WorldWideScience

Sample records for bombing attacks outcomes

  1. Suicide bomb attack causing penetrating craniocerebral injury

    Institute of Scientific and Technical Information of China (English)

    Manzar Hussain; Muhammad Ehsan Bari

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma,although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails.In our case,a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack.The skull X-ray showed a single intracranial nail.Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue.At 6 months' follow-up his right-sided power improved to against gravity.

  2. Ancestry analysis in the 11-M Madrid bomb attack investigation.

    Directory of Open Access Journals (Sweden)

    Christopher Phillips

    Full Text Available The 11-M Madrid commuter train bombings of 2004 constituted the second biggest terrorist attack to occur in Europe after Lockerbie, while the subsequent investigation became the most complex and wide-ranging forensic case in Spain. Standard short tandem repeat (STR profiling of 600 exhibits left certain key incriminatory samples unmatched to any of the apprehended suspects. A judicial order to perform analyses of unmatched samples to differentiate European and North African ancestry became a critical part of the investigation and was instigated to help refine the search for further suspects. Although mitochondrial DNA (mtDNA and Y-chromosome markers routinely demonstrate informative geographic differentiation, the populations compared in this analysis were known to show a proportion of shared mtDNA and Y haplotypes as a result of recent gene-flow across the western Mediterranean, while any two loci can be unrepresentative of the ancestry of an individual as a whole. We based our principal analysis on a validated 34plex autosomal ancestry-informative-marker single nucleotide polymorphism (AIM-SNP assay to make an assignment of ancestry for DNA from seven unmatched case samples including a handprint from a bag containing undetonated explosives together with personal items recovered from various locations in Madrid associated with the suspects. To assess marker informativeness before genotyping, we predicted the probable classification success for the 34plex assay with standard error estimators for a naïve Bayesian classifier using Moroccan and Spanish training sets (each n = 48. Once misclassification error was found to be sufficiently low, genotyping yielded seven near-complete profiles (33 of 34 AIM-SNPs that in four cases gave probabilities providing a clear assignment of ancestry. One of the suspects predicted to be North African by AIM-SNP analysis of DNA from a toothbrush was identified late in the investigation as Algerian in origin. The

  3. Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time-Series and Intervention Analysis.

    Science.gov (United States)

    Li, Shuying; Zhuang, Jun; Shen, Shifei

    2017-07-01

    In recent years, various types of terrorist attacks occurred, causing worldwide catastrophes. According to the Global Terrorism Database (GTD), among all attack tactics, bombing attacks happened most frequently, followed by armed assaults. In this article, a model for analyzing and forecasting the conditional probability of bombing attacks (CPBAs) based on time-series methods is developed. In addition, intervention analysis is used to analyze the sudden increase in the time-series process. The results show that the CPBA increased dramatically at the end of 2011. During that time, the CPBA increased by 16.0% in a two-month period to reach the peak value, but still stays 9.0% greater than the predicted level after the temporary effect gradually decays. By contrast, no significant fluctuation can be found in the conditional probability process of armed assault. It can be inferred that some social unrest, such as America's troop withdrawal from Afghanistan and Iraq, could have led to the increase of the CPBA in Afghanistan, Iraq, and Pakistan. The integrated time-series and intervention model is used to forecast the monthly CPBA in 2014 and through 2064. The average relative error compared with the real data in 2014 is 3.5%. The model is also applied to the total number of attacks recorded by the GTD between 2004 and 2014. © 2016 Society for Risk Analysis.

  4. Indicators of the need for ICU admission following suicide bombing attacks

    Directory of Open Access Journals (Sweden)

    Bala Miklosh

    2012-03-01

    Full Text Available Abstract Introduction Critical hospital resources, especially the demand for ICU beds, are usually limited following mass casualty incidents such as suicide bombing attacks (SBA. Our primary objective was to identify easily diagnosed external signs of injury that will serve as indicators of the need for ICU admission. Our secondary objective was to analyze under- and over-triage following suicidal bombing attacks. Methods A database was collected prospectively from patients who were admitted to Hadassah University Hospital Level I Trauma Centre, Jerusalem, Israel from August 2001-August 2005 following a SBA. One hundred and sixty four victims of 17 suicide bombing attacks were divided into two groups according to ICU and non-ICU admission. Results There were 86 patients in the ICU group (52.4% and 78 patients in the non-ICU group (47.6%. Patients in the ICU group required significantly more operating room time compared with patients in the non-ICU group (59.3% vs. 25.6%, respectively, p = 0.0003. For the ICU group, median ICU stay was 4 days (IQR 2 to 8.25 days. On multivariable analysis only the presence of facial fractures (p = 0.014, peripheral vascular injury (p = 0.015, injury ≥ 4 body areas (p = 0.002 and skull fractures (p = 0.017 were found to be independent predictors of the need for ICU admission. Sixteen survivors (19.5% in the ICU group were admitted to the ICU for one day only (ICU-LOS = 1 and were defined as over-triaged. Median ISS for this group was significantly lower compared with patients who were admitted to the ICU for > 1 day (ICU-LOS > 1. This group of over-triaged patients could not be distinguished from the other ICU patients based on external signs of trauma. None of the patients in the non-ICU group were subsequently transferred to the ICU. Conclusions Our results show that following SBA, injury to ≥ 4 areas, and certain types of injuries such as facial and skull fractures, and peripheral vascular injury, can serve

  5. Outcome and status of microsatellite stability in Japanese atomic bomb survivors with early gastric carcinoma.

    Science.gov (United States)

    Yamamoto, Manabu; Taguchi, Kenichi; Yamanaka, Takeharu; Matsuyama, Ayumi; Yoshinaga, Keiji; Tsutsui, Shinichi; Ishida, Teruyoshi

    2013-03-01

    In the decade after the 1945 atomic bombing of Hiroshima, a high incidence of leukemia was observed among atomic bomb survivors. However, the incidence of other cancers gradually increased, while that of leukemia decreased after this period. We evaluated the clinical outcome of early gastric cancer and microsatellite stability over a long-term period in atomic bomb survivors. The results of surgical treatment for early gastric cancer were reviewed for 117 atomic bomb survivors and 394 control patients between 1995 and 2006. In addition, immunohistochemical staining for hMSH2 and hMLH1 expression was performed to evaluate the status of microsatellite stability in 57 atomic bomb survivors and 82 control patients. The long-term survival rate for early gastric cancer in atomic bomb survivors was significantly lower than that in control patients (p atomic bomb survivorship was related to defective hMSH2 and/or hMLH1 expression. The prognosis of early gastric cancer in atomic bomb survivors was poor and was related to age and sex, rather than to being an atomic bomb survivor. Furthermore, a higher rate of defective hMSH2 and/or hMLH1 expression was observed in the survivors.

  6. The long-term outcome of atomic bomb survivors with gastric carcinoma.

    Science.gov (United States)

    Yamamoto, Manabu; Matsuyama, Ayumi; Kameyama, Toshifumi; Okamoto, Masahiro; Okazaki, Jin; Utsunomiya, Tohru; Tsutsui, Shinichi; Ishida, Teruyoshi

    2009-12-01

    During the decade following the 1945 atomic bombing of Hiroshima, a high incidence of leukemia was observed among atomic bomb survivors. Subsequently, the incidence of other cancers gradually increased while that of leukemia decreased. We examined the long-term clinical outcome of gastric cancer and second primary cancer in atomic bomb survivors. Results of surgical treatment of gastric cancer were reviewed in 231 atomic bomb survivors and 759 control patients between 1995 and 2006. Long-term prognosis of gastric cancer in atomic bomb survivors was significantly poorer than that in control patients (P < 0.05). In a multivariate analysis, age, depth of tumor invasion, lymph node metastases, and curability were found to be significant and independent prognostic factors for gastric cancer. The incidence of second primary cancer after gastric cancer was significantly higher in survivors than in control patients (P < 0.01), because the number of elderly patients in the survivors was higher. Gastric cancer in survivors had a significantly poorer prognosis. Although the frequency of second primary cancer after gastric cancer in survivors was higher than that in control patients, it did not influence the prognosis.

  7. Proximity to terror and post-traumatic stress: a follow-up survey of governmental employees after the 2011 Oslo bombing attack.

    Science.gov (United States)

    Hansen, Marianne B; Nissen, Alexander; Heir, Trond

    2013-01-01

    To assess the prevalence of post-traumatic stress disorder (PTSD) symptoms among governmental employees after the 2011 Oslo bombing attack targeted towards the Norwegian Ministries, and to explore the importance of proximity to the bomb explosion as a predictor of PTSD. A cross-sectional study. Data were collected from a survey 10 months after the Oslo bombing on 22 July 2011. A total of 3520 employees were invited to the study. Net samples comprised 1927 employees in 14 of the 17 Norwegian Ministries. The employees reported where they were at the time of the explosion. PTSD was assessed with the Norwegian version of the PTSD checklist (PCL). A total of 207 of the 1881 (11%) ministerial employees who completed the survey were present at work when the bomb exploded. Of these, a quarter (24%, 95% CI 18.4 to 30.0) had symptom levels equivalent to PTSD, while the prevalence was approximately 4% among those not present at work. In the latter group the prevalence was similar irrespective of whether their location was in Oslo, other places in Norway or abroad. Leadership responsibility was associated with lower risk for PTSD. The risk of PTSD is mainly associated with being present at work at the time of a terror attack. For those not present at work, the risk of PTSD is low and independent of proximity to the terror scene. The findings may have implications for planning and priority of healthcare services after a work place terror attack.

  8. Treatment of HAE Attacks in the Icatibant Outcome Survey

    DEFF Research Database (Denmark)

    Hernández Fernandez de Rojas, Dolores; Ibañez, Ethel; Longhurst, Hilary;

    2015-01-01

    BACKGROUND: Icatibant, a selective bradykinin B2 receptor antagonist for the treatment of acute hereditary angio-oedema (HAE) attacks in adults, can be administered by health care professionals (HCPs) or self-administered. This analysis compared characteristics and outcomes of acute HAE attacks t...

  9. Radiation-related risks of non-cancer outcomes in the atomic bomb survivors.

    Science.gov (United States)

    Ozasa, K; Takahashi, I; Grant, E J

    2016-06-01

    Risks of non-cancer outcomes after exposure to atomic bomb (A-bomb) radiation have been evaluated among the Life Span Study (LSS) cohort and its subcohort, the Adult Health Study (AHS). Information regarding non-cancer outcomes in the LSS is obtained from death certificates. In the AHS, members undergo clinical examinations biennially to determine their health status. Many AHS studies have been limited to participants attending the clinic over a limited period, and therefore have varying degrees of inferential utility; as such, care is required for comparison with the LSS results. Disease structure of non-cancer diseases in Japan has changed over the long follow-up period since the end of World War II. The health status of the A-bomb survivors may be associated with the hardships of living in a devastated city and impoverished country following the prolonged war effort, in addition to the direct effects of radiation exposure. Radiation-related risk of cardiovascular disease may have increased due to radiation-related increased risk of hypertension and other secondary associations, and the risk of atherosclerotic disorders has also been reported recently. These results should be interpreted with caution because of changes in disease definitions over the follow-up period. The radiation-related risk of non-cancer respiratory diseases also appears to have increased over the follow-up period, but the shapes of the dose-response curves have shown little consistency. © The International Society for Prosthetics and Orthotics.

  10. Comparative outcome of bomb explosion injuries versus high-powered gunshot injuries of the upper extremity in a civilian setting.

    Science.gov (United States)

    Luria, Shai; Rivkin, Gurion; Avitzour, Malka; Liebergall, Meir; Mintz, Yoav; Mosheiff, Ram

    2013-03-01

    Explosion injuries to the upper extremity have specific clinical characteristics that differ from injuries due to other mechanisms. To evaluate the upper extremity injury pattern of attacks on civilian targets, comparing bomb explosion injuries to gunshot injuries and their functional recovery using standard outcome measures. Of 157 patients admitted to the hospital between 2000 and 2004, 72 (46%) sustained explosion injuries and 85 (54%) gunshot injuries. The trauma registry files were reviewed and the patients completed the DASH Questionnaire (Disabilities of Arm, Shoulder and Hand) and SF-12 (Short Form-12) after a minimum period of 1 year. Of the 157 patients, 72 (46%) had blast injuries and 85 (54%) had shooting injuries. The blast casualties had higher Injury Severity Scores (47% vs. 22% with a score of > 16, P = 0.02) and higher percent of patients treated in intensive care units (47% vs. 28%, P = 0.02). Although the Abbreviated Injury Scale score of the upper extremity injury was similar in the two groups, the blast casualties were found to have more bilateral and complex soft tissue injuries and were treated surgically more often. No difference was found in the SF-12 or DASH scores between the groups at follow up. The casualties with upper extremity blast injuries were more severely injured and sustained more bilateral and complex soft tissue injuries to the upper extremity. However, the rating of the local injury to the isolated limb is similar, as was the subjective functional recovery.

  11. Use of outcomes to evaluate surveillance systems for bioterrorist attacks

    Directory of Open Access Journals (Sweden)

    Abrams Allyson M

    2010-05-01

    Full Text Available Abstract Background Syndromic surveillance systems can potentially be used to detect a bioterrorist attack earlier than traditional surveillance, by virtue of their near real-time analysis of relevant data. Receiver operator characteristic (ROC curve analysis using the area under the curve (AUC as a comparison metric has been recommended as a practical evaluation tool for syndromic surveillance systems, yet traditional ROC curves do not account for timeliness of detection or subsequent time-dependent health outcomes. Methods Using a decision-analytic approach, we predicted outcomes, measured in lives, quality adjusted life years (QALYs, and costs, for a series of simulated bioterrorist attacks. We then evaluated seven detection algorithms applied to syndromic surveillance data using outcomes-weighted ROC curves compared to simple ROC curves and timeliness-weighted ROC curves. We performed sensitivity analyses by varying the model inputs between best and worst case scenarios and by applying different methods of AUC calculation. Results The decision analytic model results indicate that if a surveillance system was successful in detecting an attack, and measures were immediately taken to deliver treatment to the population, the lives, QALYs and dollars lost could be reduced considerably. The ROC curve analysis shows that the incorporation of outcomes into the evaluation metric has an important effect on the apparent performance of the surveillance systems. The relative order of performance is also heavily dependent on the choice of AUC calculation method. Conclusions This study demonstrates the importance of accounting for mortality, morbidity and costs in the evaluation of syndromic surveillance systems. Incorporating these outcomes into the ROC curve analysis allows for more accurate identification of the optimal method for signaling a possible bioterrorist attack. In addition, the parameters used to construct an ROC curve should be given careful

  12. STRUCTURE OF OUTCOMES AND FINISHING ATTACKS ON EUROPEAN WOMEN’S HANDBALL CHAMPIONSHIPS 2010

    Directory of Open Access Journals (Sweden)

    Katarina Ohnjec

    2013-07-01

    Full Text Available The main goal of the study is to determine the structure of finalization in attack on team handball matches based on their outcome, and the type of ending that her players performed. The sample of entities in the present study is registered in the 2710 attack of 20 matches of European Women's Handball Championships 2010. in Denmark and Norway. The sample of variables are positive (goal is scored, negative (no goal and lost possession of the ball and neutral (no goal, but the ball remains in the possession of the team outcomes of attacks. Based on the registered frequency the total representation of the outcomes and finishing in the overall structure of the finalization of the attack is determined. These indicators suggest the overall Championship in realization average efficiency of 35% positive outcomes, 55% negative and 10% positive outcome. In implementing the finalization of attack mostly participate back court players, mainly left (LV-24%, then right (21% and centre (20% back court players. Line players have participated in the execution of ending the attack as follows: players on the right wing ended with a total of 13% of attacks, and only one percent less, or 12% of players on the left wing, while the pivot players ended in a total of 10% of attacks.

  13. Terrorism in Two Cultures: Stress and Growth Following September 11 and the Madrid Train Bombings

    Science.gov (United States)

    Steger, Michael F.; Frazier, Patricia A.; Zacchanini, Jose Luis

    2008-01-01

    In this study, we compared the prevalence of post traumatic stress disorder (PTSD) and posttraumatic growth following the September 11, 2001, attacks in the United States and the March 11, 2004, Madrid, Spain train bombings. We also examined meaning in life as a correlate of posttrauma outcomes. A sample of midwestern college students (N = 188)…

  14. Dirty Bomb Risk and Impact

    Energy Technology Data Exchange (ETDEWEB)

    Connell, Leonard W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    We examined the relative risk and impact of a dirty bomb employing Co-60 and Cs-137, the two most common high activity source materials. We found that the risk of an area denial dirty bomb attack is greater for Cs-137 due to the form and chemistry of CsCl, the soft, powdery salt form currently in use for high activity Cs-137 sources, found in blood and research irradiators.

  15. Cluster bomb ocular injuries

    Directory of Open Access Journals (Sweden)

    Ahmad M Mansour

    2012-01-01

    Full Text Available Purpose: To present the visual outcomes and ocular sequelae of victims of cluster bombs. Materials and Methods: This retrospective, multicenter case series of ocular injury due to cluster bombs was conducted for 3 years after the war in South Lebanon (July 2006. Data were gathered from the reports to the Information Management System for Mine Action. Results: There were 308 victims of clusters bombs; 36 individuals were killed, of which 2 received ocular lacerations and; 272 individuals were injured with 18 receiving ocular injury. These 18 surviving individuals were assessed by the authors. Ocular injury occurred in 6.5% (20/308 of cluster bomb victims. Trauma to multiple organs occurred in 12 of 18 cases (67% with ocular injury. Ocular findings included corneal or scleral lacerations (16 eyes, corneal foreign bodies (9 eyes, corneal decompensation (2 eyes, ruptured cataract (6 eyes, and intravitreal foreign bodies (10 eyes. The corneas of one patient had extreme attenuation of the endothelium. Conclusions: Ocular injury occurred in 6.5% of cluster bomb victims and 67% of the patients with ocular injury sustained trauma to multiple organs. Visual morbidity in civilians is an additional reason for a global ban on the use of cluster bombs.

