy, from politics to poetry ,൪ yet the popular feeling was that humans could properly and

  7. On the effectiveness of XML schema validation for countering XML signature wrapping attacks

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher; Somorovsky, Juraj

    2011-01-01

    investigated closely enough to make any claims about their effectiveness. In this paper, we analyze the effectiveness of the specific countermeasure of XML Schema validation in terms of fending Signature Wrapping attacks. We investigate the problems of XML Schema validation for Web Services messages......In the context of security of Web Services, the XML Signature Wrapping attack technique has lately received increasing attention. Following a broad range of real-world exploits, general interest in applicable countermeasures rises. However, few approaches for countering these attacks have been......, and discuss the approach of Schema Hardening, a technique for strengthening XML Schema declarations. We conclude that XML Schema validation with a hardened XML Schema is capable of fending XML Signature Wrapping attacks, but bears some pitfalls and disadvantages as well. © 2011 IEEE....

  8. Hyporheic nutrient transformation - A panacea for river restoration that solves the "Nitrate Time Bomb" ?

    Science.gov (United States)

    Krause, S.; Heathwaite, L.; Binley, A.; Kaeser, D.

    2009-04-01

    The river - aquifer interface, also called the ‘hyporheic zone' or ‘interstitial' characterises the area of intensive mixing between groundwater and surface water within the streambed of a river. Its physical conditions, as hydraulic conductivity and residence time, control fluxes and exchange rates between groundwater and surface water. Because of its often steep and dynamic redox gradients, the hyporheic zone can represent an area of high chemical activity. Previous studies described how the transport and redox processes in the hyporheic zone can cause effective nutrient attenuation, e.g. by denitrification. Hence, river regulators and river basin management plans hope for the hyporheic zone to delimit the negative impact, polluted groundwater has for the stream ecological health. The desperation behind such expectations becomes apparent in light of increasing nitrate concentrations in many groundwater aquifers and their long residence times - the so-called "Nitrate Time Bomb". In this study we investigate spatial and temporal patterns of physical streambed characteristics and redox chemical conditions and its controls on nitrogen transport and transformation in the streambed of several English rivers. For the streambed sediments of a 50 - 250 m stream reaches, pore water nitrate and ammonia concentrations were monitored together with common anions, redox conditions, dissolved oxygen levels and rates of groundwater up-welling and surface water mixing in a dense system of nested piezometer for a two year period. The results of this study indicate that hyporheic nutrient transformation can well exceed the usually assumed streambed depths of a few cm and may occur in depths of up to 1 m. Our investigations furthermore detected, that within the research area the hyporheic passage has a spatially very variable impact on the exchange fluxes and nitrogen concentrations and transformation rates in the streambed. Nitrate attenuation due to denitrification was found in

  9. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  10. Superradiance and black hole bomb in five-dimensional minimal ungauged supergravity

    CERN Document Server

    Aliev, Alikram N

    2014-01-01

    We examine the black hole bomb model which consists of a rotating black hole of five-dimenensional minimal ungauged supergravity and a reflecting mirror around it. For low-frequency scalar perturbations, we find solutions to the Klein-Gordon equation in the near-horizon and far regions of the black hole spacetime. To avoid solutions with logarithmic terms, we assume that the orbital quantum number $ l $ takes on nearly, but not exactly, integer values and perform the matching of these solutions in an intermediate region. This allows us to calculate analytically the frequency spectrum of quasinormal modes, taking the limits as $ l $ approaches even or odd integers separately. We find that all $ l $ modes of scalar perturbations undergo negative damping in the regime of superradiance, resulting in exponential growth of their amplitudes. Thus, the model under consideration would exhibit the superradiant instability, eventually behaving as a black hole bomb in five dimensions.

  11. Superradiance and black hole bomb in five-dimensional minimal ungauged supergravity

    Science.gov (United States)

    Aliev, Alikram N.

    2014-11-01

    We examine the black hole bomb model which consists of a rotating black hole of five-dimenensional minimal ungauged supergravity and a reflecting mirror around it. For low-frequency scalar perturbations, we find solutions to the Klein-Gordon equation in the near-horizon and far regions of the black hole spacetime. To avoid solutions with logarithmic terms, we assume that the orbital quantum number l takes on nearly, but not exactly, integer values and perform the matching of these solutions in an intermediate region. This allows us to calculate analytically the frequency spectrum of quasinormal modes, taking the limits as l approaches even or odd integers separately. We find that all l modes of scalar perturbations undergo negative damping in the regime of superradiance, resulting in exponential growth of their amplitudes. Thus, the model under consideration would exhibit the superradiant instability, eventually behaving as a black hole bomb in five dimensions.

  12. The cohort of the atomic bomb survivors major basis of radiation safety regulations

    CERN Document Server

    Rühm, W; Nekolla, E A

    2006-01-01

    Since 1950 about 87 000 A-bomb survivors from Hiroshima and Nagasaki have been monitored within the framework of the Life Span Study, to quantify radiation-induced late effects. In terms of incidence and mortality, a statistically significant excess was found for leukemia and solid tumors. In another major international effort, neutron and gamma radiation doses were estimated, for those survivors (Dosimetry System DS02). Both studies combined allow the deduction of risk coefficients that serve as a basis for international safety regulations. As an example, current results on all solid tumors combined suggest an excess relative risk of 0.47 per Sievert for an attained age of 70 years, for those who were exposed at an age of 30 years. After exposure to an effective dose of one Sievert the solid tumor mortality would thus be about 50% larger than that expected for a similar cohort not exposed to any ionizing radiation from the bombs.

  13. Impact of the Boston Marathon Bombing and Its Aftermath on Refugees and Survivors of Torture.

    Science.gov (United States)

    Piwowarczyk, Linda; Rous, Dana; Mancuso, Anna; Flinton, Kathleen; Hastings, Erica; Forbush, Leigh; Shepherd, Amy

    2016-08-01

    On April 15, 2013, Boston residents and guests gathered for the Boston Marathon. Two explosives at the finish line killed three people and injured hundreds of others. As part of our clinical encounters, patients of the Boston Center for Refugee Health & Human Rights were asked about the marathon bombing. We were concerned about the high level of armed security as many of our patients had been detained in their countries of origin. Eighty patients seen between April 16 and July 7, 2013 were asked about their experience of the Boston Marathon bombing and its aftermath. A retrospective chart review was undertaken and data analyzed using Atlas.ti & SPSS. Approximately 86 % of those interviewed were reminded of their past trauma. The following themes emerged: triggering and trauma related symptoms, content specific cognitive schemas, recognition of the universality of violence, fears of discrimination, issues surrounding safety, and specific concerns of Muslims.