  16. Labeling of Medication and Placebo Alters the Outcome of Episodic Migraine Attacks

    Science.gov (United States)

    Kam-Hansen, Slavenka; Jakubowski, Moshe; Kelley, John M.; Kirsch, Irving; Hoaglin, David C.; Kaptchuk, Ted J.; Burstein, Rami

    2014-01-01

    Information provided to patients is thought to influence placebo and drug effects. We investigated the potential relationship between treatment labeling and its outcome in a prospective, within-subjects, repeated measures study of episodic migraine. A cohort of 66 participants documented 7 separate migraine attack: one untreated attack, followed by six attacks that were randomly assigned for either rizatriptan (10 mg Maxalt) or placebo treatments, each of which labeled once as ‘Maxalt’, once as ‘Placebo’, and once as ‘Maxalt or Placebo’ (459 documented attacks). Data were analyzed using generalized linear mixed model statistics. While Maxalt was generally superior to placebo, the placebo effect, and to a lesser extent Maxalt efficacy, increased monotonically with treatment labeling as follows: ‘Placebo’ label 50% of Maxalt effect under the corresponding labeling condition. Thus, incremental “positive” information yielded incremental efficacy of placebo and medication during migraine attacks. PMID:24401940

  17. Terrorist bombing

    Science.gov (United States)

    Mayo, Ami; Kluger, Yoram

    2006-01-01

    Bombings and explosion incidents directed against innocent civilians are the primary instrument of global terror. In the present review we highlight the major observations and lessons learned from these events. Five mechanisms of blast injury are outlined and the different type of injury that they cause is described. Indeed, the consequences of terror bombings differ from those of non-terrorism trauma in severity and complexity of injury, and constitute a new class of casualties that differ from those of conventional trauma. The clinical implications of terror bombing, in treatment dilemmas in the multidimensional injury, ancillary evaluation and handling of terror bombing mass casualty event are highlighted. All this leads to the conclusion that thorough medical preparedness to cope with this new epidemic is required, and that understanding of detonation and blast dynamics and how they correlate with the injury patterns is pivotal for revision of current mass casualty protocols. PMID:17101058

  18. Prodromal Transient Ischemic Attack or Minor Stroke and Outcome in Basilar Artery Occlusion

    NARCIS (Netherlands)

    Conforto, Adriana B.; De Freitas, Gabriel R.; Schonewille, Wouter J.; Kappelle, L. Jaap; Algra, Ale

    2015-01-01

    Background The presence of prodromal transient ischemic attacks (TIAs) has been associated with a favorable outcome in anterior circulation stroke. We aimed to determine the association between prodromal TIAs or minor stroke and outcomes at 1 month, in the Basilar Artery International Cooperation St

  19. Prodromal Transient Ischemic Attack or Minor Stroke and Outcome in Basilar Artery Occlusion

    NARCIS (Netherlands)

    Conforto, A.B.; Freitas, G.R. de; Schonewille, W.J.; Kappelle, L.J.; Algra, A.; Leeuw, F.E. de

    2015-01-01

    BACKGROUND: The presence of prodromal transient ischemic attacks (TIAs) has been associated with a favorable outcome in anterior circulation stroke. We aimed to determine the association between prodromal TIAs or minor stroke and outcomes at 1 month, in the Basilar Artery International Cooperation S

  20. Terrorist bombing

    OpenAIRE

    Kluger Yoram; Mayo Ami

    2006-01-01

    Abstract Bombings and explosion incidents directed against innocent civilians are the primary instrument of global terror. In the present review we highlight the major observations and lessons learned from these events. Five mechanisms of blast injury are outlined and the different type of injury that they cause is described. Indeed, the consequences of terror bombings differ from those of non-terrorism trauma in severity and complexity of injury, and constitute a new class of casualties that...

  1. Vascular injuries after bear attacks: Incidence, surgical challenges and outcome

    Directory of Open Access Journals (Sweden)

    Wani Mohd

    2011-01-01

    Full Text Available Background : Bear mauling is rarely reported in medical literature due to its rare occurrence. Present study was undertaken to describe the pattern and management of bear maul vascular injuries in Kashmir. Methods : Study of patients with bear maul vascular injury from 1st Jan 2004 to 31st Dec. 2008. Fifteen patients with bear maul vascular injury were studied. All patients of bear maul without vascular injury were excluded from the study. Results : Most of the patients were treated by reverse saphenous vein graft or end to end anastomosis. Most common complication was wound infection (20% followed by graft occlusion (13.33%. There was no operative death. Conclusion : Bear attacks are very common in Kashmir. Vascular injury due to bear maul needs prompt resuscitation and revascularization. Results are very good provided timely intervention for revascularization is done.

  2. Adolescents' Mental Health Outcomes According to Different Types of Exposure to Ongoing Terror Attacks

    Science.gov (United States)

    Braun-Lewensohn, Orna; Celestin-Westreich, Smadar; Celestin, Leon-Patrice; Verte, Dominique; Ponjaert-Kristoffersen, Ingrid

    2009-01-01

    This study investigates the impact of several types of exposure to terror attacks on adolescents' psychological outcomes in the context of ongoing terror. A total of 913 adolescents (51 girls) aged 12 to 18 years (12-13.6 = 33%; 13.7-15.6 = 38%; 15.7-18 = 28%) took part in the study. Detailed data were collected concerning objective, subjective…

  3. Does Uninsurance Affect the Health Outcomes of the Insured? Evidence from Heart Attack Patients in California

    NARCIS (Netherlands)

    Meltem Daysal, N.

    2012-01-01

    Abstract: In this paper, I examine the impact of uninsured patients on the health of the insured, focusing on one health outcome - the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California (1999-200

  4. Does Uninsurance Affect the Health Outcomes of the Insured? Evidence from Heart Attack Patients in California

    NARCIS (Netherlands)

    Meltem Daysal, N.

    2012-01-01

    Abstract: In this paper, I examine the impact of uninsured patients on the health of the insured, focusing on one health outcome - the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California (1999-200

  5. Adolescents' Mental Health Outcomes According to Different Types of Exposure to Ongoing Terror Attacks

    Science.gov (United States)

    Braun-Lewensohn, Orna; Celestin-Westreich, Smadar; Celestin, Leon-Patrice; Verte, Dominique; Ponjaert-Kristoffersen, Ingrid

    2009-01-01

    This study investigates the impact of several types of exposure to terror attacks on adolescents' psychological outcomes in the context of ongoing terror. A total of 913 adolescents (51 girls) aged 12 to 18 years (12-13.6 = 33%; 13.7-15.6 = 38%; 15.7-18 = 28%) took part in the study. Detailed data were collected concerning objective, subjective…

  6. Britain's bomb

    Science.gov (United States)

    Corfield, Richard

    2012-10-01

    On the 60th anniversary of Britain's first nuclear test, Richard Corfield explores how Operation Hurricane - the British effort to develop the atomic bomb in the 1940s and 1950s - compares with states such as Iran that today wish to have such devices.

  7. BusWorld: an analog pilot test of a virtual environment designed to treat posttraumatic stress disorder originating from a terrorist suicide bomb attack.

    Science.gov (United States)

    Josman, Naomi; Reisberg, Ayelet; Weiss, Patrice L; Garcia-Palacios, Azucena; Hoffman, Hunter G

    2008-12-01

    Exposure therapy treatment can lead to large reductions in posttraumatic stress disorder (PTSD) symptoms. Virtual reality exposure (VRE) therapy is designed to facilitate cognitive behavioral therapy for PTSD. During VRE therapy, patients go into an immersive computer-generated environment (go back to the scene of the traumatic event) to help them gain access to their memories of the traumatic event, change unhealthy thought patterns, gradually habituate to their anxiety, and reduce the intensity of associated emotions. The therapist's ability to manipulate the amount of anxiety experienced by the client during therapy is an important element of successful exposure therapy. Using a within-subjects design, 30 asymptomatic volunteers each experienced four levels of a virtual world depicting a terrorist bus bombing, designed to be increasingly distressful. There was a statistically significant difference between the mean subjective units of discomfort scores (SUDS) of the four levels, and several planned paired comparisons showed significantly higher SUDS ratings with higher simulation levels. Results suggest that sound may play an important role in successful elicitation of emotional responses during VRE. The results of this analog study provide initial validation of the potential of BusWorld to provide graded exposure for individuals suffering from PTSD originating from suicide bus bombings. Future research exploring whether VR exposure therapy with BusWorld can reduce PTSD in clinical patients is warranted.

  8. A review of 48 patients after bear attacks in Central India: Demographics, management and outcomes

    Directory of Open Access Journals (Sweden)

    Surendra B Patil

    2015-01-01

    Full Text Available Introduction: Bear attacks though relatively rare are frequent enough to be of concern for those who are in bear habitats. Our centre at Nagpur, being surrounded by dense forests from all the sides, treats a large number of victims. Aim: The aim was to document the injuries, management and the potential complications of bear attacks. Materials and Methods: We reviewed the records of 48 consecutive patients who were treated in our department from January 2006 to December 2013 for bear attacks. Outcome: The majority of patients were referred 24-48 h post-attack. All but two patients had involvement of either the face or scalp. Involvement of eyes, mandible, facial nerve, was common. Reconstruction included simple suture of lacerations to management of complex compound injuries with three-dimensional defects. Thirteen patients developed infection. Conclusion: Bear attack victims need a multidisciplinary approach. Early broad spectrum antibiotics, anti-rabies prophylaxis and irrigation and debridement of the wound are needed. We advise early referral to tertiary treatment centres.

  9. The Influence of Charismatic Authority on Operational Strategies and Attack Outcomes of Terrorist Groups

    Directory of Open Access Journals (Sweden)

    David C. Hofmann

    2016-06-01

    Full Text Available Despite the historical and contemporary prevalence of charismatic terrorist leaders, there has been very little empirical examination of the relationship between charismatic forms of authority and the strategic operation of terrorist groups. In response to this gap in knowledge, this study seeks to investigate if charismatic authority has a real-world impact on strategic choices and attack outcomes of terrorist groups. Using a theoretical framework meant to help measure charisma in terrorist organizations, this study quantitatively examines how differing levels of the presence of charismatic authority contributes to the choice in operational tactics (e.g., weapon and target choices and the results of attack outcomes (e.g., success rates, lethality within a sample of thirty international terrorist groups. In the concluding section, relevant findings, policy recommendations, study limitations, and areas for future research are discussed.

  10. Italian Bombs & Fuzes

    Science.gov (United States)

    1948-06-01

    withdrawal of the safety pin . The bomb 20.1., on account of its special method of suspension, has a recess cut in the tail, about half way along...Indication of arming :- safety pin and caps missing. To defuze these bombs. Lay the bombs carefully on their sides. Unscrew...bomb can be regarded as ALLWAYS action. (a) If the safety pin hole in the fuze spindle is visible 2 cm above the head of the fuze, the

  11. Bomb tests attack the food chain

    Energy Technology Data Exchange (ETDEWEB)

    Ruff, T. (Monash Medical School, Melbourne (Australia))

    1990-03-01

    Ciguatera poisoning, the most common type of fish poisoning in the world, has become a major public health problem in some parts of the South Pacific. This area has always been the site of periodic outbreaks, especially after severe storms or natural disasters that damage core reefs. But since World War II it has become evident that military activities and major construction projects that wreak havoc on corals also lead to ciguatera outbreaks. Extraordinarily high rates of ciguatera poisoning have occurred on the small Pacific islands that have been used for nuclear tests and on the islands that host the military infrastructures and activities that accompany the tests. This is true for both the Marshall Islands near Bikini and Eniwetok, where U.S. tests took place, and in French Polynesia, in the area around Moruroa Atoll where the French government continues to test. Ciguatera poisoning has a disastrous effect on people who depend on fishing as a way of life and on fish as the major source of protein. 10 refs.

  12. Attributing heart attack and stroke to "Old Age": Implications for subsequent health outcomes among older adults.

    Science.gov (United States)

    Stewart, Tara L; Chipperfield, Judith G; Perry, Raymond P; Hamm, Jeremy M

    2016-01-01

    This study assessed the extent to which older adults attribute a recent heart attack/stroke to "old age," and examined consequences for subsequent lifestyle behavior and health-care service utilization. Community-dwelling adults (N = 57, ages 73-98 years) were interviewed about their heart attack/stroke, and an objective health registry provided data on health-care utilization over a 3-year period. Endorsement of "old age" as a cause of heart attack/stroke negatively predicted lifestyle behavior change, and positively predicted frequency of physician visits and likelihood of hospitalization over the subsequent 3 years. Findings suggest the importance of considering "old age" attributions in the context of cardiovascular health events.

  13. Does uninsurance affect the health outcomes of the insured? Evidence from heart attack patients in California.

    Science.gov (United States)

    Daysal, N Meltem

    2012-07-01

    In this paper, I examine the impact of uninsured patients on the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California (1999-2006). My results indicate that uninsured patients have an economically significant effect that increases the mortality rate of insured heart attack patients. I show that these results are not driven by alternative explanations, including reverse causality, patient composition effects, sample selection or unobserved trends and that they are robust to a host of specification checks. The primary channel for the observed spillover effects is increased hospital uncompensated care costs. Although data limitations constrain my capacity to check how hospitals change their provision of care to insured heart attack patients in response to reduced revenues, the evidence I have suggests a modest increase in the quantity of cardiac services without a corresponding increase in hospital staff.

  14. Korean atomic bomb victims.

    Science.gov (United States)

    Sasamoto, Yukuo

    2009-01-01

    After colonizing Korea, Japan invaded China, and subsequently initiated the Pacific War against the United States, Britain, and their allies. Towards the end of the war, U.S. warplanes dropped atomic bombs on Hiroshima and Nagasaki, which resulted in a large number of Koreans who lived in Hiroshima and Nagasaki suffering from the effects of the bombs. The objective of this paper is to examine the history of Korea atomic bomb victims who were caught in between the U.S., Japan, the Republic of Korea (South Korea) and the Democratic People's Republic of Korea (North Korea).

  15. The Effect of Sleep Disordered Breathing on the Outcome of Stroke and Transient Ischemic Attack

    DEFF Research Database (Denmark)

    Birkbak, Johannes; Clark, Alice J; Rod, Naja Hulvej

    2014-01-01

    The primary objective was to systematically review the literature on how sleep disordered breathing (SDB) affects recurrence and death among stroke or transient ischemic attack (TIA) patients. A secondary objective was to evaluate how treatment of SDB with continuous positive airway pressure (CPAP...

  16. Atomic bomb health benefits.

    Science.gov (United States)

    Luckey, T D

    2008-01-01

    Media reports of deaths and devastation produced by atomic bombs convinced people around the world that all ionizing radiation is harmful. This concentrated attention on fear of miniscule doses of radiation. Soon the linear no threshold (LNT) paradigm was converted into laws. Scientifically valid information about the health benefits from low dose irradiation was ignored. Here are studies which show increased health in Japanese survivors of atomic bombs. Parameters include decreased mutation, leukemia and solid tissue cancer mortality rates, and increased average lifespan. Each study exhibits a threshold that repudiates the LNT dogma. The average threshold for acute exposures to atomic bombs is about 100 cSv. Conclusions from these studies of atomic bomb survivors are: One burst of low dose irradiation elicits a lifetime of improved health.Improved health from low dose irradiation negates the LNT paradigm.Effective triage should include radiation hormesis for survivor treatment.

  17. INDONESIAN SALAFISM ON JIHAD AND SUICIDE BOMBINGS

    Directory of Open Access Journals (Sweden)

    Rusli Rusli

    2014-06-01

    Full Text Available This paper deals with jihad and suicide bombings from the perspective of Indonesian salafism. It is argued that there are two different points of view related to this issue. The first is those who are affiliated with Wahhabi salafists such as those involved in Salafi-based foundations like As-Sunnah, Ihyaut Turats, al-Sofwah, Lajnah al-Khairiyah, Lajnah al-Istiqamah, and Wahdah Islamiyyah. They do not agree with suicide bombing directed to Western targets—mainly America—and its symbols. Suicide bombings are equivalent to killing oneself, and this is extremely forbidden in Islam. The second is Salafi-jihadists who have justified suicide bombing attacks to infidel targets and the symbols of tagut (false god. The reason is blowing oneself is not the same as committing suicide, for suicide is a sin. However, he is believed as carrying out “martyrdom operations”, sacrificing himself for the sake of the superior goal of defending his religion and community, while suicide is a hopeless deed performed by a person who kills himself for his own selfish reason.

  18. Are IRIS Bombs Connected to Ellerman Bombs?

    Science.gov (United States)

    Tian, Hui; Xu, Zhi; He, Jiansen; Madsen, Chad

    2016-06-01

    Recent observations by the Interface Region Imaging Spectrograph (IRIS) have revealed pockets of hot gas (˜2-8 × 104 K) potentially resulting from magnetic reconnection in the partially ionized lower solar atmosphere (IRIS bombs; IBs). Using joint observations between IRIS and the Chinese New Vacuum Solar Telescope, we have identified 10 IBs. We find that 3 are unambiguously and 3 others are possibly connected to Ellerman bombs (EBs), which show intense brightening of the extended {{{H}}}α wings without leaving an obvious signature in the {{{H}}}α core. These bombs generally reveal the following distinct properties: (1) the O iv 1401.156 Å and 1399.774 Å lines are absent or very weak; (2) the Mn i 2795.640 Å line manifests as an absorption feature superimposed on the greatly enhanced Mg ii k line wing; (3) the Mg ii k and h lines show intense brightening in the wings and no dramatic enhancement in the cores; (4) chromospheric absorption lines such as Ni ii 1393.330 Å and 1335.203 Å are very strong; and (5) the 1700 Å images obtained with the Atmospheric Imaging Assembly on board the Solar Dynamics Observatory reveal intense and compact brightenings. These properties support the formation of these bombs in the photosphere, demonstrating that EBs can be heated much more efficiently than previously thought. We also demonstrate that the Mg ii k and h lines can be used to investigate EBs similarly to {{{H}}}α , which opens a promising new window for EB studies. The remaining four IBs obviously have no connection to EBs and they do not have the properties mentioned above, suggesting a higher formation layer, possibly in the chromosphere.