  14. Howard Zinn, La bombe. De l'inutilité des bombardements aériens

    OpenAIRE

    Erbs, Laurent

    2011-01-01

    Avec La bombe, Howard Zinn signe son dernier ouvrage. Historien, intellectuel réputé, engagé au côté des mouvements contestataires américains, Howard Zinn a marqué les consciences grâce à ses écrits critiques sur le pouvoir et ses structures. La bombe reprend un texte original, « Hiroshima : briser le silence », publié en 1995 à l’occasion du 50e anniversaire du bombardement atomique du Japon. L’auteur souhaite y subvertir les discours prônant la nécessité des attaques atomiques contre le Jap...

  15. Work of the Tamm-Sakharov group on the first hydrogen bomb

    Science.gov (United States)

    Ritus, V. I.

    2014-09-01

    This review is an extended version of a report delivered at a session of the Department of Physical Sciences, the Department of Energetics, Mechanical Engineering, Mechanics, and Control Processes, and the Coordination Council on Technical Sciences of the RAS devoted to the 60th anniversary of the first hydrogen bomb test. The significant physical ideas suggested by A D Sakharov and V L Ginzburg underlying our first hydrogen bomb, RDS-6s, and numerous concrete problems and difficulties that had to be solved and overcome in designing thermonuclear weapons are presented. The understanding of the country's leaders and the Atomic Project managers of the exceptional role of fundamental science in the appearance and implementation of our scientists' concrete ideas and suggestions is emphasized.

  16. Nonlinear Dynamical Behavior in Neuron Model Based on Small World Network with Attack and Repair Strategy

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xue; YANG Qiu-Ying; ZHENG Tai-Yu; ZHANG Ying-Yue; ZHENG Li; ZHANG Gui-Qing; CHEN Tian-Lun

    2008-01-01

    In this paper, we investigate the effect due to the change of topology structure of network on the nonlinear dynamical behavior, by virtue of the OFC neuron evolution model with attack and repair strategy based on the small world. In particular, roles of various parameters relating to the dynamical behavior are carefully studied and analyzed. In addition, the avalanche and EEG-like wave activities with attack and repair strategy are also explored in detail in this work.

  17. Radiation dose, reproductive history, and breast cancer risk among Japanese A-bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Land, C.E. [National Cancer Institute, Bethesda, MD (United States)

    1992-06-01

    Excess risk of female breast cancer is among the most comprehensively documented late effects of exposure to substantial doses of ionizing radiation, based on studies of medically irradiated populations and the survivors of the A-bombings of Hiroshima and Nagasaki. This study looks at the interaction of dose with epidemiological factors like age at first full-term pregnancy and family history of breast cancer, most closely associated with risk in epidemiological studies of non-irradiatied populations. 1 fig., 2 tabs.

  18. Prevalence of monoclonal gammopathy of undetermined significance in Asia: a viewpoint from nagasaki atomic bomb survivors.

    Science.gov (United States)

    Iwanaga, Masako; Tomonaga, Masao

    2014-02-01

    Exposure to ionizing radiation is a known environmental risk factor for a variety of cancers including hematological malignancies, such as leukemia, myelodysplastic syndromes, and multiple myeloma. Therefore, for Hiroshima and Nagasaki atomic bomb survivors (surviving victims who were exposed to ionizing radiation emitted from the nuclear weapons), several cancer-screening tests have been provided annually, with government support, to detect the early stage of malignancies. An M-protein screening test has been used to detect multiple myeloma at an early stage among atomic bomb survivors. In the screening process, a number of patients with monoclonal gammopathy of undetermined significance (MGUS), in addition to multiple myeloma, have been identified. In 2009 and 2011, we reported the age- and sex-specific prevalence of MGUS between 1988 and 2004 and the possible role of radiation exposure in the development of MGUS using the screening data of more than 1000 patients with MGUS among approximately 52,000 Nagasaki atomic bomb survivors. The findings included: (1) a significant lower overall prevalence (2.1%) than that observed in Caucasian or African-origin populations; (2) a significantly higher prevalence in men than in women; (3) an age-related increase in the prevalence; (4) a significantly higher prevalence in people exposed to higher radiation doses only among those exposed at age 20 years or younger; and (5) a lower frequency of immunoglobulin M MGUS in Japanese patients than in patients in Western countries. The large study of MGUS among Nagasaki atomic bomb survivors has provided important findings for the etiology of MGUS, including a possible role of radiation exposure on the cause of MGUS and an ethnicity-related difference in the characteristics of MGUS.

  19. Franco Rasetti physicien et naturaliste : (il a dit non à la bombe)

    CERN Document Server

    Ouellet, Danielle

    2000-01-01

    Brève biographie d'un physicien italien injustement méconnu, professeur à l'Université Laval de 1939 à 1947. Ayant contribué, dans les années 1930, à des expériences qui ont par la suite mené à la fabrication de la bombe atomique, il s'est retiré du dossier dès qu'il en a compris le danger.

  20. ["Living with the bomb" - Carl Friedrich von Weizsäcker's path from physics to politics].

    Science.gov (United States)

    Walker, Mark

    2014-01-01

    Carl Friedrich von Weizsäcker spanned a spectrum from physics to politics, with philosophy in-between. This chapter surveys the most controversial part of his career, including his work on nuclear weapons and participation in cultural propaganda during the Second World War, his subsequent active political engagement during the postwar Federal German Republic, in particular the role of nuclear weapons, and his participation in myths surrounding Hitler's Bomb".

  1. Rhynchophorus ferrugineus attack affects a group of compounds rather than rearranging Phoenix canariensis metabolic pathways.

    Science.gov (United States)

    Giovino, Antonio; Martinelli, Federico; Saia, Sergio

    2016-04-01

    The red palm weevil (RPW; Rhynchophorus ferrugineus) is spreading worldwide and severely harming many palm species. However, most studies on RPW focused on insect biology, and little information is available about the plant response to the attack. In the present experiment, we used metabolomics to study the alteration of the leaf metabolome of Phoenix canariensis at initial (1st stage) or advanced (2nd stage) attack by RPW compared with healthy (unattacked) plants. The leaf metabolome significantly varied among treatments. At the 1st stage of attack, plants showed a reprogramming of carbohydrate and organic acid metabolism; in contrast, peptides and lipid metabolic pathways underwent more changes during the 2nd than 1st stage of attack. Enrichment metabolomics analysis indicated that RPW attack mostly affected a particular group of compounds rather than rearranging plant metabolic pathways. Some compounds selectively affected during the 1st rather than 2nd stage (e.g. phenylalanine; tryptophan; cellobiose; xylose; quinate; xylonite; idonate; and iso-threonate; cellobiotol and arbutine) are upstream events in the phenylpropanoid, terpenoid and alkaloid biosynthesis. These compounds could be designated as potential markers of initial RPW attack. However, further investigation is needed to determine efficient early screening methods of RPW attack based on the concentrations of these molecules.