  19. Are IRIS bombs connected to Ellerman bombs?

    CERN Document Server

    Tian, Hui; He, Jiansen; Madsen, Chad

    2016-01-01

    Recent observations by the Interface Region Imaging Spectrograph (IRIS) have revealed pockets of hot gas ($\\sim$2--8$\\times$10$^{4}$ K) potentially resulting from magnetic reconnection in the partially ionized lower solar atmosphere (IRIS bombs; IBs). Using joint observations between IRIS and the Chinese New Vacuum Solar Telescope, we have identified ten IBs. We find that three are unambiguously and three others are possibly connected to Ellerman bombs (EBs), which show intense brightening of the extended H$_{\\alpha}$ wings without leaving an obvious signature in the H$_{\\alpha}$ core. These bombs generally reveal the following distinct properties: (1) The O~{\\sc{iv}}~1401.156\\AA{} and 1399.774\\AA{} lines are absent or very weak; (2) The Mn~{\\sc{i}}~2795.640\\AA{} line manifests as an absorption feature superimposed on the greatly enhanced Mg~{\\sc{ii}}~k line wing; (3) The Mg~{\\sc{ii}}~k and h lines show intense brightening in the wings and no dramatic enhancement in the cores; (4) Chromospheric absorption lin...

  20. Cardiovascular disease among atomic bomb survivors.

    Science.gov (United States)

    Ozasa, Kotaro; Takahashi, Ikuno; Grant, Eric J; Kodama, Kazunori

    2017-02-24

    The profile of cardiovascular disease in Japan has been different from that in Western countries. Hypertension was the major cause not only for hemorrhagic stroke but also for ischemic stroke and heart disease in the past, and the influence of hypertension has decreased with calendar years because of reduced salt intake and westernization of lifestyle, and also improved medical care. The health status of atomic bomb survivors has reflected this profile as well as radiation effects. It is also likely that this cohort has been affected by the difficult conditions experienced in the aftermath of the war and atomic bombings. In this article, we tried to make a consistent interpretation of epidemiological findings of atomic bomb radiation effects on cardiovascular disease. Among the atomic bomb survivors, radiation exposure was associated with some cardiovascular diseases that are often associated with hypertension, and dose response appeared to be primarily non-linear among those who were exposed at younger ages. These effects are thought to reflect the nature of whole body irradiation. But, some findings remain inconsistent, possibly because of possible misclassification in death certificate diagnoses in the Life Span Study as well as selected information from the Adult Health Study which was limited to participants, focused on specific outcomes, and gathered in selected periods of follow-up. Therefore, a comprehensive and balanced interpretation of the results from both groups is necessary.

  1. Suicide bombing: a psychodynamic view.

    Science.gov (United States)

    Khalid, Uday; Olsson, Peter

    2006-01-01

    The horror and macabre images of suicide bombings appear regularly on television news programs around the world. A focused literature review of psychiatric interview and demographic data about suicide bombers is presented. Of particular clinical interest are the findings from the study of potential suicide bombers who were apprehended before they could act on their suicide bombing plans. The authors offer psychodynamic and social self-psychological theories explaining the phenomenon of suicide bombing behavior.

  2. Psychological trauma associated with the World Trade Center attacks and its effect on pregnancy outcome.

    Science.gov (United States)

    Engel, Stephanie Mulherin; Berkowitz, Gertrud S; Wolff, Mary S; Yehuda, Rachel

    2005-09-01

    The destruction of the World Trade Center (WTC) on 11 September 2001 was a source of enormous psychological trauma that may have consequences for the health of pregnant women and their fetuses. In this report, we describe the impact of extreme trauma on the birth outcomes of women highly exposed to the WTC. We enrolled 187 women who were pregnant and living or working within close proximity to the WTC on 11 September. Among women with singleton pregnancies, 52 completed at least one psychological assessment prior to delivery. In adjusted multivariable models, both post-traumatic stress symptomatology (PTSS) and moderate depression were associated with longer gestational durations, although only PTSS was associated with decrements in infant head circumference at birth (beta=-0.07, SE=0.03, P=0.01). The impact of stress resulting from extreme trauma may be different from that which results from ordinary life experiences, particularly with respect to cortisol production. As prenatal PTSS was associated with decrements in head circumference, this may influence subsequent neurocognitive development. Long-term follow-up of infants exposed to extreme trauma in utero is needed to evaluate the persistence of these effects.

  3. Penetrating Cardiac and Hepatic Injury; Polytrauma of a Child After Bombing

    Directory of Open Access Journals (Sweden)

    Baris Akca

    2013-10-01

    Full Text Available After a bombing attack, patients were brought into hospital suffering from a combination of injuries caused by the blast, penetrating injuries and burns which as a case of polytrauma. In penetrating thoracoabdominal injuries due to bombing possibility of cardiac injury should be kept in mind. Penetrating cardiac injuries in children are rare but has a high mortality and morbidity. In some cases there may be difficulty in diagnosis of penetrating cardiac injury. In this case we want to share the diagnosis, treatment and follow-up processes of penetrating cardiac and hepatic injury with burns of a politrauma child due to bombing.

  4. Communication issues during bomb threats.

    Science.gov (United States)

    Kuebler, S A

    How should healthcare security professionals handle a bomb threat? How can a large complex best be searched? The author discusses why he believes the judicial use of radios and cellular phones during emergencies can enhance security's ability to handle bomb threat situations, and offers guidelines to follow.

  5. Ellerman bombs: fallacies, fads, usage

    CERN Document Server

    Rutten, Robert J; van der Voort, Luc H M Rouppe; Sütterlin, Peter; Vitas, Nikola

    2013-01-01

    Ellerman bombs are short-lived brightenings of the outer wings of Halpha that occur in active regions with much flux emergence. We point out fads and fallacies in the extensive Ellerman bomb literature, discuss their appearance in various spectral diagnostics, and advocate their use as indicators of field reconfiguration in active-region topography using AIA 1700 A images.

  6. Presentation and In-Hospital Outcome in First Attack of Acute Coronary Syndrome among Diabetic and Non-Diabetic People.

    Science.gov (United States)

    Islam, M N; Mahmud, A A; Pandit, H; Bhuiyan, A S

    2015-07-01

    This was a prospective and observational study. One hundred and sixty five consecutive patients (75 diabetic and 90 were non-diabetic) admitted to coronary care unit in Rangpur Medical College and Hospital, Rangpur from December 2011 to June 2012 with the diagnosis of first attack of acute coronary syndrome were included in this study. Patients were selected considering the inclusion and exclusion criteria, Symptom time, typical or atypical chest pain, Dysponea, palpitation, cardiogenic shock, cardiac arrest, vital signs and Killip classes were regarded as presentation at admission. Outcome parameters observed during the hospital stay were in-hospital mortality, cardiogenic shock, congestive cardiac failure, symptomatic arrhythmias, cardiac arrest, recurrent ischemia and hospital stay. The results were obtained by calculating 'p' value by 'z' test, 't' test, chi-square test, as appropriate to see the difference between two groups. The results thus obtained were plotted on table, pie-chart, line chart, bar-diagram etc. as appropriate p value diabetic patients presented with acute coronary syndrome at earlier age (p=053). Body Mass Index was significantly more in diabetic group (25.053 ± 2.1428 vs. 24.0822 kg/m² ± 2.233 kg/m², p=0.0045). Atypical chest pain (40% vs. 24.4%, p=0.0323), Dysponea (53.3 vs. 36.7%, p=0.0315), cardiac shock (17.33 vs. 6.7%, p=0.03236) and symptom duration before presentation (31.067 ± 42.5 hours vs. 19.44 ± 30.3 hours, p=0.0471) were significantly more observed in diabetic group. In respect of outcome, diabetic patients experienced more recurrent ischemia (24% vs. 16.67%, p=0.0524) and heart failure (36% vs. 22.2%, p=0.05). Hospital stay was also found significantly higher in diabetic group (5.097 ± 1.023 vs. 4.097 ± 1.009, p=0.0078). Atypically presented group suffered significantly more from congestive heart failure p=0.0392. Triglyceride level (230.7 ± 61.7 vs. 180.1 ± 39.1, pdiabetic group. The mean value of Hba1C in diabetic

  7. Ticagrelor in Acute Stroke or Transient Ischemic Attack in Asian Patients: From the SOCRATES Trial (Acute Stroke or Transient Ischemic Attack Treated With Aspirin or Ticagrelor and Patient Outcomes).

    Science.gov (United States)

    Wang, Yongjun; Minematsu, Kazuo; Wong, Ka Sing Lawrence; Amarenco, Pierre; Albers, Gregory W; Denison, Hans; Easton, J Donald; Evans, Scott R; Held, Peter; Jonasson, Jenny; Molina, Carlos A; Johnston, S Claiborne

    2017-01-01

    In the SOCRATES trial (Acute Stroke or Transient Ischemic Attack Treated With Aspirin or Ticagrelor and Patient Outcomes), ticagrelor was not superior to aspirin. Because of differences in patient demographics and stroke disease pattern in Asia, outcomes of ticagrelor versus aspirin were assessed among Asian patients in a prespecified exploratory analysis. Baseline demographics, treatment effects, and safety of ticagrelor and aspirin were assessed among Asian patients. Differences in outcomes between groups were assessed using Cox proportional hazard model. A total of 3858 (29.2%) SOCRATES participants were recruited in Asia. Among the Asian patients, the primary end point event occurred in 186 (9.6%) of the 1933 patients treated with ticagrelor, versus 224 (11.6%) of the 1925 patients treated with aspirin (hazard ratio, 0.81; 95% confidence interval, 0.67-0.99). The exploratory P value for treatment-by-region interaction was 0.27. The primary end point event rate in the Asian subgroup was numerically higher than that in the non-Asian group (10.6% versus 5.7%; nominal Pacute stroke or transient ischemic attacks, there was a trend toward a lower hazard ratio in reducing risk of the primary end point of stroke, myocardial infarction, or death in the ticagrelor group. URL: http://www.clinicaltrials.gov. Unique identifier: NCT01994720. © 2016 American Heart Association, Inc.

  8. Dirty Bombs: A Discouraging Second Look

    Science.gov (United States)

    Loeb, Cheryl A.

    2004-05-01

    Dirty bombs, terrorist devices to spread intensely radioactive material with the intent to kill, sicken, or inflict economic damage, have been overestimated by some in the government and underestimated by many physicists. It is unlikely that a radiological dispersion device (RDD) will contaminate an area to such a level that brief exposures are lethal or even incapacitating. However, careful examination of the consequences of the accident in Goiânia, Brazil shows that it is highly likely that people in the contaminated region will inhale or ingest dusty or liquid radioactive material in sufficient quantities to cause acute radiation sickness, and in some cases enough to kill. Some forms of radiological attack could kill tens or hundreds of people and sicken hundreds or thousands. This paper provides a general overview of the nature and use of RDDs and examines readily available sources of large quantities of radioactive material, material which requires significantly greater protection than it is afforded today. Under many circumstances an RDD containing only a few curies of cesium-137, strontium-90, cobalt-60 or other industrial isotopes could force the razing of more buildings and inflict greater economic losses than did the September 11, 2002 attacks on the World Trade Center and the Pentagon. The National Defense University study proposes new policies for the federal government which would decrease the chances of an attack and reduce the cost in lives and money to the United States should one, nevertheless, occur.

  9. Risk for Major Bleeding in Patients Receiving Ticagrelor Compared With Aspirin After Transient Ischemic Attack or Acute Ischemic Stroke in the SOCRATES Study (Acute Stroke or Transient Ischemic Attack Treated With Aspirin or Ticagrelor and Patient Outcomes).

    Science.gov (United States)

    Easton, J Donald; Aunes, Maria; Albers, Gregory W; Amarenco, Pierre; Bokelund-Singh, Sara; Denison, Hans; Evans, Scott R; Held, Peter; Jahreskog, Marianne; Jonasson, Jenny; Minematsu, Kazuo; Molina, Carlos A; Wang, Yongjun; Wong, K S Lawrence; Johnston, S Claiborne

    2017-09-05

    Patients with minor acute ischemic stroke or transient ischemic attack are at high risk for subsequent stroke, and more potent antiplatelet therapy in the acute setting is needed. However, the potential benefit of more intense antiplatelet therapy must be assessed in relation to the risk for major bleeding. The SOCRATES trial (Acute Stroke or Transient Ischemic Attack Treated With Aspirin or Ticagrelor and Patient Outcomes) was the first trial with ticagrelor in patients with acute ischemic stroke or transient ischemic attack in which the efficacy and safety of ticagrelor were compared with those of aspirin. The main safety objective was assessment of PLATO (Platelet Inhibition and Patient Outcomes)-defined major bleeds on treatment, with special focus on intracranial hemorrhage (ICrH). An independent adjudication committee blinded to study treatment classified bleeds according to the PLATO, TIMI (Thrombolysis in Myocardial Infarction), and GUSTO (Global Use of Strategies to Open Occluded Coronary Arteries) definitions. The definitions of ICrH and major bleeding excluded cerebral microbleeds and asymptomatic hemorrhagic transformations of cerebral infarctions so that the definitions better discriminated important events in the acute stroke population. A total of 13 130 of 13 199 randomized patients received at least 1 dose of study drug and were included in the safety analysis set. PLATO major bleeds occurred in 31 patients (0.5%) on ticagrelor and 38 patients (0.6%) on aspirin (hazard ratio, 0.83; 95% confidence interval, 0.52-1.34). The most common locations of major bleeds were intracranial and gastrointestinal. ICrH was reported in 12 patients (0.2%) on ticagrelor and 18 patients (0.3%) on aspirin. Thirteen of all 30 ICrHs (4 on ticagrelor and 9 on aspirin) were hemorrhagic strokes, and 4 (2 in each group) were symptomatic hemorrhagic transformations of brain infarctions. The ICrHs were spontaneous in 6 and 13, traumatic in 3 and 3, and procedural in 3 and 2

  10. Negative reinforcement/negative affect reduction cigarette smoking outcome expectancies: incremental validity for anxiety focused on bodily sensations and panic attack symptoms among daily smokers.

    Science.gov (United States)

    Zvolensky, Michael J; Gonzalez, Adam; Bonn-Miller, Marcel O; Bernstein, Amit; Goodwin, Renee D

    2008-02-01

    The present investigation evaluated the incremental validity of negative reinforcement/negative affect reduction smoking outcome expectancies in the prediction of anxious and fearful responding to bodily sensations. Participants included 171 daily smokers (82 women, 89 men; mean age = 25.67 years, SD = 10.54). Consistent with prediction, negative reinforcement/negative affect reduction smoking outcome expectancies were significantly predictive of anxiety focused on bodily sensations and postchallenge intensity of cognitive panic attack symptoms, but not of physical panic symptoms. The observed effects were evident above and beyond the statistically significant variance accounted for by the covariates of anxiety sensitivity, negative affectivity, cigarettes per day, and weekly alcohol use and independent of other smoking outcome expectancy factors. Findings are discussed in terms of the role of negative reinforcement/negative affect reduction smoking outcome expectancies and vulnerability for panic symptoms and psychopathology.

  11. The image of the atomic bomb in Japan before Hiroshima.

    Science.gov (United States)

    Nakao, Maika

    2009-01-01

    This paper traces the roots of the image of the atomic bomb in Japan by investigating the various discourses on atomic energy and atomic weapons in Japanese literature prior to the bombing of Hiroshima in August 1945. Japan is a country that suffered an atomic attack and, at the same time, one of the countries that was engaged in atomic weapons research during the Second World War. During the war, the discourses on atomic weapons were not limited to the military or scientific communities, but included the general public, thus facilitating the creation of a shared image of the atomic bomb as an ultimate weapon. This paper examines how this image was created. This special issue deals with the comparison among different countries, but the purpose of my paper is to deepen this subject by illustrating the differences within a single country in different periods. This research aims to extend the historical perspective concerning the atomic bomb in Japan, and offers another way of looking at this both historical and contemporary issue.

  12. Bomb pulse biology

    Energy Technology Data Exchange (ETDEWEB)

    Falso, Miranda J. Sarachine [Center for Accelerator Mass Spectrometry, Mail Stop L-397, Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, CA 94551 (United States); Buchholz, Bruce A., E-mail: buchholz2@llnl.gov [Center for Accelerator Mass Spectrometry, Mail Stop L-397, Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, CA 94551 (United States)

    2013-01-15

    The past decade has seen an explosion in use of the {sup 14}C bomb pulse to do fundamental cell biology. Studies in the 1960s used decay counting to measure tissue turnover when the atmospheric {sup 14}C/C concentration was changing rapidly. Today bulk tissue measurements are of marginal interest since most of the carbon in the tissue resides in proteins, lipids and carbohydrates that turn over rapidly. Specific cell types with specialized functions are the focus of cell turnover investigations. Tissue samples need to be fresh or frozen. Fixed or preserved samples contain petroleum-derived carbon that has not been successfully removed. Cell or nuclear surface markers are used to sort specific cell types, typically by fluorescence-activated cell sorting (FACS). Specific biomolecules need to be isolated with high purity and accelerator mass spectrometry (AMS) measurements must accommodate samples that generally contain less than 40 {mu}g of carbon. Furthermore, all separations must not add carbon to the sample. Independent means such as UV absorbance must be used to confirm molecule purity. Approaches for separating specific proteins and DNA and combating contamination of undesired molecules are described.

  13. The philosophy of bombs. The theoretical foundations of terrorist attacks

    OpenAIRE

    Kreibohm, Patricia

    2011-01-01

    El objetivo de este artículo es examinar las bases esenciales de la filosofía terrorista; es decir, el núcleo duro de Ia convicción que anima a sus actores y que subyace a sus ideas políticas, a sus demandas, ideologías y doctrinas. Con este propósito, el análisis se ha centrado en Io que hemos denominado los cinco pilares de la filosofía terrorista: la necesidad, la legitimidad, la eficacia, la capacidad para propagar el miedo y el valor propagandístico de sus acciones The goal of this ar...