  2. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.

  3. Rhynchophorus ferrugineus attack affects a group of compounds rather than rearranging Phoenix canariensis metabolic pathways

    Institute of Scientific and Technical Information of China (English)

    Antonio Giovino; Federico Martinelli; Sergio Saia

    2016-01-01

    The red palm weevil (RPW; Rhynchophorus ferrugi-neus) is spreading worldwide and severely harming many palm species. However, most studies on RPW focused on insect biology, and little information is available about the plant response to the attack. In the present experiment, we used metabolomics to study the alteration of the leaf metabolome of Phoenix canariensis at initial (1st stage) or advanced (2nd stage) attack by RPW compared with healthy (unattacked) plants. The leaf metabolome significantly varied among treatments. At the 1st stage of attack, plants showed a reprogramming of carbohydrate and organic acid metabolism;in contrast, peptides and lipid metabolic pathways underwent more changes during the 2nd than 1st stage of attack. Enrichment metabolomics analysis indicated that RPW attack mostly affected a particular group of compounds rather than rearranging plant metabolic pathways. Some compounds selectively affected during the 1st rather than 2nd stage (e.g. phenylalanine;tryptophan;cel obiose;xylose;quinate;xylonite;idonate;and iso-threonate;cel obiotol and arbutine) are upstream events in the phenylpropanoid, terpenoid and alkaloid biosynthesis. These compounds could be designated as potential markers of initial RPW attack. However, further investigation is needed to determine efficient early screening methods of RPW attack based on the concentrations of these molecules.

  4. Optimal space-time attacks on system state estimation under a sparsity constraint

    Science.gov (United States)

    Lu, Jingyang; Niu, Ruixin; Han, Puxiao

    2016-05-01

    System state estimation in the presence of an adversary that injects false information into sensor readings has attracted much attention in wide application areas, such as target tracking with compromised sensors, secure monitoring of dynamic electric power systems, secure driverless cars, and radar tracking and detection in the presence of jammers. From a malicious adversary's perspective, the optimal strategy for attacking a multi-sensor dynamic system over sensors and over time is investigated. It is assumed that the system defender can perfectly detect the attacks and identify and remove sensor data once they are corrupted by false information injected by the adversary. With this in mind, the adversary's goal is to maximize the covariance matrix of the system state estimate by the end of attack period under a sparse attack constraint such that the adversary can only attack the system a few times over time and over sensors. The sparsity assumption is due to the adversary's limited resources and his/her intention to reduce the chance of being detected by the system defender. This becomes an integer programming problem and its optimal solution, the exhaustive search, is intractable with a prohibitive complexity, especially for a system with a large number of sensors and over a large number of time steps. Several suboptimal solutions, such as those based on greedy search and dynamic programming are proposed to find the attack strategies. Examples and numerical results are provided in order to illustrate the effectiveness and the reduced computational complexities of the proposed attack strategies.

  5. Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System

    Directory of Open Access Journals (Sweden)

    Manghui Tu

    2012-12-01

    Full Text Available Forensic readiness can support future forensics investigation or auditing on external/internal attacks, internal sabotage and espionage, and business frauds. To establish forensics readiness, it is essential for an organization to identify what evidences are relevant and where they can be found, to determine whether they are logged in a forensic sound way and whether all the needed evidences are available to reconstruct the events successfully.  Our goal of this research is to ensure evidence availability. First, both external and internal attacks are molded as augmented attack trees/graphs based on the system vulnerabilities. Second, modeled attacks are conducted against a honeynet simulating an online business information system, and each honeypot's hard drive is forensic sound imaged for each individual attack. Third, an evidence tree/graph will be built after forensics examination on the disk images for each attack. The evidence trees/graphs are expected to be used for automatic crime scene reconstruction and automatic attack/fraud detection in the future.

  6. Modelling social-technical attacks with timed automata

    NARCIS (Netherlands)

    David, Nicolas; David, Alexandre; Hansen, René Rydhof; Larsen, Kim G.; Legay, Axel; Olesen, Mads Chr.; Probst, Christian W.

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In th

  7. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  8. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  9. Proceedings of 42nd Research Society for the Late Effects of the A-Bomb

    Energy Technology Data Exchange (ETDEWEB)

    Sasaki, Hideo [Hiroshima Atomic Bomb Casualty Council Health Management and Promotion Center (Japan); Nakane, Yoshibumi [Nagasaki Univ. Graduate School of Bio-medicine (Japan); Suzuki, Gen [Radiation Effect Research Foundation, Hiroshima (JP)] [and others

    2002-03-01

    This issue is the collection of study papers presented in the meeting in the title: the special review lecture concerning the epidemiological evidences of multiple myeloma examination in A-bomb survivors (12-year study), the symposium concerning the medical care of A-bomb survivors in 21st century (5 presentations of medical care for the aged survivors, psychiatric approach and psychological care, future clinical studies and survivors' children in RERF, epidemiological study on the late effect of A-bomb radiation, and international cooperation of medical care in Semipalatinsk), and 51 general presentations. The general presentations included 1 article concerning external dose estimation in Ust-Kamenogorsk city, 7, the health care and management of the survivors, 9, cancer and its risk assessment (lung, uterine, stomach, liver and bone marrow), 1, arteriosclerosis, 10, health physics studies in relation to Semipalatinsk and/or Chernobyl (mainly on thyroid cancer), 2, experimental animal studies of thyroid cancer and malformation, 9, genomic studies like gene rearrangement, REV1 SNPs, function analysis and regeneration medicine, and 12, histological and cytological studies concerning DNA/RNA extraction, gene expression, signal transduction and immune system. (K.H.)