  14. Peace and the Atomic Bomb

    Energy Technology Data Exchange (ETDEWEB)

    Bradbury, Norris E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Meade, Roger Allen [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    1948-12-02

    A little over three years after assuming the directorship of the Los Alamos Scientific Laboratory, Norris Bradbury returned to his alma mater, Pomona College, and delivered one of his first extended speeches regarding the atomic bomb. Bradbury noted that although the atomic bomb had brought a “peace of kind,” ending World War II, the bomb also had become, without much thought, a “factor in the political, military, and diplomatic thinking of the world.” Bradbury hoped his speech, given to both the faculty and student body of Pomona, would give his audience a foundation on which to assess and understand the new world the bomb had ushered into existence. Bradbury’s talk was quickly printed an distributed by Pomona College and, later, reprinted in The Physical Review (Volume 75, No. 8, 1154-1160, April 15, 1949). It is reprinted here, for a third time, as a reminder of the early days of Los Alamos and its role in international affairs. "Slightly more that three years ago, this country brought to an end the most catastrophic war in history. The conflict had been characterized by an unremitting application of science to the technology of destruction. The final use of the atomic bomb, however, provided a climax so striking that the inevitable nature of future wars was illustrated with the utmost clarity. Peace of a kind followed the first military use of atomic weapons, but international understanding did not, and the atomic bomb became a factor in the political, military, and diplomatic thinking of the world. Where do we now stand in all this? What are the costs and the rewards? Where are we going? These are some of the things that I would like to discuss with you this morning."

  15. Does acute maternal stress in pregnancy affect infant health outcomes? Examination of a large cohort of infants born after the terrorist attacks of September 11, 2001

    Science.gov (United States)

    Endara, Skye M; Ryan, Margaret AK; Sevick, Carter J; Conlin, Ava Marie S; Macera, Caroline A; Smith, Tyler C

    2009-01-01

    Background Infants in utero during the terrorist attacks of September 11, 2001 may have been negatively affected by maternal stress. Studies to date have produced contradictory results. Methods Data for this retrospective cohort study were obtained from the Department of Defense Birth and Infant Health Registry and included up to 164,743 infants born to active-duty military families. Infants were considered exposed if they were in utero on September 11, 2001, while the referent group included infants gestating in the same period in the preceding and following year (2000 and 2002). We investigated the association of this acute stress during pregnancy with the infant health outcomes of male:female sex ratio, birth defects, preterm birth, and growth deficiencies in utero and in infancy. Results No difference in sex ratio was observed between infants in utero in the first trimester of pregnancy on September 11, 2001 and infants in the referent population. Examination of the relationship between first-trimester exposure and birth defects also revealed no significant associations. In adjusted multivariable models, neither preterm birth nor growth deficiencies were significantly associated with the maternal exposure to the stress of September 11 during pregnancy. Conclusion The findings from this large population-based study suggest that women who were pregnant during the terrorist attacks of September 11, 2001 had no increased risk of adverse infant health outcomes. PMID:19619310

  16. Does acute maternal stress in pregnancy affect infant health outcomes? Examination of a large cohort of infants born after the terrorist attacks of September 11, 2001

    Directory of Open Access Journals (Sweden)

    Conlin Ava Marie S

    2009-07-01

    Full Text Available Abstract Background Infants in utero during the terrorist attacks of September 11, 2001 may have been negatively affected by maternal stress. Studies to date have produced contradictory results. Methods Data for this retrospective cohort study were obtained from the Department of Defense Birth and Infant Health Registry and included up to 164,743 infants born to active-duty military families. Infants were considered exposed if they were in utero on September 11, 2001, while the referent group included infants gestating in the same period in the preceding and following year (2000 and 2002. We investigated the association of this acute stress during pregnancy with the infant health outcomes of male:female sex ratio, birth defects, preterm birth, and growth deficiencies in utero and in infancy. Results No difference in sex ratio was observed between infants in utero in the first trimester of pregnancy on September 11, 2001 and infants in the referent population. Examination of the relationship between first-trimester exposure and birth defects also revealed no significant associations. In adjusted multivariable models, neither preterm birth nor growth deficiencies were significantly associated with the maternal exposure to the stress of September 11 during pregnancy. Conclusion The findings from this large population-based study suggest that women who were pregnant during the terrorist attacks of September 11, 2001 had no increased risk of adverse infant health outcomes.

  17. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  18. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  19. Bombe udstiller Sinn Feins dilemma

    DEFF Research Database (Denmark)

    2010-01-01

    Natten til mandag den 12. april sprang en bombe lige udenfor Belfast. Hverken tid eller sted var tilfældigt. Bomben sprang nemlig på den dag, hvor det justitspolitiske område blev overført til Nordirland. Og den sprang lige bagved den bygning hvor den britiske sikkerhedstjeneste MI5 har deres nye...

  20. Thermal dynamics of bomb calorimeters

    Science.gov (United States)

    Lyon, Richard E.

    2015-12-01

    The thermal dynamics of bomb calorimeters are modeled using a lumped heat transfer analysis in which heat is released in a pressure vessel/bomb immersed in a stirred water bath that is surrounded by a static air space bounded by an insulated (static) jacket, a constant/controlled temperature jacket (isoperibol), or a changing temperature (adiabatic) jacket. The temperature history of the water bath for each of these boundary conditions (methods) is well described by the two-term solution for the calorimeter response to a heat impulse (combustion), allowing the heat transfer coefficients and thermal capacities of the bomb and water bath to be determined parametrically. The validated heat transfer model provides an expression for direct calculation of the heat released in an arbitrary process inside a bomb calorimeter using the temperature history of the water bath for each of the boundary conditions (methods). This result makes possible the direct calculation of the heat of combustion of a sample in an isoperibol calorimeter from the recorded temperature history without the need for semi-empirical temperature corrections to account for non-adiabatic behavior. Another useful result is that the maximum temperature rise of the water bath in the static jacket method is proportional to the total heat generated, and the empirical proportionality constant, which is determined by calibration, accounts for all of the heat losses and thermal lags of the calorimeter.

  1. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  2. The use of blood biomarkers to predict poor outcome after acute transient ischemic attack or ischemic stroke.

    Science.gov (United States)

    Whiteley, William; Wardlaw, Joanna; Dennis, Martin; Lowe, Gordon; Rumley, Ann; Sattar, Naveed; Welsh, Paul; Green, Alison; Andrews, Mary; Sandercock, Peter

    2012-01-01

    The prediction of death or disability ("poor outcome") after stroke by validated clinical models might be improved by the addition of blood biomarker measurements. We investigated whether such measurements improved the classification of patients into 4 categories of predicted risk of poor outcome: very high, intermediate high, intermediate low, and very low. We prospectively recruited symptomatic patients within 24 hours of ischemic cerebrovascular events. We measured clinical prognostic variables in each patient. We drew blood soon after admission and measured markers of inflammation, thrombosis, cardiac strain, and cerebral damage. We assessed poor outcome at 3 months with the modified Rankin Scale and recovery of symptoms at 24 hours. We measured the association between blood marker levels and poor outcome after adjustment for stroke severity and age with multivariate logistic regression. Where these associations were statistically significant, we calculated the net reclassification index. We recruited 270 patients with acute ischemic cerebrovascular events. At 3 months, 112 patients had a poor outcome. After adjustment for stroke severity and age, only interleukin-6 and N-terminal pro-brain natriuretic peptide were significantly associated with poor outcome. The addition of either interleukin-6 or N-terminal pro-brain natriuretic peptide to National Institutes of Health Stroke Scale and age did not improve the prediction of a poor outcome. Neither interleukin-6 nor N-terminal pro-brain natriuretic peptide had sufficient predictive power to be of clinical use to predict poor outcome after stroke. The search for better markers to improve the classification of patients across clinically relevant boundaries of predicted probabilities of outcome events needs to continue.

  3. Emergency assistance provided abroad to insured travellers from Australia following the Bali bombing.

    Science.gov (United States)

    Leggat, Peter A; Leggat, Frances W

    2004-02-01

    Background. On 12 October 2002, terrorist bombs detonated in the Kuta entertainment district of Bali, Indonesia, a popular tourist destination for Australian travellers. This study was designed to investigate travel insurance claims reported by travellers from Australia requiring emergency assistance and/or aeromedical evacuation, as well as to examine the role of travel insurance and emergency assistance companies, following the Bali bombing. Methods. In 2003, all claims reported, following the Bali bombing attack on 12 October 2002, to a major Australian travel insurance company were examined for those claims that described the use of the insurer's emergency assistance contractor by travellers in Bali following the bombing. Results. Thirteen insured travellers used the emergency assistance service following the Bali bombing. Six travellers cancelled their trip to Bali. Five travellers, who were already abroad cancelled their trip to Bali and one was given evacuation assistance. One traveller required aeromedical evacuation by scheduled aircraft with glass injuries resulting from the bomb blast, and there was also assistance provided to significant others following the death of one insured traveller as a direct consequence of the bombing. Two travellers sought only claiming and policy advice and no claim was made. The mean refund, where a travel insurance claim was made, was AUD1185.09 (SD=AUD3047.31). Conclusions. This study highlights the importance of travellers taking out appropriate travel insurance, which provides for emergency assistance. Travel insurance agencies do play some role after emergencies such as the Bali bombing. This assistance involves predominantly dealing with cancellation of travellers' intended visits to the affected area, but does also involve some assistance to travellers evacuating from the crisis, including some who require aeromedical evacuation. Travellers should be advised to seek travel health advice well before departure overseas

  4. Suicide in paradise: aftermath of the Bali bombings.

    Science.gov (United States)

    Suryani, L K; Page, A; Lesmana, C B J; Jennaway, M; Basudewa, I D G; Taylor, R

    2009-08-01

    The relationship between the Bali (Indonesia) bombings of October 2002 and suicide has not previously been investigated, despite anecdotal evidence of the economic and psychological consequences of these attacks. Suicide rates were calculated over the period 1994-2006 in three Bali regencies to determine whether suicide increased in the period following the first Bali bombings. Poisson regression and time-series models were used to assess the change in suicide rates by sex, age and area in the periods before and after October 2002. Suicide rates (age-adjusted) increased in males from an average of 2.84 (per 100 000) in the period pre-2002 to 8.10 in the period post-2002, and for females from 1.51 to 3.68. The greatest increases in suicide in the post-2002 period were in the age groups 20-29 and 60 years, for both males and females. Tourist arrivals fell significantly after the bombings, and addition of tourism to models reduced relative risk estimates of suicide, suggesting that some of the increase may be attributable to the socio-economic effects of declines in tourism. There was an almost fourfold increase in male suicide risk and a threefold increase in female suicide risk in the period following the 2002 bombings in Bali. Trends in tourism did not account for most of the observed increases. Other factors such as indirect socio-economic effects and Balinese notions of collective guilt and anxieties relating to ritual neglect are important in understanding the rise in suicide in the post-2002 period.

  5. Management, prognosis and predictors of unfavourable outcomes in patients newly hospitalized for transient ischemic attack: a real-world investigation from Italy.

    Science.gov (United States)

    Corrao, Giovanni; Rea, Federico; Merlino, Luca; Mazzola, Paolo; Annoni, Federico; Annoni, Giorgio

    2017-01-19

    Understanding the gap between evidence-based recommendations and real-world management is important to inform priority setting and health service planning. The 7,776 residents in the Italian Lombardy Region who were newly hospitalized for transient ischemic attack (TIA) during 2008-2009 entered into the cohort and were followed until 2012. Exposure to medical care including selected drugs, diagnostic procedures and laboratory tests was recorded. A composite outcome was employed taking into account all-cause death and hospitalization for stroke and acute myocardial infarction. A multivariable proportional hazards model was fitted to estimate hazard ratio, and 95% confidence intervals (CI), for the exposure-outcome association. During the first year after discharge, 8.6, 49.7 and 48.5% of patients did not use any drugs, diagnostic procedures and laboratory tests respectively. Patients exposed to medical care had 59% reduced risk (95% CI, 50 to 66%) with respect to those who did not use any of these services. Although the Italian National Health System supplies universal coverage for healthcare, several TIA patients receive suboptimal care. Systematic improvements are necessary in order to improve patient outcomes.

  6. Pure Nuclear Fusion Bomb Propulsion

    OpenAIRE

    Winterberg, F.

    2008-01-01

    Recent progress towards the non-fission ignition of thermonuclear micro-explosions raises the prospect for a revival of the nuclear bomb propulsion idea, both for the fast transport of large payloads within the solar system and the launch into earth orbit without the release of fission products into the atmosphere. To reach this goal three areas of research are of importance: 1)Compact thermonuclear ignition drivers. 2)Fast ignition and deuterium burn. 3)Space-craft architecture involving mag...

  7. Association of Acute Radiation Syndrome and Rain after the Bombings in Atomic Bomb Survivors.

    Science.gov (United States)

    Ozasa, K; Sakata, R; Cullings, H M; Grant, E J

    2016-06-01

    Acute radiation-induced symptoms reported in survivors after the atomic bombings in Hiroshima and Nagasaki have been suspected to be associated with rain that fell after the explosions, but this association has not been evaluated in an epidemiological study that considers the effects of the direct dose from the atomic bombs and other factors. The aim of this study was to evaluate this association using information from a fixed cohort, comprised of 93,741 members of the Life Span Study who were in the city at the time of the bombing. Information on acute symptoms and exposure to rain was collected in surveys conducted by interviewers, primarily in the 1950s. The proportion of survivors developing severe epilation was around 60% at levels of direct radiation doses of 3 Gy or higher and less than 0.2% at levels <0.005 Gy regardless of reported rain exposure status. The low prevalence of acute symptoms at low direct doses indicates that the reported fallout rain was not homogeneously radioactive at a level sufficient to cause a substantial probability of acute symptoms. We observed that the proportion of reported acute symptoms was slightly higher among those who reported rain exposure in some subgroups, however, suggestions that rain was the cause of these reported symptoms are not supported by analyses specific to the known areas of radioactive fallout. Misclassification of exposure and outcome, including symptoms due to other causes and recall bias, appears to be a more plausible explanation. However, the insufficient and retrospective nature of the available data limited our ability to quantify the attribution to those possible causes.

  8. Modelling vapour transport in Surtseyan bombs

    Science.gov (United States)

    McGuinness, Mark J.; Greenbank, Emma; Schipper, C. Ian

    2016-05-01

    We address questions that arise if a slurry containing liquid water is enclosed in a ball of hot viscous vesicular magma ejected as a bomb in the context of a Surtseyan eruption. We derive a mathematical model for transient changes in temperature and pressure due to flashing of liquid water to vapour inside the bomb. The magnitude of the transient pressure changes that are typically generated are calculated together with their dependence on material properties. A single criterion to determine whether the bomb will fragment as a result of the pressure changes is derived. Timescales for ejection of water vapour from a bomb that remains intact are also revealed.

  9. Earthquakes induced by deep penetrating bombing?

    Institute of Scientific and Technical Information of China (English)

    Serguei Yu. Balassanian

    2005-01-01

    The data of M≥5 earthquakes occurred in one year before and after 4 deep penetrating bombs in the region within 500 km and 1 000 km from the shooting site are presented. The 4 bombs are those happened in 1999 Kosovo of Yugoslavia, the 1991 Baghdad of Iraq, the 2001 Tora Bora of Afghanistan, and the 2003 Kirkuk of Iraq, respectively. The data indicate that the deep penetrating bombs may have remotely triggered some earthquakes. The deep penetrating bombs in seismically active regions should be forbidden.

  10. Cardiac Outcomes After Ischemic Stroke or Transient Ischemic Attack: Effects of Pioglitazone in Patients With Insulin Resistance Without Diabetes Mellitus.

    Science.gov (United States)

    Young, Lawrence H; Viscoli, Catherine M; Curtis, Jeptha P; Inzucchi, Silvio E; Schwartz, Gregory G; Lovejoy, Anne M; Furie, Karen L; Gorman, Mark J; Conwit, Robin; Abbott, J Dawn; Jacoby, Daniel L; Kolansky, Daniel M; Pfau, Steven E; Ling, Frederick S; Kernan, Walter N

    2017-05-16

    Insulin resistance is highly prevalent among patients with atherosclerosis and is associated with an increased risk for myocardial infarction (MI) and stroke. The IRIS trial (Insulin Resistance Intervention after Stroke) demonstrated that pioglitazone decreased the composite risk for fatal or nonfatal stroke and MI in patients with insulin resistance without diabetes mellitus, after a recent ischemic stroke or transient ischemic attack. The type and severity of cardiac events in this population and the impact of pioglitazone on these events have not been described. We performed a secondary analysis of the effects of pioglitazone, in comparison with placebo, on acute coronary syndromes (MI and unstable angina) among IRIS participants. All potential acute coronary syndrome episodes were adjudicated in a blinded fashion by an independent clinical events committee. The study cohort was composed of 3876 IRIS participants, mean age 63 years, 65% male, 89% white race, and 12% with a history of coronary artery disease. Over a median follow-up of 4.8 years, there were 225 acute coronary syndrome events, including 141 MIs and 84 episodes of unstable angina. The MIs included 28 (19%) with ST-segment elevation. The majority of MIs were type 1 (94, 65%), followed by type 2 (45, 32%). Serum troponin was 10× to 100× upper limit of normal in 49 (35%) and >100× upper limit of normal in 39 (28%). Pioglitazone reduced the risk of acute coronary syndrome (hazard ratio, 0.71; 95% confidence interval, 0.54-0.94; P=0.02). Pioglitazone also reduced the risk of type 1 MI (hazard ratio, 0.62; 95% confidence interval, 0.40-0.96; log-rank P=0.03), but not type 2 MI (hazard ratio, 1.05; 95% confidence interval, 0.58-1.91; P=0.87). Similarly, pioglitazone reduced the risk of large MIs with serum troponin >100× upper limit of normal (hazard ratio, 0.44; 95% confidence interval, 0.22-0.87; P=0.02), but not smaller MIs. Among patients with insulin resistance without diabetes mellitus

  11. Trends in management and outcome of hospitalized patients with acute stroke and transient ischemic attack: the National Acute Stroke Israeli (NASIS) registry.

    Science.gov (United States)

    Tanne, David; Koton, Silvia; Molshazki, Noa; Goldbourt, Uri; Shohat, Tamar; Tsabari, Rakefet; Grossman, Ehud; Bornstein, Natan M

    2012-08-01

    Improving stroke management, guideline adherence, and outcome is a global priority. Our aim was to examine trends in nationwide use of reperfusion therapy, stroke in-hospital management, and outcome. Data were based on the triennial 2-month period of the National Acute Stroke Israeli registry (February to March 2004, March to April 2007, April to May 2010). The registry includes unselected patients admitted to all hospitals nationwide. There were in total 6279 patients: ischemic stroke, 4452 (70.9%); intracerebral hemorrhage, 485 (7.7%); undetermined stroke, 97 (1.6%); and transient ischemic attacks, 1245 (19.8%). Overall use of reperfusion therapy for acute ischemic stroke increased from 0.4% in 2004% to 5.9% in 2010 (Pischemic events increased from 2.1% in 2004% to 16.6% in 2010 (Pstroke patient volumes. In-hospital mortality after acute ischemic stroke decreased from 7.2% in 2004 to 3.9% in 2010 (Pstroke registry, use of reperfusion therapy, vascular imaging, and statins is steadily increasing, whereas in-hospital mortality is decreasing.

  12. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  13. Poor Long-Term Functional Outcome After Stroke Among Adults Aged 18 to 50 Years: Follow-Up of Transient Ischemic Attack and Stroke Patients and Unelucidated Risk Factor Evaluation (FUTURE) Study

    NARCIS (Netherlands)

    Synhaeve, N.E.; Arntz, R.M.; Maaijwee, N.A.M.M.; Rutten-Jacobs, L.C.A.; Schoonderwaldt, H.C.; Dorresteijn, L.D.A.; Kort, P.L.M. de; Dijk, E.J. van; Leeuw, F.E. de

    2014-01-01

    BACKGROUND AND PURPOSE: Stroke in young adults has a dramatic effect on life; therefore, we investigated the long-term functional outcome after transient ischemic attack, ischemic stroke, or intracerebral hemorrhage in adults aged 18 to 50 years. METHODS: We studied 722 young patients with first-eve

  14. The grave is wide: the Hibakusha of Hiroshima and Nagasaki and the legacy of the Atomic Bomb Casualty Commission and the Radiation Effects Research Foundation.

    Science.gov (United States)

    O'Malley, Gerald F

    2016-07-01

    Following the atomic bomb attacks on Japan in 1945, scientists from the United States and Japan joined together to study the Hibakusha - the bomb affected people in what was advertised as a bipartisan and cooperative effort. In reality, despite the best efforts of some very dedicated and earnest scientists, the early years of the collaboration were characterized by political friction, censorship, controversy, tension, hostility, and racism. The 70-year history, scientific output and cultural impact of the Atomic Bomb Casualty Commission and the Radiation Effects Research Foundation are described in the context of the development of Occupied Japan.

  15. Pure Nuclear Fusion Bomb Propulsion

    CERN Document Server

    Winterberg, F

    2008-01-01

    Recent progress towards the non-fission ignition of thermonuclear micro-explosions raises the prospect for a revival of the nuclear bomb propulsion idea, both for the fast transport of large payloads within the solar system and the launch into earth orbit without the release of fission products into the atmosphere. To reach this goal three areas of research are of importance: 1)Compact thermonuclear ignition drivers. 2)Fast ignition and deuterium burn. 3)Space-craft architecture involving magnetic insulation and GeV electrostatic potentials

  16. Glaucoma in atomic bomb survivors.

    Science.gov (United States)

    Kiuchi, Yoshiaki; Yokoyama, Tomoko; Takamatsu, Michiya; Tsuiki, Eiko; Uematsu, Masafumi; Kinoshita, Hirofumi; Kumagami, Takeshi; Kitaoka, Takashi; Minamoto, Atsushi; Neriishi, Kazuo; Nakashima, Eiji; Khattree, Ravindra; Hida, Ayumi; Fujiwara, Saeko; Akahoshi, Masazumi

    2013-10-01

    Radiation has been associated with increases in noncancerous diseases. An effect of low-dose radiation on the prevalence of clinically detected glaucoma has not been previously reported. We therefore investigated the prevalence of glaucoma in A-bomb survivors and its possible association with radiation dose. A total of 1,589 people who participated in the clinical examination program for A-bomb survivors at the Radiation Effects Research Foundation (RERF) between October 2006 and September 2008 and who had reconstructed radiation doses, were recruited into this cross-sectional screening study. The prevalence of glaucoma and its dose-response relationship to A-bomb radiation were measured. Each subject underwent an initial screening consisting of an interview and ophthalmological examination. Questionable cases with any indication of ocular disease, including glaucoma, were referred to local hospitals for more comprehensive evaluation. A diagnosis of glaucoma was made based on specific optic disc appearance, perimetric results and other ocular findings. Of 1,589 eligible people, we detected 284 (17.9%) cases of glaucoma overall, including 36 (2.3%) cases of primary open-angle glaucoma with intraocular pressure levels greater than 21 mmHg, 226 (14.2%) cases of normal-tension glaucoma and 25 (1.6%) cases of primary angle-closure glaucoma. Seven glaucoma risk factors were examined as potential confounders but only two needed to be included in the final model. Binary regression using a generalized estimating equation method, with adjustment for gender, age, city, cataract surgery or diabetes mellitus, revealed an odds ratio at 1 Gy of 1.31 (95% confidence interval 1.11-1.53, P = 0.001) in the case of normal-tension glaucoma, but no association for other types of glaucoma. The prevalence of normal-tension glaucoma may increase with A-bomb radiation dose, but uncertainties associated with nonparticipation (59% participation) suggest caution in the interpretation of these

  17. Hiroshima: Perspectives on the Atomic Bombing.

    Science.gov (United States)

    Cheng, Amy

    In this curriculum module students analyze both U.S. and Japanese perspectives of the atomic bombing of Hiroshima. The activities integrate Howard Gardner's work on multiple intelligences. The module is recommended as a supplement to textbook coverage of the war in the Pacific and of the atomic bombing of Hiroshima. It can be used to support both…

  18. The toxicology of zinc chloride smoke producing bombs and screens.

    Science.gov (United States)

    El Idrissi, Ayman; van Berkel, Lisanne; Bonekamp, Nadia E; Dalemans, Diana J Z; van der Heyden, Marcel A G

    2017-03-01

    Zinc chloride (ZnCl2)-based smoke bombs and screens are in use since the Second World War (1939-1945). Many case descriptions on ZnCl2 smoke inhalation incidents appeared since 1945. We provide a comprehensive overview of the clinical symptoms and underlying pathophysiology due to exposure to fumes from ZnCl2 smoke producing bombs. In addition, we give a historical overview of treatment regimens and their outcomes. We performed a literature search on Medline, Scopus and Google Scholar databases using combinations of the following search terms "smoke bomb", "smoke screen", "ZnCl2", "intoxication", "poisoning", "case report", "HE smoke", "hexachloroethane smoke", "smoke inhalation" and "white smoke". We retrieved additional reports based on the primary hits. We collected 30 case reports from the last seven decades encompassing 376 patients, 23 of whom died. Of all the patient descriptions, 31 were of sufficient detail for prudent analysis. Intoxication with clinical signs mainly took place in war situations and in military and fire emergency training sessions in enclosed spaces. Symptoms follow a biphasic course mainly characterised by dyspnoea, coughing and lacrimation, related to irritation of the airways in the first six hours, followed by reappearance of early signs complemented with inflammation related signs and tachycardia from 24 h onwards. Acute respiratory stress syndrome developed in severely affected individuals. Chest radiographs did not always correspond with clinical symptoms. Common therapy comprises corticosteroids, antibiotics and supplemental oxygen or positive pressure ventilation in 64% of the cases. Of the 31 patients included, eight died, three had permanent lung damage and 15 showed complete recovery, whereas in five patients outcome was not reported. Early signs likely relate to caustic reactions in the airway lining, whereas inhaled ZnCl2 particles may trigger an inflammatory response and associated delayed fibrotic lung damage. Smoke bomb

  19. The Bombing of Air India Flight 182: Demanding Justice, Public Inquiries, and Acts of Citizenship

    OpenAIRE

    Singh, Milan

    2015-01-01

    On June 23, 1985 Air India Flight 182 exploded over the Irish Sea, killing all 329 people onboard the aircraft The attack was planned and executed on Canadian soil, and the majority of passengers were Canadian citizens. Canadian authorities failed to effectively investigate the bombing, and provide families of the victims with adequate support for the traumatic losses they underwent (Air India Inquiry Report, 2010). This is despite families’ repeatedly demanding the Canadian government for ...

  20. Fatal and non-fatal injuries among U.S. Air Force personnel resulting from the terrorist bombing of the Khobar Towers.

    Science.gov (United States)

    Thompson, Donald; Brown, Sheryll; Mallonee, Sue; Sunshine, Douglas

    2004-08-01

    Culminating with the events of September 11, 2001, U.S. civilian and military populations are vulnerable to terrorist attacks. Information about the patterns of injuries and their causes inform disaster management planning and can improve structural and architectural design. This report documents the injuries following an estimated 20K bomb at the Khobar Towers military compound in Dhahran, Saudi Arabia. US Air Force personnel in the compound at the time of the bombing were evaluated. Data were collected through a mail survey, and a review of military medical records and autopsy reports. Outcome measures included injury types, treatment status, severity, and causes of injuries. The study identified 574 persons who were injured in the bombing; 19 persons died. A total of 420 (73%) persons were injured directly in the blast and 154 (27%) persons were injured during evacuation, search and rescue, during cleanup, or sustained only auditory or inhalation trauma. Sixteen percent of survivors injured directly in the blast were hospitalized; 6% were critical. Soft tissue and foreign body injuries of the lower extremities were the most common injuries among survivors, most often caused by glass. Persons who died suffered extensive, multiple injuries from blunt trauma and one death was caused by glass. All deaths were immediate and the majority of survivors suffered minor to moderate injuries. Injuries and deaths were consistent with extensive glass damage in the compound and fragmentation of building concrete. Improved building designs and retrofits such as blast-resistant glass and prevention of structural collapse or building fragmentation should be considered in building design and construction in high threat areas.

  1. Resilience among Japanese atomic bomb survivors.

    Science.gov (United States)

    Knowles, A

    2011-03-01

    The purpose of the study was to explore the experience of atomic bomb survivors from Hiroshima and Nagasaki. Never has the world experienced such extreme devastation as with the atomic bombings of Hiroshima and Nagasaki, Japan, in August 1945. Although significant quantitative research has been completed about the medical effects following radiation, the literature lacks qualitative exploration from a holistic health perspective. This was a qualitative descriptive study, using methods of narrative analysis, oral history and ethnography. The sample for this research included eight individuals who were exposed to the atomic bombings in Japan and currently reside in the United States. Findings provide insight to the resilience that the survivors exhibited immediately following the bomb, as well as throughout the 65 years following the event. From ethnographic data and interviews with survivors, a thematic structure was developed that depicts the essential elements of the atomic bomb experience. Two ways of being in the world followed the bombing: surviving and thriving, with resilience serving as a lever, allowing for fluid movement over time across the continuum. Individuals experiencing surviving exhibited anxiety about their personal and family members' health, expressed mistrust, and felt a stigma associated with being a survivor. For those who were thriving, peace activism, overcoming and forgiveness were typically displayed. Findings from this study add to the disaster nursing literature and highlight the role resilience plays in the atomic bomb survivors' life perspective. © 2011 The Author. International Nursing Review © 2011 International Council of Nurses.

  2. Pros and cons on ''Hitlers' bomb''. Studies on nuclear research in Germany; Fuer und Wider ''Hitlers Bombe''. Studien zur Atomforschung in Deutschland

    Energy Technology Data Exchange (ETDEWEB)

    Karlsch, R.; Petermann, H. (eds.)

    2007-07-01

    This book reveals a sensation: Under supervision of the SS German scientists tested 1944/45 nuclear bombs on Ruegen and in Thuringia. During this period several hundred prisoners of war and prisoners died. Besides proofs for nuclear weapon testing the author also found a draft for a patent on plutonium bombs and discovered the first functioning German atom reactor in the environs of Berlin. The succeeding book titled above enlarges the spectra of contributions from Saenger PLan to attack New York, researches on minimization of critical mass, the attempt to calculate TNT-equivalence as the presentation of important acteurs occuring during the researches. (GL)

  3. Yale and the Atomic Bomb Casualty Commission.

    Science.gov (United States)

    Bowers, J. Z.

    1983-01-01

    This is a description, based largely on personal discussions, of the contributions of men from the Yale University School of Medicine to the saga of the immediate and long-term studies on the medical effects of the atomic bombs at Hiroshima and Nagasaki. They played key roles in the immediate studies of bomb effects, in the creation of long-term studies of delayed effects, and in elevating the Atomic Bomb Casualty Commission after 1955 to a position of excellence in its studies and relations with the Japanese. The accumulation of the information presented in this paper derives from research for the preparation of the history of the Atomic Bomb Casualty Commission. In 1975, the commission was passed to Japanese leadership as the Radiation Effects Research Foundation. PMID:6349145

  4. UV spectra, bombs, and the solar atmosphere

    CERN Document Server

    Judge, Philip G

    2015-01-01

    A recent analysis of UV data from the Interface Region Imaging Spectrograph {\\em IRIS} reports plasma "bombs" with temperatures near \\hot{} within the solar photosphere. This is a curious result, firstly because most bomb plasma pressures $p$ (the largest reported case exceeds $10^3$ dyn~cm$^{-2}$) fall well below photospheric pressures ($> 7\\times10^3$), and secondly, UV radiation cannot easily escape from the photosphere. In the present paper the {\\em IRIS} data is independently analyzed. I find that the bombs arise from plasma originally at pressures between $\\lta80$ and 800 dyne~cm$^{-2}$ before explosion, i.e. between $\\lta850$ and 550 km above $\\tau_{500}=1$. This places the phenomenon's origin in the low-mid chromosphere or above. I suggest that bomb spectra are more compatible with Alfv\\'enic turbulence than with bi-directional reconnection jets.

  5. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  6. Bombs, flyin' high. In-flight dynamics of volcanic bombs from Strombolian to Vulcanian eruptions.

    Science.gov (United States)

    Taddeucci, Jacopo; Alatorre, Miguel; Cruz Vázquez, Omar; Del Bello, Elisabetta; Ricci, Tullio; Scarlato, Piergiorgio; Palladino, Danilo

    2016-04-01

    Bomb-sized (larger than 64 mm) pyroclasts are a common product of explosive eruptions and a considerable source of hazard, both from directly impacting on people and properties and from wildfires associated with their landing in vegetated areas. The dispersal of bombs is mostly modeled as purely ballistic trajectories controlled by gravity and drag forces associated with still air, and only recently other effects, such as the influence of eruption dynamics, the gas expansion, and in-flight collisions, are starting to be quantified both numerically and observationally. By using high-speed imaging of explosive volcanic eruptions here we attempt to calculate the drag coefficient of free-flying volcanic bombs during an eruption and at the same time we document a wide range of in-flight processes affecting bomb trajectories and introducing deviations from purely ballistic emplacement. High-speed (500 frames per second) videos of explosions at Stromboli and Etna (Italy), Fuego (Gatemala), Sakurajima (Japan), Yasur (Vanuatu), and Batu Tara (Indonesia) volcanoes provide a large assortment of free-flying bombs spanning Strombolian to Vulcanian source eruptions, basaltic to andesitic composition, centimeters to meters in size, and 10 to 300 m/s in fly velocity. By tracking the bombs during their flying trajectories we were able to: 1) measure their size, shape, and vertical component of velocity and related changes over time; and 2) measure the different interactions with the atmosphere and with other bombs. Quantitatively, these data allow us to provide the first direct measurement of the aerodynamic behavior and drag coefficient of volcanic bombs while settling, also including the effect of bomb rotation and changes in bomb shape and frontal section. We also show how our observations have the potential to parameterize a number of previously hypothesized and /or described but yet unquantified processes, including in-flight rotation, deformation, fragmentation, agglutination

  7. Boosting Belligerence: How the July 7, 2005, London Bombings Affected Liberals' Moral Foundations and Prejudice.

    Science.gov (United States)

    Van de Vyver, Julie; Houston, Diane M; Abrams, Dominic; Vasiljevic, Milica

    2016-02-01

    Major terrorist events, such as the recent attacks in Ankara, Sinai, and Paris, can have profound effects on a nation's values, attitudes, and prejudices. Yet psychological evidence testing the impact of such events via data collected immediately before and after an attack is understandably rare. In the present research, we tested the independent and joint effects of threat (the July 7, 2005, London bombings) and political ideology on endorsement of moral foundations and prejudices among two nationally representative samples (combined N = 2,031) about 6 weeks before and 1 month after the London bombings. After the bombings, there was greater endorsement of the in-group foundation, lower endorsement of the fairness-reciprocity foundation, and stronger prejudices toward Muslims and immigrants. The differences in both the endorsement of the foundations and the prejudices were larger among people with a liberal orientation than among those with a conservative orientation. Furthermore, the changes in endorsement of moral foundations among liberals explained their increases in prejudice. The results highlight the value of psychological theory and research for understanding societal changes in attitudes and prejudices after major terrorist events.

  8. The story of an A-bomb by Oppenheimer

    Energy Technology Data Exchange (ETDEWEB)

    Song, Eun Yeong

    2005-06-15

    This book concentrates on an A-bomb by Oppenheimer. It is divided into eleven class, which are exile of excellent scientists, uranium atomic fission, situation the U.S. and Germany I, situation the U.S. and Germany II, air strike in pearl Harbor, plan for development of an A-bomb, military action to blow up heavy water plant, select on spot to drop an A-bomb, surrender and drop for an A-bomb and science of an A-bomb. This book is written to explain an A-bomb with form of storytelling.

  9. When the Japanese Bombed the Huertgen Forest: How the Army’s Investigation of Pearl Harbor Influenced the Outcome of the Huertgen Forest, Major General Leonard T. Gerow and His Command of V Corps from 1943-1945

    Science.gov (United States)

    2011-05-19

    disassociation by long time friends and superiors was a terrible blow to his ego and confidence to lead. Gerow, who prior to the investigation, thought he...Corps commander was more demur than Eisenhower’s. He described Gerow as “conscientious, self -confident and steady.”77 His words of endorsement were...38 November and had only entered the line a week prior the German attack.116 Its initial task was to occupy a quiet sector of the American front

  10. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  11. Clinical features and prognosis of patients with myelodysplastic syndromes who were exposed to atomic bomb radiation in Nagasaki.