  10. Myth-building: The [open quotes]Islamic[close quotes] bomb

    Energy Technology Data Exchange (ETDEWEB)

    Hoodbhoy, P. (Quadi-e-Azam Univ., Islamabad (Pakistan))

    1993-06-01

    The [open quotes]Islamic Bomb[close quotes] is roughly understood to be a nuclear weapon aquired for broad ideological reasons--a weapon that supposedly belongs to the Muslim [ital ummah] or community and, as such, is the ultimate expression of Islamic solidarity. Concern about the Islamic bomb is at the heart of the intense effort to prevent the spread of nuclear weapons to Muslim countries. The official justification is a general one: proliferation must be curbed globally. But unofficially, the Islamic bomb gets special attention. The reasons behind this special attention are described in this article. The reasons include fear of terrorism, of a [ital jihad] willing to indiscriminately use nuclear weapons in hope of a reward in the Hereafter, and of the transfer of nuclear arms from nuclear to non-nuclear Muslim countries in times of crisis. Possibilities for controlling the proliferation of nuclear weapons in Muslim countries are addressed. Reasons are cited as to why various Muslim countries wish to acquire nuclear weapons.

  11. From the Dawn of Nuclear Physics to the First Atomic Bombs

    Science.gov (United States)

    Woolbright, Stephen; Schumacher, Jacob; Michonova-Alexova, Ekaterina

    2014-03-01

    This work gives a fresh look at the major discoveries leading to nuclear fission within the historical perspective. The focus is on the main contributors to the discoveries in nuclear physics, leading to the idea of fission and its application to the creation of the atomic bombs used at the end of the World War II. The present work is a more complete review on the history of the nuclear physics discoveries and their application to the atomic bomb. In addition to the traditional approach to the topic, focusing mainly on the fundamental physics discoveries in Europe and on the Manhattan Project in the United States, the nuclear research in Japan is also emphasized. Along with that, a review of the existing credible scholar publications, providing evidence for possible atomic bomb research in Japan, is provided. Proper credit is given to the women physicists, whose contributions had not always been recognized. Considering the historical and political situation at the time of the scientific discoveries, thought-provoking questions about decision-making, morality, and responsibility are also addressed. The work refers to the contributions of over 20 Nobel Prize winners. EM-A is grateful to Prof. Walter Grunden and to Prof. Emeritus Shadahiko Kano, Prof. Emeritus Monitori Hoshi for sharing their own notes, documents, and references, and to CCCU for sponsoring her participation in the 2013 Nuclear Weapons Seminar in Japan.

  12. Oxygen bomb combustion of biological samples for inductively coupled plasma optical emission spectrometry

    Science.gov (United States)

    Souza, Gilberto B.; Carrilho, Elma Neide V. M.; Oliveira, Camila V.; Nogueira, Ana Rita A.; Nóbrega, Joaquim A.

    2002-12-01

    A rapid sample preparation method is proposed for decomposition of milk powder, corn bran, bovine and fish tissues, containing certified contents of the analytes. The procedure involves sample combustion in a commercial stainless steel oxygen bomb operating at 25 bar. Most of the samples were decomposed within 5 min. Diluted nitric acid or water-soluble tertiary amines 10% v/v were used as absorption solutions. Calcium, Cu, K, Mg, Na, P, S and Zn were recovered with the bomb washings and determined by inductively coupled plasma optical emission spectrometry (ICP-OES). Ethanol mixed with paraffin was used as a combustion aid to allow complete combustion. A cooling step prior releasing of the bomb valve was employed to increase the efficiency of sample combustion. Iodine was also determined in milk samples spiked with potassium iodide to evaluate the volatilization and collection of iodine in amine CFA-C medium and the feasibility of its determination by ICP-OES with axial view configuration. Most of the element recoveries in the samples were between 91 and 105% and the certified and found contents exhibited a fair agreement at a 95% confidence level.

  13. Discussion: Reporting and calibration of post-bomb 14C data

    Energy Technology Data Exchange (ETDEWEB)

    Reimer, P J; Brown, T A; Reimer, R W

    2004-10-11

    The definitive paper by Stuiver and Polach (1977) established the conventions for reporting of {sup 14}C data for chronological and geophysical studies based on the radioactive decay of {sup 14}C in the sample since the year of sample death or formation. Several ways of reporting {sup 14}C activity levels relative to a standard were also established, but no specific instructions were given for reporting nuclear weapons testing (post-bomb) {sup 14}C levels in samples. Because the use of post-bomb {sup 14}C is becoming more prevalent in forensics, biology, and geosciences, a convention needs to be adopted. We advocate the use of fraction modern with a new symbol F{sup 14}C to prevent confusion with the previously used Fm, which may or may not have been fractionation corrected. We also discuss the calibration of post-bomb {sup 14}C samples and the available datasets and compilations, but do not give a recommendation for a particular dataset.

  14. How training and experience affect the benefits of autonomy in a dirty-bomb experiment

    Energy Technology Data Exchange (ETDEWEB)

    David J. Bruemmer; Curtis W. Nielsen; David I. Gertman

    2008-03-01

    A dirty-bomb experiment conducted at the INL is used to evaluate the effectiveness and suitability of three different modes of robot control. The experiment uses three distinct user groups to understand how participants’ background and training affect the way in which they use and benefit from autonomy. The results show that the target mode, which involves automated mapping and plume tracing together with a point and click tasking tool, provides the best performance for each group. This is true for objective performance such as source detection and localization accuracy as well as subjective measures such as perceived workload, frustration and preference. The best overall performance is achieved by the Explosive Ordinance Disposal group which has experience in both robot teleoperation and dirty bomb response. The user group that benefits least from autonomy is the Nuclear Engineers that have no experience with either robot operation or dirty bomb response. The group that benefits most from autonomy is the Weapons of Mass Destruction Civil Response Team that has extensive experience related to the task, but no robot training.

  15. The feasibility of bomb radiocarbon analysis to support an age-at-length relationship for red abalone, Haliotis rufescens Swainson in northern California

    Energy Technology Data Exchange (ETDEWEB)

    Leaf, R T; Andrews, A H; Cailliet, G M; Brown, T A

    2009-01-07

    Analysis of bomb generated radiocarbon ({sup 14}C) changes in a red abalone, Haliotis rufescens Swainson shell was used to investigate age-at-length relationships derived from data from a previous multi-year, multi-site tag-recapture study. Shell carbonate was extracted from four successive growth trajectory locations in a single shell with a length of 251 mm MSL. Extraction locations were based on VBGF predictions and chosen to span the initial rise of the {sup 14}C-bomb pulse that is known to have occurred in surface ocean waters during 1958 {+-} 1 y in the northeast Pacific. The close temporal correspondence of the red abalone sample series to regional {Delta}{sup 14}C records demonstrated the utility of the technique for validating age-at-length relationships for the red abalone. The findings provided support for a mean VBGF derived age of 32 y (range 30 to 33 y) for the specimen; however, the analysis of {sup 14}C data indicated that the specimen could be older.