    Science.gov (United States)

    Matsuo, Masatoshi; Iwanaga, Masako; Kondo, Hisayoshi; Soda, Midori; Jo, Tatsuro; Horio, Kensuke; Takasaki, Yumi; Kawaguchi, Yasuhisa; Tsushima, Hideki; Imaizumi, Yoshitaka; Imanishi, Daisuke; Taguchi, Jun; Sawayama, Yasushi; Hata, Tomoko; Miyazaki, Yasushi

    2016-10-01

    There is evidence that radiation exposure is a causative factor of myelodysplastic syndromes (MDS). However, little is known about whether radiation exposure is also a prognostic factor of MDS. We investigated the impact of radiation exposure on the prognosis of MDS in Nagasaki atomic bomb survivors using the International Prognostic Scoring System (IPSS) and the revised version (IPSS-R). Subjects were 140 patients with primary MDS diagnosed between 1985 and 2011 and evaluable for IPSS, IPSS-R, and exposure distance. Of those, 31 were exposed at atomic bomb survivors, but exposure distance was not associated with any poor outcomes. These suggest that exposure to the greater dose of atomic bomb radiation is associated with developing poor cytogenetic abnormalities in MDS, which might consequently lead to overt leukemia among atomic bomb survivors. © 2016 The Authors. Cancer Science published by John Wiley & Sons Australia, Ltd on behalf of Japanese Cancer Association.

  12. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  13. Media's role in broadcasting acute stress following the Boston Marathon bombings.

    Science.gov (United States)

    Holman, E Alison; Garfin, Dana Rose; Silver, Roxane Cohen

    2014-01-07

    We compared the impact of media vs. direct exposure on acute stress response to collective trauma. We conducted an Internet-based survey following the Boston Marathon bombings between April 29 and May 13, 2013, with representative samples of residents from Boston (n = 846), New York City (n = 941), and the remainder of the United States (n = 2,888). Acute stress symptom scores were comparable in Boston and New York [regression coefficient (b) = 0.43; SE = 1.42; 95% confidence interval (CI), -2.36, 3.23], but lower nationwide when compared with Boston (b = -2.21; SE = 1.07; 95% CI, -4.31, -0.12). Adjusting for prebombing mental health (collected prospectively), demographics, and prior collective stress exposure, six or more daily hours of bombing-related media exposure in the week after the bombings was associated with higher acute stress than direct exposure to the bombings (continuous acute stress symptom total: media exposure b = 15.61 vs. direct exposure b = 5.69). Controlling for prospectively collected prebombing television-watching habits did not change the findings. In adjusted models, direct exposure to the 9/11 terrorist attacks and the Sandy Hook School shootings were both significantly associated with bombing-related acute stress; Superstorm Sandy exposure wasn't. Prior exposure to similar and/or violent events may render some individuals vulnerable to the negative effects of collective traumas. Repeatedly engaging with trauma-related media content for several hours daily shortly after collective trauma may prolong acute stress experiences and promote substantial stress-related symptomatology. Mass media may become a conduit that spreads negative consequences of community trauma beyond directly affected communities.

  14. AFSC/REFM: Bomb-produced age validation study

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Fish age validation with bomb-produced radiocarbon (14C) requires a known-age Delta14C reference chronology spanning the era of a marine increase in bomb-produced...

  15. Exposure to an atomic bomb explosion is a risk factor for in-hospital death after esophagectomy to treat esophageal cancer.

    Science.gov (United States)

    Nakashima, Y; Takeishi, K; Guntani, A; Tsujita, E; Yoshinaga, K; Matsuyama, A; Hamatake, M; Maeda, T; Tsutsui, S; Matsuda, H; Ishida, T

    2015-01-01

    Esophagectomy, one of the most invasive of all gastrointestinal operations, is associated with a high frequency of postoperative complications and in-hospital mortality. The purpose of the present study was to determine whether exposure to the atomic bomb explosion at Hiroshima in 1945 might be a preoperative risk factor for in-hospital mortality after esophagectomy in esophageal cancer patients. We thus reviewed the outcomes of esophagectomy in 31 atomic bomb survivors with esophageal cancer and 96 controls (also with cancer but without atomic bomb exposure). We compared the incidences of postoperative complications and in-hospital mortality. Of the clinicopathological features studied, mean patient age was significantly higher in atomic bomb survivors than in controls. Of the postoperative complications noted, atomic bomb survivors experienced a longer mean period of endotracheal intubation and higher incidences of severe pulmonary complications, severe anastomotic leakage, and surgical site infection. The factors associated with in-hospital mortality were exposure to the atomic bomb explosion, pulmonary comorbidities, and electrocardiographic abnormalities. Multivariate analysis revealed that exposure to the atomic bomb explosion was an independent significant preoperative risk factor for in-hospital mortality. Exposure to the atomic bomb explosion is thus a preoperative risk factor for in-hospital death after esophagectomy to treat esophageal cancer. © 2013 Wiley Periodicals, Inc. and the International Society for Diseases of the Esophagus.

  16. A-bomb radiation effects digest

    Energy Technology Data Exchange (ETDEWEB)

    Shigematsu, Itsuzo; Akiyama, Mitoshi; Sasaki, Hideo (Radiation Effects Research Foundation, Hiroshima (Japan)); Ito, Chikako; Kamada, Nanao.

    1993-01-01

    This publication is the digest of the book 'Genbaku Hoshasen no Jintai Eikyo (Effects of A-bomb Radiation on the Human Body)' (365p.), published in Japanese by Hiroshima International Council for Medical Care of the Radiation-Exposed. Following a brief description on the damage of the atomic bomb, the subjects of malignant tumors, endocrine and metabolic deseases, ocular lesions, dermatologic effects, prenatal exposure, chromosoal aberrations, mutations, sensitivity to radiation, immune function, genetic effects and other effects of radiation are summarized. (J.P.N.).

  17. Terror, tortur og den tikkende bombe

    DEFF Research Database (Denmark)

    Dige, Morten

    2012-01-01

    The so-called "war on terror" has renewed the interest in torture in practice as well as in theory. The philosophical debate about possible justifications for torture has to a large extent revolved about the ticking bomb scenario: would it be justified to torture a terrorist in order to prevent...... a catastrophe? I criticize arguments based on ticking bomb scenarios in two steps. First, I show that exceptional resort to torture will not be possible in the situations where it is most needed. Second, I state several pragmatic as well as principled objections against a state sanctioned or tolerated practice...

  18. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  19. A comparison of clinicopathological features and prognosis in prostate cancer between atomic bomb survivors and control patients.

    Science.gov (United States)

    Shoji, Koichi; Teishima, Jun; Hayashi, Tetsutaro; Shinmei, Shunsuke; Akita, Tomoyuki; Sentani, Kazuhiro; Takeshima, Yukio; Arihiro, Koji; Tanaka, Junko; Yasui, Wataru; Matsubara, Akio

    2017-07-01

    An atomic bomb (A-bomb) was dropped on Hiroshima on 6th August 1945. Although numerous studies have investigated cancer incidence and mortality among A-bomb survivors, only a small number have addressed urological cancer in these survivors. The aim of the present study was to investigate the clinicopathological features of prostate cancer (PCa) in A-bomb survivors. The clinicopathological features and prognosis of PCa were retrospectively reviewed in 212 survivors and 595 control patients between November 1996 and December 2010. The histopathological and clinical outcomes of surgical treatment of PCa were also evaluated in 69 survivors and 162 control patients. Despite the higher age at diagnosis compared with the control group (P=0.0031), survivors were more likely to have been diagnosed with PCa from a health check compared with the control group (Pbomb exposure was not found to be an independent predictor for prognosis by multivariate analysis (OS, P=0.7800; CS, P=0.8688). The clinicopathological features of patients who underwent a prostatectomy were similar except for the diagnosis opportunity between the two groups. Progression-free survival rates were similar between the two groups (P=0.5630). A-bomb exposure was not a significant and independent predictor for worsening of progression-free prognosis by multivariate analysis (P=0.3763). A-bomb exposure does not appear to exert deleterious effects on the biological aggressiveness of PCa and the prognosis of patients with PCa.

  20. Future population of atomic bomb survivors in Nagasaki.

    Science.gov (United States)

    Yokota, Kenichi; Mine, Mariko; Shibata, Yoshisada

    2013-01-01

    The Nagasaki University Atomic Bomb Survivor Database, which was established in 1978 for elucidating the long-term health effects of the atomic bombing, has registered since 1970 about 120,000 atomic bomb survivors with a history of residence in Nagasaki city. Since the number of atomic bomb survivors has steadily been decreasing, prediction of future population is important for planning future epidemiologic studies, and we tried to predict the population of atomic bomb survivors in Nagasaki city from 2008 to 2030. In addition, we evaluated our estimated population comparing with the actual number from 2008 to 2011.

  1. Hurricane Ike versus an Atomic Bomb

    Science.gov (United States)

    Pearson, Earl F.

    2013-01-01

    The destructive potential of one of nature's most destructive forces, the hurricane, is compared to one of human's most destructive devices, an atomic bomb. Both can create near absolute devastation at "ground zero". However, how do they really compare in terms of destructive energy? This discussion compares the energy, the…

  2. Terror, tortur og den tikkende bombe

    DEFF Research Database (Denmark)

    Dige, Morten

    2012-01-01

    a catastrophe? I criticize arguments based on ticking bomb scenarios in two steps. First, I show that exceptional resort to torture will not be possible in the situations where it is most needed. Second, I state several pragmatic as well as principled objections against a state sanctioned or tolerated practice...

  3. Development of A-bomb survivor dosimetry

    Energy Technology Data Exchange (ETDEWEB)

    Kerr, G.D.

    1995-12-31

    An all important datum in risk assessment is the radiation dose to individual survivors of the bombings in Hiroshima and Nagasaki. The first set of dose estimates for survivors was based on a dosimetry system developed in 1957 by the Oak Ridge National Laboratory (ORNL). These Tentative 1957 Doses (T57D) were later replaced by a more extensive and refined set of Tentative 1965 Doses (T65D). The T65D system of dose estimation for survivors was also developed at ORNL and served as a basis for risk assessment throughout the 1970s. In the late 1970s, it was suggested that there were serious inadequacies with the T65D system, and these inadequacies were the topic of discussion at two symposia held in 1981. In early 1983, joint US- Japan research programs were established to conduct a thorough review of all aspects of the radiation dosimetry for the Hiroshima and Nagasaki A-bomb survivors. A number of important contributions to this review were made by ORNL staff members. The review was completed in 1986 and a new Dosimetry System 1986 (DS86) was adopted for use. This paper discusses the development of the various systems of A-bomb survivor dosimetry, and the status of the current DS86 system as it is being applied in the medical follow-up studies of the A-bomb survivors and their offspring.

  4. Bomb apologetics: Farm Hall, August 1945

    Energy Technology Data Exchange (ETDEWEB)

    Bernstein, J. [Professor of Physics at Stevens Institute of Technology in Hoboken New Jersey (United States); Cassidy, D. [Professor at Hofstra University, in Hempstead, New York (United States)

    1995-08-01

    On hearing the news from Hiroshima, the incredulous internees came up with a self-serving story to explain their failures in nucleus research: To keep Hitler from winning, they had deliberately not developed the atomic bomb. {copyright} 1995 {ital American} {ital Institute} {ital of} {ital Physics}.

  5. Hurricane Ike versus an Atomic Bomb

    Science.gov (United States)

    Pearson, Earl F.

    2013-01-01

    The destructive potential of one of nature's most destructive forces, the hurricane, is compared to one of human's most destructive devices, an atomic bomb. Both can create near absolute devastation at "ground zero". However, how do they really compare in terms of destructive energy? This discussion compares the energy, the…

  6. Prophylaxis for blood-borne diseases during the London 7/7 mass casualty terrorist bombing: a review and the role of bioethics.

    Science.gov (United States)

    Edwards, Dafydd S; Barnett-Vanes, A; Narayan, N; Patel, H D L

    2016-10-01

    The suicide bombings in London on 7 July 2005 resulted in a mass casualty situation. Over 50% of casualties were treated at the Royal London Hospital where clinicians witnessed large numbers of severely injured patients. In some casualties human biological foreign material was found embedded in the soft tissue originating from the suicide bombers or other casualties. This had the potential of placing individuals at risk of transmission of blood-borne diseases. Advances in the fields of medicine and biology have led to increased survivorship in the context of trauma and mass casualty incidents. This has resulted in the emergence of ethical scenarios surrounding patient management. A systematic review of the literature of the 7/7 bombings, and suicide bombings reported globally, where biological implantation is noted, was performed to examine the medicolegal issues arising during such attack. Twelve casualties with human tissue implanted were recorded in the 7/7 bombings. While all patients at risk were given prophylaxis based on recommendations by the Health Protection Agency, several ethical considerations surfaced as a result. In this paper, we compare the sequence of events and the management process of the victims of the 7/7 bombings and the evidence-based research regarding blood-borne infection transmission. Furthermore, it explores the ethical dilemmas, experienced by the senior author on 7/7, surrounding prophylaxis for blood-borne diseases and protocols to avoid confusion over best practice in future bombing incidents.

  7. Requirements for estimation of doses from contaminants dispersed by a 'dirty bomb' explosion in an urban area

    Energy Technology Data Exchange (ETDEWEB)

    Andersson, K.G., E-mail: kasper.andersson@risoe.d [Riso National Laboratory for Sustainable Energy, Technical University of Denmark, Frederiksborgvej 399, P.O. Box 49, DK-4000 Roskilde (Denmark); Mikkelsen, T.; Astrup, P.; Thykier-Nielsen, S. [Riso National Laboratory for Sustainable Energy, Technical University of Denmark, Frederiksborgvej 399, P.O. Box 49, DK-4000 Roskilde (Denmark); Jacobsen, L.H. [Prolog Development Center, HJ Holst Vej 3C-5C, DK-2605 Brondby (Denmark); Hoe, S.C. [Danish Emergency Management Agency, Datavej 16, DK-3460 Birkerod (Denmark); Nielsen, S.P. [Riso National Laboratory for Sustainable Energy, Technical University of Denmark, Frederiksborgvej 399, P.O. Box 49, DK-4000 Roskilde (Denmark)

    2009-12-15

    The ARGOS decision support system is currently being extended to enable estimation of the consequences of terror attacks involving chemical, biological, nuclear and radiological substances. This paper presents elements of the framework that will be applied in ARGOS to calculate the dose contributions from contaminants dispersed in the atmosphere after a 'dirty bomb' explosion. Conceptual methodologies are presented which describe the various dose components on the basis of knowledge of time-integrated contaminant air concentrations. Also the aerosolisation and atmospheric dispersion in a city of different types of conceivable contaminants from a 'dirty bomb' are discussed.

  8. Alterations of body mass index and body composition in atomic bomb survivors.

    Science.gov (United States)

    Tatsukawa, Y; Misumi, M; Yamada, M; Masunari, N; Oyama, H; Nakanishi, S; Fukunaga, M; Fujiwara, S

    2013-08-01

    Obesity, underweight, sarcopenia and excess accumulation of abdominal fat are associated with a risk of death and adverse health outcomes. Our aim was to determine whether body mass index (BMI) and body composition, assessed with dual-energy X-ray absorptiometry (DXA), are associated with radiation exposure among atomic bomb (A-bomb) survivors. This was a cross-sectional study conducted in the Adult Health Study of the Radiation Effects Research Foundation. We examined 2686 subjects (834 men and 1852 women), aged 48-89 years (0-40 years at A-bomb exposure), for BMI analysis. Among them, 550 men and 1179 women underwent DXA in 1994-1996 and were eligible for a body composition study. After being adjusted for age and other potential confounding factors, A-bomb radiation dose was associated significantly and negatively with BMI in both sexes (P=0.01 in men, P=0.03 in women) and appendicular lean mass (Pbomb radiation exposure. We will need to conduct further studies to evaluate whether these alterations affect health status.

  9. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  10. The effects of using Cesium-137 teletherapy sources as a radiological weapon (dirty bomb)

    CERN Document Server

    Liolios, Theodore

    2009-01-01

    While radioactive sources used in medical diagnosis do not pose a great security risk due to their low level of radioactivity, therapeutic sources are extremely radioactive and can presumably be used as a radiological weapon. Cobalt-60 and Cesium-137 sources are the most common ones used in radiotherapy with over 10,000 of such sources currently in use worldwide, especially in the developing world, which cannot afford modern accelerators. The present study uses computer simulations to investigate the effects of using Cesium-137 sources from teletherapy devices as a radiological weapon. Assuming a worst-case terrorist attack scenario, we estimate the ensuing cancer mortality, land contamination, evacuation area, as well as the relevant evacuation, decontamination, and health costs in the framework of the linear risk model. The results indicate that an attack with a Cesium-137 dirty bomb in a large metropolitan city (especially one that would involve several teletherapy sources) although would not cause any sta...

  11. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  12. Transient Ischemic Attack

    Medline Plus

    Full Text Available Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood ... The only difference between a stroke and TIA is that with TIA the blockage is transient (temporary). ...

  13. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  14. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  15. Watermark copy attack

    OpenAIRE

    Kutter, Martin; Voloshynovskyy, Svyatoslav; Herrigel, Alexander

    2000-01-01

    Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating di erent ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy theembedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. The proposed attack doesnot destroy anembedded watermark, but copies it from one image to a di erent ...

  16. The Watermark Template Attack

    OpenAIRE

    Herrigel, Alexander; Voloshynovskyy, Svyatoslav; Rytsar, Yuriy

    2001-01-01

    This paper presents a new attack, called the watermark template attach, for watermarked images. In contrast to the Stirmark benchmark, this attack does not severely reduce the quality of the image. This attack maintains, therefore, the commercial value of the watermarked image. In contrast to previous approaches, it is not the aim of the attack to change the statistics of embedded watermarks fooling the detection process but to utilize specific concepts that have been recently developed for m...

  17. Physics, History, and the German Atomic Bomb.

    Science.gov (United States)

    Walker, Mark

    2017-04-27

    Physics, History, and the German Atomic Bomb. This paper examines the German concept of a nuclear weapon during National Socialism and the Second World War. Zusammenfassung: Physik, Geschichte und die deutsche Atombombe. Dieser Aufsatz untersucht die deutsche Vorstellung einer nuklearen Waffe während des Nationalsozialismus und des Zweiten Weltkrieges. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  19. Accounting for neutron exposure in the Japanese atomic bomb survivors.

    Science.gov (United States)

    Cullings, Harry M; Pierce, Donald A; Kellerer, Albrecht M

    2014-12-01

    The Japanese atomic bomb survivors that were directly exposed to both γ rays and neutrons have been followed by the Radiation Effects Research Foundation (RERF). The estimation of the γ-ray risks requires some adjustment for the greater biological effect of the neutrons per unit dose. Because the small neutron doses and the predominant γ-ray doses are highly correlated, the neutron relative biological effectiveness (RBE) cannot be reliably estimated from the survivors' data and information from radiobiology must be invoked. As data became available on neutron doses, RERF has used a constant neutron RBE value of 10, even though radiobiological studies indicate that the RBE values appear to have considerably larger values at low doses. The approximation RBE = 10 assumes that if the RBE is variable it takes roughly this value in the range of total dose most relevant for linear risk estimation, namely about 1 Gy. We consider some possible RBE functions to explain the correct use and the impact of a dose-dependent RBE. However, we do not advocate any particular choice or even that a variable RBE be employed. Rather we show that the assumed neutron RBE, within a wide range of choices, is far less important to the outcome of risk assessment of the RERF data than generally believed. Some of these misperceptions have been related to the consideration of variable RBE functions, and without due attention to the fact that in the case of the A-bomb survivors' data, the mixed field of neutrons and γ rays must be considered. Therefore, the RBE value of neutrons is much lower than the RBE in pure neutron fields that are used in radiobiological experiments. Thus, applying the pure neutron field RBE to the mixed-field A-bomb radiation can lead to an overestimation of the actual neutron RBE for moderate total dose levels of 1 Gy by a factor of more than four. While in a pure neutron exposure the RBE depends on the neutron dose, in the mixed field it depends on both components of

  20. 36Cl bomb peak: comparison of modeled and measured data

    Directory of Open Access Journals (Sweden)

    A. Eichler

    2009-06-01

    Full Text Available The extensive nuclear bomb testing of the fifties and sixties and the final tests in the seventies caused a strong 36Cl peak that has been observed in ice cores world-wide. The measured 36Cl deposition fluxes in eight ice cores (Dye3, Fiescherhorn, Grenzgletscher, Guliya, Huascarán, North GRIP, Inylchek (Tien Shan and Berkner Island were compared with an ECHAM5-HAM general circulation model simulation (1952–1972. We find a good agreement between the measured and the modeled 36Cl fluxes assuming that the bomb test produced global 36Cl input was ~80 kg. The model simulation indicates that the fallout of the bomb test produced 36Cl is largest in the subtropics and mid-latitudes due to the strong stratosphere-troposphere exchange. In Greenland the 36Cl bomb signal is quite large due to the relatively high precipitation rate. In Antarctica the 36Cl bomb peak is small but is visible even in the driest areas. The model suggests that the large bomb tests in the Northern Hemisphere are visible around the globe but the later (end of sixties and early seventies smaller tests in the Southern Hemisphere are much less visible in the Northern Hemisphere. The question of how rapidly and to what extent the bomb produced 36Cl is mixed between the hemispheres depends on the season of the bomb test. The model results give an estimate of the amplitude of the bomb peak around the globe.

  1. 36Cl bomb peak: comparison of modeled and measured data

    Directory of Open Access Journals (Sweden)

    A. Eichler

    2009-01-01

    Full Text Available The extensive nuclear bomb testing of the fifties and sixties and the final tests in the seventies caused a strong 36Cl peak that has been observed in ice cores world-wide. The measured 36Cl deposition fluxes in eight ice cores (Dye3, Fiescherhorn, Grenzgletscher, Guliya, Huascarán, North GRIP, Inylchek (Tien Shan and Berkner Island were compared with an ECHAM5-HAM general circulation model simulation (1952–1972. We find a good agreement between the measured and the modeled 36Cl fluxes assuming that the bomb test produced global 36Cl input was ~80 kg. The model simulation indicates that the fallout of the bomb test produced 36Cl is largest in the subtropics and mid-latitudes due to the strong stratosphere-troposphere exchange. In Greenland the 36Cl bomb signal is quite large due to the relatively high precipitation rate. In Antarctica the 36Cl bomb peak is small but is visible even in the driest areas. The model suggests that the large bomb tests in the Northern Hemisphere are visible around the globe but the later (end of sixties and early seventies smaller tests in the Southern Hemisphere are much less visible in the Northern Hemisphere. The question of how rapidly and to what extent the bomb produced 36Cl is mixed between the hemispheres depends on the season of the bomb test. The model results give an estimate of the amplitude of the bomb peak around the globe.

  2. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    Science.gov (United States)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  3. Optimal Gliding Guidance of Vertical Plane for Standoff Released Guided Bomb Unit

    Institute of Scientific and Technical Information of China (English)

    HOU Ming-shan

    2008-01-01

    Optimal gliding guidance for a guided bomb unit in the vertical plane is studied based on nonlinear dynamics and kinematics. The guidance law is designed under minimum energy loss index. To avoid the complexity in solving two-point-boundary-value problems, the steady-state solutions of the adjoint states in regular equations are suggested to be used. With these considerations, a quasi-closed, optimal gliding guidance law is obtained. The guidance law is described by the angle of attack in a simple nonlinear equation. An iterative computation method can be easily used to get the optimal angle of attack. The further simplified direct computation algorithm for the optimal angle of attack is also given. The guidance properties are compared with those of maximum lift-to-drag angle of attack control. The simulation results demonstrate that the quasi-closed, optimal gliding guidance law can improve the gliding phase terminal performance with significant increase in the altitude and much little decrease in the speed.

  4. Preventing fatalities in building bombings: what can we learn from the Oklahoma City bombing?

    Science.gov (United States)

    Glenshaw, Mary T; Vernick, Jon S; Li, Guohua; Sorock, Gary S; Brown, Sheryll; Mallonee, Sue

    2007-07-01

    Bombings are an increasing threat to the public's health. Descriptive studies of blast injuries have been published, but these injuries have not been studied using analytical epidemiological methods. This study assesses factors associated with fatality risk among individuals exposed to the 1995 Oklahoma City bombing. Retrospective case-control analysis using multivariable logistic regression. Odds ratios (OR) of fatality are calculated among occupants of the Alfred P. Murrah Federal Building on April 19, 1995. Of the 348 occupants exposed, 163 (46.8%) were fatally injured. Fatality risk was greatest in the collapsed region of the building (adjusted OR 176.7, 95% confidence interval [CI] 65.9-474.2). Age > or =40 was also associated with a significantly increased risk of fatality (OR 3.7, 95% CI 1.4-9.8). Among people found in the noncollapsed region of the building, employees' status compared to a visitor's or child's status was protective (OR 0.13, 95% CI 0.01-1.3). Structural collapse is the most important risk factor for fatality in a building bombing. Progressive collapse may be prevented through more supportive building design. Protection of vulnerable building occupants can be improved by placement of relevant facilities in more structurally reinforced areas. Regular evacuation training of personnel and clear egress routes may also reduce fatality in a building bombing.

  5. TIGER -- A technology to improve the delivery capability of nuclear bombs and the survivability of the delivery aircraft

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1980-12-31

    The TIGER (Terminal guided and Extended-Range) Program was initiated in 1972 to study improved delivery capabilities for stockpiled tactical nuclear bombs. The Southeast Asia conflict fostered the development of air-delivered standoff conventional weapons utilizing terminal guidance systems. SNL initiated the TIGER program to determine if current nuclear bombs could be provided with a similarly accurate standoff capabilities. These conventional weapon delivery techniques, while allowing highly accurate attack, generally require entering the target area at high altitude to establish line of sight to the target. In parallel with the TIGER program, system studies analyzed this concept and showed marked improvement in aircraft and weapon survivability with moderate standoff (10--20 km) if low level deliveries (60 m) could be accomplished. As a result of this work, the TIGER program was redirected in early 1974 to demonstrate a standoff bomb with good accuracy (90 m CEP) when delivered from low flying aircraft. This program redirection resulted in the selection of an inertial guidance system to replace the earlier terminal guidance systems. This program was called the Extended-Range Bomb (ERB). In May 1974, a joint Air Force/DOE study identified the desirability of having a single tactical weapon which could be employed against either fixed, preselected targets, or mobile battlefield targets. Studies conducted on the ERB system showed that the inertially guided weapon could fly not only the standoff mission but also a return-to-target mission against the mobile battlefield targets whose locations are not known accurately enough to use a standoff delivery. The ERB program evolved from these initial investigations into an exploratory program to develop the hardware and demonstrate the technology required to fly standoff and return-to-target trajectories. The application of this technology in the form of field retrofit kits to the B61 bomb is called TIGER II.

  6. TIGER -- A technology to improve the delivery capability of nuclear bombs and the survivability of the delivery aircraft

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1980-12-31

    The TIGER (Terminal guided and Extended-Range) Program was initiated in 1972 to study improved delivery capabilities for stockpiled tactical nuclear bombs. The Southeast Asia conflict fostered the development of air-delivered standoff conventional weapons utilizing terminal guidance systems. SNL initiated the TIGER program to determine if current nuclear bombs could be provided with a similarly accurate standoff capabilities. These conventional weapon delivery techniques, while allowing highly accurate attack, generally require entering the target area at high altitude to establish line of sight to the target. In parallel with the TIGER program, system studies analyzed this concept and showed marked improvement in aircraft and weapon survivability with moderate standoff (10--20 km) if low level deliveries (60 m) could be accomplished. As a result of this work, the TIGER program was redirected in early 1974 to demonstrate a standoff bomb with good accuracy (90 m CEP) when delivered from low flying aircraft. This program redirection resulted in the selection of an inertial guidance system to replace the earlier terminal guidance systems. This program was called the Extended-Range Bomb (ERB). In May 1974, a joint Air Force/DOE study identified the desirability of having a single tactical weapon which could be employed against either fixed, preselected targets, or mobile battlefield targets. Studies conducted on the ERB system showed that the inertially guided weapon could fly not only the standoff mission but also a return-to-target mission against the mobile battlefield targets whose locations are not known accurately enough to use a standoff delivery. The ERB program evolved from these initial investigations into an exploratory program to develop the hardware and demonstrate the technology required to fly standoff and return-to-target trajectories. The application of this technology in the form of field retrofit kits to the B61 bomb is called TIGER II.

  7. Return of ambiguity attacks

    Science.gov (United States)

    Craver, Scott A.

    2002-04-01

    The ambiguity attack, or invertibility attack, was described several years ago as a potential threat to digital watermarking systems. By manipulating the invertibility of watermark embedding, one could negate or subvert the meaning of a copyright mark. These attacks were easily prevented, however, with the appropriate application of one-way functions and cryptographic hashes in watermarking protocols. New research in watermarking, however, has caused the ambiguity attack to resurface as a threat, and this time it will not be as easy averted. Recent work in public-key watermarking create scenarios in which one-way functions may be ineffective against this threat. Furthermore, there are also positive uses for ambiguity attacks, as components in watermarking protocols. This paper provides an overview of the past and possible future of these unusual attacks.

  8. The Manhattan Project: Making the atomic bomb

    Energy Technology Data Exchange (ETDEWEB)

    Gosling, F.G.

    1994-09-01

    This article is a short history of the origins and development of the American atomic bomb program during World War II. Beginning with the scientific developments of the pre-war years, the monograph details the role of US government in conducting a secret, nationwide enterprise that took science from the laboratory and into combat with an entirely new type of weapon. The monograph concludes with a discussion of the immediate postwar period, the debate over the Atomic Energy Act of 1946, and the founding of the Atomic Energy Commission.

  9. Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack

    OpenAIRE

    2014-01-01

    We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, P...

  10. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  11. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  12. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  13. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  14. CALCULATION OF PER PARCEL PROBABILITY FOR DUD BOMBS IN GERMANY

    Directory of Open Access Journals (Sweden)

    S. M. Tavakkoli Sabour

    2014-10-01

    Full Text Available Unexploded aerial Bombs, also known as duds or unfused bombs, of the bombardments in the past wars remain explosive for decades after the war under the earth’s surface threatening the civil activities especially if dredging works are involved. Interpretation of the aerial photos taken shortly after bombardments has been proven to be useful for finding the duds. Unfortunately, the reliability of this method is limited by some factors. The chance of finding a dud on an aerial photo depends strongly on the photography system, the size of the bomb and the landcover. On the other hand, exploded bombs are considerably better detectable on aerial photos and confidently represent the extent and density of a bombardment. Considering an empirical quota of unfused bombs, the expected number of duds can be calculated by the number of exploded bombs. This can help to have a better calculation of cost-risk ratio and to classify the areas for clearance. This article is about a method for calculation of a per parcel probability of dud bombs according to the distribution and density of exploded bombs. No similar work has been reported in this field by other authors.

  15. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight... upon receiving information that an act or suspected act of air piracy has been committed, the...

  16. H-alpha features with hot onsets. I. Ellerman bombs

    CERN Document Server

    Rutten, R J

    2016-01-01

    Ellerman bombs are transient brightenings of the wings of the Balmer lines that uniquely mark reconnection in the solar photosphere. They are also bright in strong Ca II and ultraviolet lines and in ultraviolet continua, but they are not visible in the optical continuum and the Na I D and Mg I b lines. These discordant visibilities invalidate all published Ellerman bomb modeling. I argue that the assumption of Saha-Boltzmann lower-level populations is informative to estimate bomb-onset opacities for these diverse diagnostics, even and especially for H-alpha, and employ such estimates to gauge the visibilities of Ellerman bomb onsets in all of them. They constrain Ellerman bomb formation to temperatures 10,000 - 20,000 K and hydrogen densities around 10^15 cm^-3. Similar arguments likely hold for H-alpha visibility in other transient phenomena with hot and dense onsets.

  17. The Atomic Bomb Casualty Commission in retrospect

    Science.gov (United States)

    Putnam, Frank W.

    1998-01-01

    For 50 years, the Atomic Bomb Casualty Commission (ABCC) and its successor, the Radiation Effects Research Foundation (RERF), have conducted epidemiological and genetic studies of the survivors of the atomic bombs and of their children. This research program has provided the primary basis for radiation health standards. Both ABCC (1947–1975) and RERF (1975 to date) have been a joint enterprise of the United States (through the National Academy of Sciences) and of Japan. ABCC began in devastated, occupied Japan. Its mission had to be defined and refined. Early research revealed the urgent need for long term study. In 1946, a Directive of President Truman enjoined the National Research Council of the National Academy of Sciences to develop the program. By 1950, ABCC staff exceeded 1,000, and clinical and genetic studies were underway. Budgetary difficulties and other problems almost forced closure in 1953. In 1955, the Francis Report led to a unified epidemiological study. Much progress was made in the next decade, but changing times required founding of a binational nonprofit organization (RERF) with equal participation by Japan and the United States. New programs have been developed and existing ones have been extended in what is the longest continuing health survey ever undertaken. PMID:9576898

  18. Impact on the Japanese atomic bomb survivors of radiation received from the bombs.

    Science.gov (United States)

    Cullings, Harry M

    2014-02-01

    The Radiation Effects Research Foundation (RERF) studies various cohorts of Japanese atomic bomb survivors, the largest being the Life Span Study (LSS), which includes 93,741 persons who were in Hiroshima or Nagasaki at the times of the bombings; there are also cohorts of persons who were exposed in utero and survivors' children. This presentation attempts to summarize the total impact of the radiation from the bombs on the survivors from both an individual perspective (both age-specific and integrated lifetime risk, along with a measure of life expectancy that describes how the risk affects the individual given age at exposure) and a group perspective (estimated numbers of excess occurrences in the cohort), including both early and late effects. As survivors' doses ranged well into the acutely lethal range at closer distances, some of them experienced acute signs and symptoms of radiation exposure in addition to being at risk of late effects. Although cancer has always been a primary concern among late effects, estimated numbers of excess cancers and hematopoietic malignancies in the LSS are a small fraction of the total due to the highly skewed dose distribution, with most survivors receiving small doses. For example, in the latest report on cancer incidence, 853 of 17,448 incident solid cancers were estimated to be attributable to radiation from the bombs. RERF research indicates that risk of radiation-associated cancer varies among sites and that some benign tumors such as uterine myoma are also associated with radiation. Noncancer late effects appear to be in excess in proportion to radiation dose but with an excess relative risk about one-third that of solid cancer and a correspondingly small overall fraction of cases attributable to radiation. Specific risks were found for some subcategories, particularly circulatory disease, including stroke and precedent conditions such as hypertension. Radiation-related cataract in the atomic bomb survivors is well known

  19. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  20. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  1. Balancing Fear: Why Counter-Terror Legislation was Blocked after the Oklahoma City and London Bombings

    Directory of Open Access Journals (Sweden)

    Gabriel Rubin

    2010-11-01

    Full Text Available Este artículo escruta las reacciones legislativas a los atentados en la ciudad de Oklahoma y los de Londres en 2005 para intentar descifrar como la legislación antiterrorista ha sustancialmente bloqueado estos ataques. Se intenta mostrar como la resistencia de los gobiernos y los ejecutivos aprueba índices críticos en las leyes antiterroristas. A la luz de una reciente encuesta sobre legislación antiterrorista mundial, los casos donde la legislación antiterrorista ha sido bloqueada ha llegado a ser verdaderamente crítica. A este fin, este artículo se pregunta por qué la legislación antiterrorista se bloquea cuando esto sucede. Para responder a esta cuestión, se han testado tres variables: la composición de los gobiernos, la opinión pública-basada en los niveles de terror en sus medios, y el nivel de acuerdos ejecutivos. Para testar estas variables, se han evaluado dos casos: la evolución de la legislación antiterrorista antes de los ataques de la ciudad de Oklahoma en 1995 y antes de los atentados de Londres de 2005. En la evaluación de los casos, los debates legislativos y ejecutivos han ocurrido antes de los ataques terroristas examinados y luego se han comparado los dos casos con el Reino Unido en 1974 y los Estados Unidos en 2001 cuando la legislación antiterrorista inicia su camino. Este artículo concluye que el nivel de acuerdos ejecutivos y la composición de los gobiernos tiene el mayor poder de explicación en determinadas decisiones antiterroristas que llevarán a secundar la legislación antiterrorista o no.Palabras clave: ataques terroristas a Londres, legislación antiterrorista, Estados Unidos, Reino Unido___________________________ABSTRACT:This article scrutinizes the legislative reactions to the Oklahoma City Bombing and the 2005 London Bombings to try to decipher why counter-terror legislation was substantially blocked after these attacks.  It finds that the partisan composition of the government and