  16. Blood flow and vascular reactivity during attacks of classic migraine--limitations of the Xe-133 intraarterial technique

    DEFF Research Database (Denmark)

    Skyhøj Olsen, T; Lassen, N A

    1989-01-01

    The present study reports cerebral blood flow (CBF) measurements in 11 patients during attacks of classic migraine (CM)--migraine with aura. In 6 and 7 patients, respectively, cerebral vascular reactivity to increased blood pressure and to hypocapnia was also investigated during the CM attacks. T...

  17. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  18. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes...... on a new and general formalism for attack-defence trees....

  19. Medical Effects of Atomic Bombs. The Report of the Joint Commission for the Investigation of the Effects of the Atomic Bomb in Japan; Volume 4. Section 8. Pathology

    Science.gov (United States)

    1951-04-19

    spindle-shaped o r polygonal ce l l s containing prominent eosinophilic granules are found through- I n the case of out t he organ. 5 +3ich9-A...t i v e l y , l i t t l e vacuolation and have f ine ly granu - l a r . cytoplasm. rise There i s abundance of f ine brown pigment i n the re...c e l l s with eosinophilic gran- .. Hassalt s corpuscles They a re anuclear a t t h e i r centers i n most instances, In other. specimens

  20. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  1. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  2. Flooding Attack on the Binding Cache in Mobile IPv6

    Science.gov (United States)

    Veigner, Christian; Rong, Chunming

    In the next generation Internet protocol (IPv6), mobility is supported by means of Mobile IPv6 (MIPv6). As a default part of the MIPv6 protocol, route optimization is used to route packets directly to a mobile node's currently used address at the mobile node's visited subnet. Return Routability is the protocol suggested by the IETF for managing this task. Route optimization is often carried out during handovers, where a mobile node changes network attachment from one subnet to another. To offer seamless handovers to the user it is important that route optimizations are carried out quickly. In this paper we will present an attack that was discovered during design of a new and more seamless protocol than the Return Routability. Our improved route optimization protocol for Mobile IPv6 suffers this attack; therefore we wanted to investigate if a similar attack was feasible on the Return Routability protocol. In this paper, we show that our new route optimization protocol offers no less security than the already standardized Return Routability protocol in this field.

  3. Alexithymia and posttraumatic stress disorder following asthma attack.

    Science.gov (United States)

    Chung, Man Cheung; Wall, Natalie

    2013-09-01

    This study examined the levels of posttraumatic stress disorder (PTSD) following asthma attack (post-asthma attack PTSD) and psychiatric co-morbidity among college students. It also investigated the association between these variables and alexithymia. One hundred and six college students participated in the study and completed an on-line survey comprising the Asthma Symptom Checklist, PTSD Checklist, General Health Questionnaire-28 and Toronto Alexithymia Scale. Ninety-one students without asthma and major illness formed the control group. 2 % met the diagnostic criteria for full-PTSD, while 42 and 56 % met the partial and no-PTSD criteria respectively. Compared with the control, the asthma group reported significantly more somatic problems, social dysfunction and depression and was five times more likely to have an elevated risk of developing a general psychiatric disorder. After adjusting age, marital status, asthma experience and symptoms, alexithymia did not predict PTSD, while difficulty identifying feelings predicted psychiatric co-morbidity. Mediational analyses showed that asthma symptoms partially mediated the link between difficulty identifying feelings and psychiatric co-morbidity. People can develop PTSD symptoms and other psychological difficulties following asthma attack. Alexithymia influenced general psychological difficulties independently of PTSD symptoms.

  4. Distributed Denial of Service Attacks: A Review

    Directory of Open Access Journals (Sweden)

    Sonali Swetapadma Sahu

    2014-01-01

    Full Text Available A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

  5. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  6. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  7. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  8. Resistance of the double random phase encryption against various attacks.

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-06

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  9. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  10. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  11. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  12. Childhood internalizing and externalizing problems predict the onset of clinical panic attacks over adolescence: the TRAILS study.

    Directory of Open Access Journals (Sweden)

    Christina M Mathyssek

    Full Text Available BACKGROUND: Panic attacks are a source of individual suffering and are an independent risk factor for later psychopathology. However, much less is known about risk factors for the development of panic attacks, particularly during adolescence when the incidence of panic attacks increases dramatically. We examined whether internalizing and externalizing problems in childhood predict the onset of panic attacks in adolescence. METHOD: This study is part of the TRacking Adolescents' Individual Lives Survey (TRAILS, a Dutch longitudinal population cohort study (N = 1,584. Internalizing and Externalizing Problems were collected using the Youth Self-Report (YSR and the parent-report Child Behavior Checklist (CBCL at baseline (age 10-12. At age 18-20, DSM-IV defined panic attacks since baseline were assessed with the Composite International Diagnostic Interview (CIDI. We investigated whether early adolescent Internalizing and Externalizing Problems predicted panic attacks between ages 10-20 years, using survival analysis in univariate and multivariate models. RESULTS: There were N = 314 (19.8% cases who experienced at least one DSM-IV defined panic attack during adolescence and N = 18 (1.2% who developed panic disorder during adolescence. In univariate analyses, CBCL Total Problems, Internalizing Problems and three of the eight syndrome scales predicted panic attack onset, while on the YSR all broad-band problem scales and each narrow-band syndrome scale predicted panic attack onset. In multivariate analyses, CBCL Social Problems (HR 1.19, p<.05, and YSR Thought Problems (HR 1.15, p<.05 and Social Problems (HR 1.26, p<.01 predicted panic attack onset. CONCLUSION: Risk indicators of panic attack include the wide range of internalizing and externalizing problems. Yet, when adjusted for co-occurring problem behaviors, Social Problems were the most consistent risk factor for panic attack onsets in adolescence.

  13. Heart attack risk perception biases among hypertension patients: the role of educational level and worry.

    Science.gov (United States)

    Peterson, Laurel M; Helweg-Larsen, Marie; Volpp, Kevin G; Kimmel, Stephen E

    2012-01-01

    Risk biases such as comparative optimism (thinking one is better off than similar others) and risk inaccuracy (misestimating one's risk compared to one's calculated risk) for health outcomes are common. Little research has investigated racial or socioeconomic differences in these risk biases. Results from a survey of individuals with poorly controlled hypertension (N=813) indicated that participants showed (1) comparative optimism for heart attack risk by underestimating their heart attack risk compared to similar others, and (2) risk inaccuracy by overestimating their heart attack risk compared to their calculated heart attack risk. More highly educated participants were more comparatively optimistic because they rated their personal risk as lower; education was not related to risk inaccuracy. Neither race nor the federal poverty level was related to risk biases. Worry partially mediated the relationship between education and personal risk. Results are discussed as they relate to the existing literature on risk perception.

  14. Denial of Service Attack: Analysis of Network Traffic Anormaly using Queuing Theory

    CERN Document Server

    Singh, Neetu; Chaudhuri, Pranay

    2010-01-01

    Denial-of-service (DOS) attacks increasingly gained reputation over the past few years. As the Internet becomes more ubiquitous, the threat of the denial-of-service attacks becomes more realistic and important for individuals, businesses, governmental organizations, and even countries. There is intensive need to detect an attack in progress as soon as possible. The efficiency of diagnosing the DOS attack using concepts of queuing theory and performance parameter of the system has been investigated in the present work, as the servers definitely have some mechanisms to store and process the requests. Utilizing this concept of queuing theory, the collection of data patterns were generated. With the performance parameter of the system, the analysis of the data pattern had been made to diagnose the network anomaly. Performance analysis and results show the accuracy of the proposed scheme in detecting anomalies.

  15. Dyspnea during panic attacks. An Internet survey of incidences of changes in breathing.

    Science.gov (United States)

    Anderson, B; Ley, R

    2001-09-01

    This article presents the results of a survey that investigated breathing-related symptoms of panic attacks together with the frequency of other symptoms reported by active panickers. All the participants of this study experienced naturally occurring panic attacks and sought treatment guidance by visiting a Web site devoted to the treatment of panic. The results of a symptom questionnaire showed that 195 respondents (95.1%) reported breathing changes during panic attacks, and remarkable dyspnea was reported by more than two thirds (68%) of respondents. These findings are consistent with earlier studies but are contrary to conclusions that only a small number of panickers report shortness of breath as a symptom. This study concludes that outside of the laboratory, a large majority of people who suffer from panic attacks experience symptoms of dyspnea.

  16. Increased intrinsic brain connectivity between pons and somatosensory cortex during attacks of migraine with aura.

    Science.gov (United States)

    Hougaard, Anders; Amin, Faisal Mohammad; Larsson, Henrik B W; Rostrup, Egill; Ashina, Messoud

    2017-02-27

    The neurological disturbances of migraine aura are caused by transient cortical dysfunction due to waves of spreading depolarization that disrupt neuronal signaling. The effects of these cortical events on intrinsic brain connectivity during attacks of migraine aura have not previously been investigated. Studies of spontaneous migraine attacks are notoriously challenging due to their unpredictable nature and patient discomfort. We investigated 16 migraine patients with visual aura during attacks and in the attack-free state using resting state fMRI. We applied a hypothesis-driven seed-based approach focusing on cortical visual areas and areas involved in migraine pain, and a data-driven independent component analysis approach to detect changes in intrinsic brain signaling during attacks. In addition, we performed the analyses after mirroring the MRI data according to the side of perceived aura symptoms. We found a marked increase in connectivity during attacks between the left pons and the left primary somatosensory cortex including the head and face somatotopic areas (peak voxel: P = 0.0096, (x, y, z) = (-54, -32, 32), corresponding well with the majority of patients reporting right-sided pain. For aura-side normalized data, we found increased connectivity during attacks between visual area V5 and the lower middle frontal gyrus in the symptomatic hemisphere (peak voxel: P = 0.0194, (x, y, z) = (40, 40, 12). The present study provides evidence of altered intrinsic brain connectivity during attacks of migraine with aura, which may reflect consequences of cortical spreading depression, suggesting a link between aura and headache mechanisms. Hum Brain Mapp, 2017. © 2017 Wiley Periodicals, Inc.

  17. A Ticking Time Bomb: Counterterrorism Lessons From the U.S. Government’s Failure to Prevent the Fort Hood Attack

    Science.gov (United States)

    2011-02-03

    ion. They perfonn critica ll y important homeland security funct ions and have produced numerous successes in disrupting and apprehending potential...Radicalizafion in the Wesl: The Homegrown Threat (2007). 17 experience a crisis or have a gri evance - whether social, economic, political, or...he was engaged in overt terrorist activity, (3) analyze Hasan’s communications more critica ll y as to whether they were truly research , and (4

  18. "Dirty Bomb" Attack: Assessing New York City’s Level of Preparedness from a First Responder’s Perspective

    Science.gov (United States)

    2006-03-01

    Preparedness.......80 Figure 3. NYC’s RDD Preparedness SWOT Analysis ...................................................82 Figure 4. The Four Hurdles...moderation, Manhattan real estate prices remain among the highest in the Nation.66 The devastating effects on the real estate market in general...result, employees of these firms would have no choice but to leave the metropolitan area. Inevitably, the lofty residential and commercial real estate

  19. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  20. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  1. Plant defences against herbivore and insect attack

    Science.gov (United States)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  2. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  3. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  4. Persistent cognitive impairment after transient ischemic attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.; Duijnhoven, D.A. van; Leeuw, F.E. de; Kessels, R.P.; Dijk, E.J. van

    2014-01-01

    BACKGROUND AND PURPOSE: By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whe

  5. Persistent Cognitive Impairment After Transient Ischemic Attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.M.M.; Duijnhoven, D.A. van; de Leeuw, F.E.; Kessels, R.P.C.; Dijk, E.J. van

    2014-01-01

    Background and Purpose—By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whet

  6. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  7. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  8. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  9. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  10. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  11. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  12. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  13. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  14. Cultural Memory of Sorrow in Advertising after the Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Esther Martínez Pastor

    2015-09-01

    Full Text Available The general objective of this research study is to do a comparative research to investigate the perception of sorrow in the advertising in the press after the terrorist attacks: 11/09/2001 (U.S. and 11/04/2004 (Spain. The general hypothesis considers that there are similar perceptions of the sorrow towards the ads although there are cultural differences. On a computer program the subject was shown these images about announcement advertisement published in the press after the 09/11 and 11/04 in a random order and was asked different questions that explored their perception and attitudes with regard to these advertisements

  15. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  16. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  17. WAPN: a distributed wormhole attack detection approach for wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    Fan-rui KONG; Chun-wen LI; Qing-qing DING; Guang-zhao CUI; Bing-yi CUI

    2009-01-01

    As the applications of wireless sensor networks (WSNs) diversify, providing secure communication is emerging as a critical requirement. In this paper, we investigate the detection of wormhole attack, a serious security issue for WSNs. Wormhole attack is difficult to detect and prevent, as it can work without compromising sensor nodes or breaching the encryption key. We present a wormhole attack detection approach based on the probability distribution of the neighboring-node-number, WAPN, which helps the sensor nodes to judge distributively whether a wormhole attack is taking place and whether they are in the in-fluencing area of the attack. WAPN can be easily implemented in resource-constrained WSNs without any additional requirements, such as node localization, tight synchronization, or directional antennas. WAPN uses the neighboring-node-number as the judging criterion, since a wormhole usually results in a significant increase of the neighboring-node-number due to the extra attacking link. Firstly, we model the distribution of the neighboring-node-number in the form of a Bernoulli distribution. Then the model is simplified to meet the sensor nodes' constraints in computing and memory capacity. Finally, we propose a simple method to obtain the threshold number, which is used to detect the existence of a wormhole. Simulation results show that WAPN is effective under the conditions of different network topologies and wormhole parameters.

  18. Mortality and management of 96 shark attacks and development of a shark bite severity scoring system.

    Science.gov (United States)

    Lentz, Ashley K; Burgess, George H; Perrin, Karen; Brown, Jennifer A; Mozingo, David W; Lottenberg, Lawrence

    2010-01-01

    Humans share a fascination and fear of sharks. We predict that most shark attacks are nonfatal but require skilled, timely medical intervention. The development of a shark bite severity scoring scale will assist communication and understanding of such an injury. We retrospectively reviewed records of the prospectively maintained International Shark Attack File (ISAF) at the University of Florida. The ISAF contains 4409 investigations, including 2979 documented attacks, 96 of which have complete medical records. We developed a Shark-Induced Trauma (SIT) Scale and calculated the level of injury for each attack. Medical records were reviewed for the 96 documented shark attack victims since 1921. Calculated levels of injury in the SIT Scale reveal 40 Level 1 injuries (41.7%), 16 Level 2 injuries (16.7%), 18 Level 3 injuries (18.8%), 14 Level 4 injuries (14.6%), and eight Level 5 injuries (8.3%). The overall mortality of shark attacks was 8.3 per cent. However, SIT Scale Level 1 injuries comprised the greatest percentage of cases at 41.7 per cent. Injury to major vascular structures increases mortality and necessitates immediate medical attention and definitive care by a surgeon. Shark bites deserve recognition with prompt resuscitation, washout, débridement, and follow up for prevention of infection and closure of more complex wounds.

  19. Efficiency of attack strategies on complex model and real-world networks

    CERN Document Server

    Bellingeri, Michele; Vincenzi, Simone

    2013-01-01

    We investigated the efficiency of attack strategies to network nodes when targeting several complex model and real-world networks. We tested 5 attack strategies, 3 of which were introduced in this work for the first time, to attack 3 model (Erdos and Renyi, Barabasi and Albert preferential attachment network, and scale-free network configuration models) and 3 real networks (Gnutella peer-to-peer network, email network of the University of Rovira i Virgili, and immunoglobulin interaction network). Nodes were removed sequentially according to the importance criterion defined by the attack strategy. We used the size of the largest connected component (LCC) as a measure of network damage. We found that the efficiency of attack strategies (fraction of nodes to be deleted for a given reduction of LCC size) depends on the topology of the network, although attacks based on the number of connections of a node and betweenness centrality were often the most efficient strategies. Sequential deletion of nodes in decreasin...

  20. DETECTING MULTIPLE INTRUSION ATTACKS USING PERMANENT GIRTH CLUSTERING MODEL IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    G. Jayamurugan

    2014-01-01

    Full Text Available Security is the central challenge and one of the serious concerns for designing reliable sensor networks. Of the different types of security threats in wireless sensor network, particularly dangerous attack is the replica node attack, in which the opponent takes the secret keying materials from a compromised node. It then produces large number of attacker-controlled replicas that divide up the cooperation node’s keying materials and ID. In this study we are specifically interested in investigating the extremely difficult problem concerning multiple attacks being routed in parallel with a given utility field and see if significant hypothetical solutions could be drawn. A clustering model for discovering multiple intrusions in WSN is identified. Permanent-girth Clustering (PC model used to detect abnormal traffic patterns and then uses PC model to built the normal traffic behavior. In this study we develop mechanisms so that the PC model is capable to distinguish attacks. Furthermore, the detection scheme is based on position of traffic features that potentially are practical to an extensive variety of routing attacks. In order to approximate intrusion detection scheme, extensive sensor network simulator producing routing attacks in wireless sensor networks is designed. PC model for intrusion detection is capable to attain high detection accuracy with a low false positive rate for a multiplicity of replicated routing attacks. NS2 simulator is used to perform the experimental work of PC model on wireless sensor network. The experimental evaluation of PC model is measured in terms of average delay measurement, energy consumption and low false positive rate.

  1. Ensuring the safety of surgical teams when managing casualties of a radiological dirty bomb.

    Science.gov (United States)

    Williams, Geraint; O'Malley, Michael; Nocera, Antony

    2010-09-01

    The capacity for surgical teams to ensure their own safety when dealing with the consequences caused by the detonation of a radiological dirty bomb is primarily determined by prior knowledge, familiarity and training for this type of event. This review article defines the associated radiological terminology with an emphasis on the personal safety of surgical team members in respect to the principles of radiological protection. The article also describes a technique for use of hand held radiation monitors and will discuss the identification and management of radiologically contaminated patients who may pose a significant danger to the surgical team.

  2. The quantum exodus jewish fugitives, the atomic bomb, and the holocaust

    CERN Document Server

    Fraser, Gordon Murray

    2012-01-01

    It was no accident that the Holocaust and the Atomic Bomb happened at the same time. When the Nazis came into power in 1933, their initial objective was not to get rid of Jews. Rather, their aim was to refine German culture: Jewish professors and teachers at fine universities were sacked. Atomic science had attracted a lot of Jewish talent, and as Albert Einstein and other quantum exiles scattered, they realized that they held the key to a weapon of unimaginable power. Convincedthat their gentile counterparts in Germany had come to the same conclusion, and having witnessed what the Nazis were

  3. A Tenor Analysis of Barack Obama's Speech on Boston Marathon Bombing Event

    Institute of Scientific and Technical Information of China (English)

    黄骥

    2013-01-01

    Systemic-Functional Grammar is a sociologically oriented functional linguistic approach developed by M. A. K. Halli-day. One of the focuses of SFG is register, which is composed of field, tenor and mode. Halliday particularly developed these three main parameters, which are useful for characterizing the nature of the social transaction of the participants. In this essay, the method of tenor is used for analyzing Barack Obama's speech on Boston Marathon bombing event to explore how Obama trans-fers his ideas to audience in order to achieve his goals.

  4. 360° FILM BRINGS BOMBED CHURCH TO LIFE

    OpenAIRE

    K. Kwiatek

    2012-01-01

    This paper explores how a computer-generated reconstruction of a church can be adapted to create a panoramic film that is presented in a panoramic viewer and also on a wrap-around projection system. It focuses on the fundamental principles of creating 360º films, not only in 3D modelling software, but also presents how to record 360º video using panoramic cameras inside the heritage site. These issues are explored in a case study of Charles Church in Plymouth, UK that was bombed in 1941 and h...

  5. "Bomb explosion on the Nis express" - lessons from a major incident, Kosovo 16 Feb 2001.

    Science.gov (United States)

    Vassallo, D J; Graham, P J K; Gupta, G; Alempijevic, Dj

    2005-03-01

    On Friday 16 February 2001, terrorists detonated a bomb under a civilian coach travelling from Nis in Serbia to Gracanica in Kosovo. 10 people were killed at the scene. 13 casualties were treated in the British KFOR hospital (Reynolds Hospital) in Pristina. Another 8 casualties were evacuated to the American KFOR hospital at Camp Bondsteel. The incident provided a unique opportunity for co-operation between British, American, Russian, German and French KFOR hospitals, as well as with Serbian clinicians and forensic pathologists. This article analyses the medical management of this major incident, identifies the lessons to be learned from it, and also provides enough detail for teaching scenarios.

  6. Investigation of status quo of self-perceived burden of young and middle-aged patients with first-attack of ischemic stroke and analysis of its influencing factors%中青年首发缺血性脑卒中患者自我感受负担现状调查与影响因素分析

    Institute of Scientific and Technical Information of China (English)

    甘莉; 杨蓉; 耿丹

    2014-01-01

    目的 了解中青年缺血性脑卒中患者的自我感受负担(self-perceived burden,SPB)情况,分析SPB的影响因素以及与生存质量的相关性.方法 采用自制患者一般资料问卷、SPB自评量表、生存质量精简量表(QOL-BREF),对中青年缺血性脑卒中住院患者进行调查分析.结果 共纳入100例患者,其中男66例,女34例,年龄19.4~59.0岁,平均年龄(50.80±7.98)岁;总体SPB得分为(24.21±7.39)分,处于中等水平.其中,无明显SPB者31例占31%,轻中度SPB者65例占65%,重度SPB者4例占4%; SPB与生存质量存在负相关性;经多因素分析显示,性别、对疾病的了解情况、照顾者健康状况是患者SPB的影响因素.结论 自我感受负担在中青年缺血性脑卒中住院患者中普遍存在,临床护理人员应及时评估患者自我感受负担情况,提供有针对性的护理措施与健康教育,从而减轻患者自我感受负担,提高其身心健康水平.%Objective To know the self-perceived burden (SPB) of young and middle-aged patients with first-attack of ischemic stroke and to analyze the influential factors of SPB as well as its relevance to the quality of life.Methods The patients' general information questionnaire,SPB Self-evaluation Scale,QOL-BREF were adopted to investigate young and middle-aged patients with first-attack of ischemic stroke.Results 100 patients were included,66 were male,34 were female.The Minimum age was 19.4 years old.The maximum age was 59 years old.The mean age was (50.80 ± 7.98) years old.The average SPB score was (24.21 ± 7.39) points,which was in the medium level.31 cases (31%) didn't have obvious SPB; 65 cases (65%) suffered mild-to-moderate SPB; 4 cases (4%) claimed they had severe SPB.There was negative correlation between the SPB and their quality of life.The multi-factor analysis showed that gender,the patients' understanding of disease,and caregivers' health situation were the influential factors of SPB

  7. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...

  8. Complexities in the Use of Bomb-Curve Radiocarbon to Determine Time Since Death of Human Skeletal Remains

    Energy Technology Data Exchange (ETDEWEB)

    Ubelaker, D H; Buchholz, B A

    2005-04-26

    Atmospheric testing of nuclear weapons during the 1950s and early 1960s doubled the level of radiocarbon ({sup 14}C) in the atmosphere. From the peak in 1963, the level of {sup 14}CO{sub 2} has decreased exponentially with a mean life of about 16 years, not due to radioactive decay, but due to mixing with large marine and terrestrial carbon reservoirs. Since radiocarbon is incorporated into all living things, the bomb-pulse is an isotopic chronometer of the past half century. The absence of bomb radiocarbon in skeletonized human remains generally indicates a date of death before 1950. Comparison of the radiocarbon values with the post 1950 bomb-curve may also help elucidate when in the post 1950 era, the individual was still alive. Such interpretation however, must consider the age at death of the individual and the type of tissue sampled.

  9. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed.......Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...

  10. Flooding attack and defence in Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Hou Yafei; Zhong Yiping; Zhang Shiyong; Dai Zhoulin

    2006-01-01

    Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

  11. Comparative Analysis of Routing Attacks in Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Bipul Syam Purkayastha

    2012-03-01

    Full Text Available In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.

  12. An Attack Modeling Based on Colored Petri Net

    Institute of Scientific and Technical Information of China (English)

    ZHOU Shijie; QIN Zhiguang; ZHANG Feng; LIU Jinde

    2004-01-01

    A color petri net (CPN) based attack modeling approach is addressed.Compared with graph-based modeling,CPN based attack model is fiexible enough to model Intemet intrusions,because of their static and dynamic features.The processes and rules of building CPN based attack model from attack tree are also presented.In order to evaluate the risk of intrusion,some cost elements are added to CPN based attack modeling.This extended model is useful in intrusion detection and risk evaluation.Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions,such as intrusion response and intrusion defense.A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn't.

  13. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  14. New attacks on Wi-Fi Protected Setup

    Directory of Open Access Journals (Sweden)

    Hamed Mohtadi

    2015-09-01

    Full Text Available Wi-Fi Protected Setup (WPS is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weaknesses in the implementation of WPS and provides an improved evil twin attack. This attack shows that even by completely disabling the WPS on the routers, all vulnerabilities are not covered.

  15. Understanding how components of organisations contribute to attacks

    NARCIS (Netherlands)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is difficul

  16. Aspirin to Prevent a First Heart Attack or Stroke

    Science.gov (United States)

    ... Aspirin to Prevent a First Heart Attack or Stroke Also known as aspirin primary prevention. Aspirin is ... taking aspirin to prevent another heart attack or stroke? The information discussed in Who may benefit? only ...

  17. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......, one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  18. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  19. Making MANET secured against malicious attack

    Science.gov (United States)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  20. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...