  2. Balancing Fear: Why Counter-Terror Legislation was Blocked after the Oklahoma City and London Bombings

    Directory of Open Access Journals (Sweden)

    Gabriel Rubin

    2010-11-01

    Full Text Available Este artículo escruta las reacciones legislativas a los atentados en la ciudad de Oklahoma y los de Londres en 2005 para intentar descifrar como la legislación antiterrorista ha sustancialmente bloqueado estos ataques. Se intenta mostrar como la resistencia de los gobiernos y los ejecutivos aprueba índices críticos en las leyes antiterroristas. A la luz de una reciente encuesta sobre legislación antiterrorista mundial, los casos donde la legislación antiterrorista ha sido bloqueada ha llegado a ser verdaderamente crítica. A este fin, este artículo se pregunta por qué la legislación antiterrorista se bloquea cuando esto sucede. Para responder a esta cuestión, se han testado tres variables: la composición de los gobiernos, la opinión pública-basada en los niveles de terror en sus medios, y el nivel de acuerdos ejecutivos. Para testar estas variables, se han evaluado dos casos: la evolución de la legislación antiterrorista antes de los ataques de la ciudad de Oklahoma en 1995 y antes de los atentados de Londres de 2005. En la evaluación de los casos, los debates legislativos y ejecutivos han ocurrido antes de los ataques terroristas examinados y luego se han comparado los dos casos con el Reino Unido en 1974 y los Estados Unidos en 2001 cuando la legislación antiterrorista inicia su camino. Este artículo concluye que el nivel de acuerdos ejecutivos y la composición de los gobiernos tiene el mayor poder de explicación en determinadas decisiones antiterroristas que llevarán a secundar la legislación antiterrorista o no.Palabras clave: ataques terroristas a Londres, legislación antiterrorista, Estados Unidos, Reino Unido___________________________ABSTRACT:This article scrutinizes the legislative reactions to the Oklahoma City Bombing and the 2005 London Bombings to try to decipher why counter-terror legislation was substantially blocked after these attacks.  It finds that the partisan composition of the government and

  3. Emotional intelligence in the operating room: analysis from the Boston Marathon bombing.

    Science.gov (United States)

    Chang, Beverly P; Vacanti, Joshua C; Michaud, Yvonne; Flanagan, Hugh; Urman, Richard D

    2014-01-01

    The Boston Marathon terrorist bombing that occurred on April 15, 2013 illustrates the importance of a cohesive, efficient management for the operating room and perioperative services. Conceptually, emotional intelligence (EI) is a form of social intelligence used by individuals in leadership positions to monitor the feelings and emotions of their team while implementing a strategic plan. To describe the experience of caring for victims of the bombing at a large tertiary care center and provide examples demonstrating the importance of EI and its role in the management of patient flow and overall care. A retrospective review of trauma data was performed. Data regarding patient flow, treatment types, treatment times, and outcomes were gathered from the hospital's electronic tracking system and subsequently analyzed. Analyses were performed to aggregate the data, identify trends, and describe the medical care. Immediately following the bombing, a total of 35 patients were brought to the emergency department (ED) with injuries requiring immediate medical attention. 10 of these patients went directly to the operating room on arrival to the hospital. The first victim was in an operating room within 21 minutes after arrival to the ED. The application of EI in managerial decisions helped to ensure smooth transitions for victims throughout all stages of their perioperative care. EI provided the fundamental groundwork that allowed the operating room manager and nurse leaders to establish the calm and coordinated leadership that facilitated patient care and teamwork.

  4. A study on the trend of international radioactive material regulation since the terrorist attacks of September 11, 2001

    Energy Technology Data Exchange (ETDEWEB)

    Ryu, J. S. [KAERI, Taejon (Korea, Republic of)

    2003-07-01

    AI-Qaeda and other terrorist groups have tried to obtain the radioactive material which could be used to make a dirty bomb, and their documents relating to dirty bombs were found in the January 2003. International communities especially, the United States has made efforts to improve infrastructure of radiation regulation and security of radioactive material for protecting its people from radiological attacks. This study examines the likelihood of radiological terrorism and the radiological dispersal devices which could be used by determined terrorists, and the trend of international communities to respond it through improvement on radiation regulation and security.

  5. Foreign bodies radiographically-demonstrated in atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Tamura, S.; Onitsuka, H.; Lee, K.; Shimizu, Y.; Russell, W.J.

    1978-08-25

    The prevalence of roentgenologically-detected foreign bodies among atomic bomb (A-bomb) survivors was studied as an indicator of the A-bomb blast effects. Acupuncture was studied as an indicator of A-bomb-related abnormalities for which it was administered. All Adult Health Study subjects' roentgenograms demonstrating foreign bodies were reviewed. The frequency of glass and metal, and acupuncture needles were analyzed by distance from hypocenters, sex, age, body sites involved; and the subjects' shielding at the times of the A-bombs. The presence of glass fragments correlated closely with distance from hypocenter, heavy shielding from the A-bombs, and with adulthood, and they were more frequent in the chest than hand and wrist. Metal foreign bodies were more frequent in the hand and wrist than in the chest, and not associated with distance from hypocenter or heavy shielding. The prevalence of acupuncture needles increased with age, but did not correlate with A-bomb dose.

  6. Persistent distress after psychological exposure to the Nagasaki atomic bomb explosion.

    Science.gov (United States)

    Kim, Yoshiharu; Tsutsumi, Atsuro; Izutsu, Takashi; Kawamura, Noriyuki; Miyazaki, Takao; Kikkawa, Takehiko

    2011-11-01

    Although there is speculation that individuals living in the vicinity of nuclear disasters have persistent mental health deterioration due to psychological stress, few attempts have been made to examine this issue. To determine whether having been in the vicinity of the Nagasaki atomic bomb explosion in the absence of substantial exposure to radiation affected the mental health of local inhabitants more than half a century later. Participants were randomly recruited from individuals who lived in the vicinity of the atomic bomb explosion in uncontaminated suburbs of Nagasaki. This sample (n = 347) was stratified by gender, age, perception of the explosion and current district of residence. Controls (n = 288) were recruited from among individuals who had moved into the area from outside Nagasaki 5-15 years after the bombing, matched for gender, age and district of residence. The primary outcome measure was the proportion of those at high risk of mental disorder based on the 28-item version of the General Health Questionnaire, with a cut-off point of 5/6. Other parameters related to individual perception of the explosion, health status, life events and habits were also assessed. Having been in the vicinity of the explosion was the most significant factor (OR = 5.26, 95% CI 2.56-11.11) contributing to poorer mental health; erroneous knowledge of radiological hazard showed a mild association. In the sample group, anxiety after learning of the potential radiological hazard was significantly correlated with poor mental health (Patomic bomb explosion without radiological exposure continued to be associated with poorer mental health more than half a century after the event. Fear on learning about the potential radiological hazard and lack of knowledge about radiological risk are responsible for this association.

  7. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant

    DEFF Research Database (Denmark)

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence

    2017-01-01

    BACKGROUND: Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long......-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. METHODS: Data on LTP use, attacks, and treatments were recorded. Attack...... characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. RESULTS: Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while...

  8. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  9. Supply Chain Attack Framework and Attack Patterns

    Science.gov (United States)

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  10. The Potentialities of the Atomic Bomb

    Energy Technology Data Exchange (ETDEWEB)

    Meade, Roger Allen [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bradbury, Norris E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-07

    Since the first use of an atomic bomb on August 5 [sic], 1945, over the city of Hiroshima, Japan, there has been a continual flood of speculation and discussion concerning the effect of this new weapon on military technology. Much of this speculation and discussion has been intelligent and fruitful; much, I regret to say, has had neither of these characteristics. The enormity of the device, in terms of potential destruction and loss of life, and the practical necessity to surround the technical facts with full security restrictions have only combined to make the problem more difficult. At the same time, it is imperative that policymaking personnel in charge of long range national planning know the basic facts concerning atomic weapons and have these facts in a reasonable perspective. This document describes these potentialities in detail.

  11. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  12. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  13. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  14. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  15. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  16. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this library is for educational purposes only, and therefore is not intended to be ...

  17. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  18. Bayesian Watermark Attacks

    OpenAIRE

    Shterev, Ivo; Dunson, David

    2012-01-01

    This paper presents an application of statistical machine learning to the field of watermarking. We propose a new attack model on additive spread-spectrum watermarking systems. The proposed attack is based on Bayesian statistics. We consider the scenario in which a watermark signal is repeatedly embedded in specific, possibly chosen based on a secret message bitstream, segments (signals) of the host data. The host signal can represent a patch of pixels from an image or a video frame. We propo...

  19. DNS rebinding attacks

    OpenAIRE

    Kokkinopoulos, Georgios

    2009-01-01

    Approved for public release, distribution unlimited. A Domain Name System (DNS) Rebinding attack compromises the integrity of name resolution in DNS with the goal of controlling the IP address of the host to which the victim ultimately connects. The same origin policy and DNS Pinning techniques were introduced to protect Web browsers from DNS rebinding attacks, but their effectiveness has been undermined by vulnerabilities introduced by plug-ins such as JavaScript and Adobe Flash Play...

  20. Predictors of survival and favorable functional outcomes after an out-of-hospital cardiac arrest in patients systematically brought to a dedicated heart attack center (from the Harefield Cardiac Arrest Study).

    Science.gov (United States)

    Iqbal, M Bilal; Al-Hussaini, Abtehale; Rosser, Gareth; Salehi, Saleem; Phylactou, Maria; Rajakulasingham, Ramyah; Patel, Jayna; Elliott, Katharine; Mohan, Poornima; Green, Rebecca; Whitbread, Mark; Smith, Robert; Ilsley, Charles

    2015-03-15

    Despite advances in cardiopulmonary resuscitation (CPR), survival remains low after out-of-hospital cardiac arrest (OOHCA). Acute coronary ischemia is the predominating precipitant, and prompt delivery of patients to dedicated facilities may improve outcomes. Since 2011, all patients experiencing OOHCA in London, where a cardiac etiology is suspected, are systematically brought to heart attack centers (HACs). We determined the predictors for survival and favorable functional outcomes in this setting. We analyzed 174 consecutive patients experiencing OOHCA from 2011 to 2013 brought to Harefield Hospital-a designated HAC in London. We analyzed (1) all-cause mortality and (2) functional status using a modified Rankin scale (mRS 0 to 6, where mRS0-3(+) = favorable functional status). The overall survival rates were 66.7% (30 days) and 62.1% (1 year); and 54.5% had mRS0-3(+) at discharge. Patients with mRS0-3(+) had reduced mortality compared to mRS0-3(-): 30 days (1.2% vs 72.2%, p <0.001) and 1 year (5.3% vs 77.2%, p <0.001). Multivariate analyses identified lower patient comorbidity, absence of cardiogenic shock, bystander CPR, ventricular tachycardia/ventricullar fibrillation as initial rhythm, shorter duration of resuscitation, prehospital advanced airway, absence of adrenaline and inotrope use, and intra-aortic balloon pump use as predictors of mRS0-3(+). Consistent predictors of increased mortality were the presence of cardiogenic shock, advanced airway use, increased duration of resuscitation, and absence of therapeutic hypothermia. A streamlined delivery of patients experiencing OOHCA to dedicated facilities is associated with improved functional status and survival. Our study supports the standardization of care for such patients with the widespread adoption of HACs.

  1. Perfection and the Bomb: Nuclear Weapons, Teleology, and Motives.

    Science.gov (United States)

    Brummett, Barry

    1989-01-01

    Uses Kenneth Burke's theory of perfection to explore the vocabularies of nuclear weapons in United States public discourse and how "the Bomb" as a God term has gained imbalanced ascendancy in centers of power. (MS)

  2. Teaching and Learning Multiple Perspectives: The Atomic Bomb.

    Science.gov (United States)

    Doppen, Frans H.

    2000-01-01

    Explores how historical empathy can give students a richer understanding of the past, focusing on the development of the students' historical understanding through an analysis of 18 documents on President Truman's decision to use the atomic bomb against Japan. (CMK)

  3. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  4. Details of Nazis' A-Bomb program surface

    CERN Multimedia

    Glanz, J

    2002-01-01

    Werner Heisenberg, leader of the Nazi atomic bomb program, revealed the projects existence to Niels Bohr in a meeting in Copenhagen in 1941. But contrary to several historical accounts of the meeting, Heisenberg never expressed moral qualms about building a bomb for Hitler nor hinted that he might be willing to sabotage the project, according to secret documents cited in a London newspaper yesterday (2 pages).

  5. Simulated E-Bomb Effects on Electronically Equipped Targets

    Science.gov (United States)

    2009-09-01

    65 Figure 23. GBU-10 Paveway II (From: Bombas Guidas, 2009) ........................... 66 Figure 24. Representative Laser Guided Bomb...from the target. A picture of the GBU- 10 bomb is in Figure 23. Figure 23. GBU-10 Paveway II (From: Bombas Guidas, 2009) According to the Air...Retrieved June 16, 2009, from http://www.globalsecurity.org/military/systems/munitions/blu-82.htm Bombas Guidas. Retrieved June 23 2009, from

  6. Trash can bomb can fall into the hands of terrorists

    CERN Multimedia

    2001-01-01

    Leading scientists from CERN described how if terrorists were able to get their hands on plutonium or uranium, they would be able to manufacture a 'trash can' nuclear bomb simply by inserting the radioactive material into a normal bomb. Once detonated a large area could be contaminated leading to the immediate deaths of many with many more future casualties due to cancers caused by the radiation.

  7. Understanding bifurcation of slow versus fast cyber-attackers

    NARCIS (Netherlands)

    Wieren, van Maarten; Doerr, Christian; Jacobs, Vivian; Pieters, Wolter; Livraga, Giovanni; Torra, Vicenç; Aldini, Alessandro; Martinelli, Fabio; Suri, Neeraj

    2016-01-01

    Anecdotally, the distinction between fast “Smash-and-Grab” cyber-attacks on the one hand and slow attacks or “Advanced Persistent Threats” on the other hand is well known. In this article, we provide an explanation for this phenomenon as the outcome of an optimization from the perspective of the att

  8. Understanding Bifurcation of Slow Versus Fast Cyber-Attackers

    NARCIS (Netherlands)

    van Wieren, Maarten; Doerr, Christian; Jacobs, Vivian; Pieters, Wolter; Livraga, Giovanni; Torra, Vicenç; Aldini, Alessandro; Martinelli, Fabio; Suri, Neeraj

    2016-01-01

    Anecdotally, the distinction between fast “Smash-and-Grab‿ cyber-attacks on the one hand and slow attacks or “Advanced Persistent Threats‿ on the other hand is well known. In this article, we provide an explanation for this phenomenon as the outcome of an optimization from the perspective of the

  9. Long-term follow-up of atomic bomb survivors.

    Science.gov (United States)

    Sakata, Ritsu; Grant, Eric J; Ozasa, Kotaro

    2012-06-01

    The Life Span Study (LSS) is a follow-up study of atomic bomb (A-bomb) survivors to investigate the radiation effects on human health and has collected data for over 60 years. The LSS cohort consists of 93,741 A-bomb survivors and another 26,580 age and sex-matched subjects who were not in either city at the time of the bombing. Radiation doses have been computed based on individual location and shielding status at the time of the bombings. Age at death and cause of death are gathered through the Japanese national family registry system and cancer incidence data have been collected through the Hiroshima and Nagasaki cancer registries. Noncancer disease incidence and health information are collected through biannual medical examinations among a subset of the LSS. Radiation significantly increases the risks of death (22% at 1 Gy), cancer incidence (47% at 1 Gy), death due to leukemia (310% at 1 Gy), as well as the incidence of several noncancer diseases (e.g. thyroid nodules, chronic liver disease and cirrhosis, uterine myoma, and hypertension). Significant effects on maturity (e.g. growth reduction and early menopause) were also observed. Long-term follow-up studies of the A-bomb survivors have provided reliable information on health risks for the survivors and form the basis for radiation protection standards for workers and the public. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  10. Foreign bodies radiographically demonstrated in atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Tamura, S.; Onitsuka, H.; Lee, K.K.; Shimizu, Y.; Russell, W.J.

    1978-02-01

    The prevalence of roentgenologically-detected foregin bodies among atomic bomb survivors was studied as an indicator of the A-bomb blast effects. Acupuncture was studied as an indicator of possible A-bomb-related abnormalities for which it was administered. All available roentgenograms of Adult Health Study (AHS) subjects which demonstrated foreign bodies were reviewed. The frequency of glass and metal foreign bodies and of acupuncture needles was analyzed in detail. Analyses were made by distance from the hypocenter, sex, age, body sites involved, and shielding at the time of the A-bomb (ATB). The presence of glass fragments correlated closely with distance from the hypocenter, with heavy shielding from the A-bombs, and with adulthood, and they were more frequent in the chest than in the hand and wrist. On the contrary, metal foreign bodies were more frequent in the hand and wrist than in the chest, and were not associated with distance from hypocenter or heavy shielding. The prevalence of acupuncture needles increased with age, but did not correlate with A-bomb dose.

  11. Life After a Heart Attack

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  12. What Is a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  13. What Causes a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  14. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  15. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  16. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  17. Simulating an Exploding Fission-Bomb Core

    Science.gov (United States)

    Reed, Cameron

    2016-03-01

    A time-dependent desktop-computer simulation of the core of an exploding fission bomb (nuclear weapon) has been developed. The simulation models a core comprising a mixture of two isotopes: a fissile one (such as U-235) and an inert one (such as U-238) that captures neutrons and removes them from circulation. The user sets the enrichment percentage and scattering and fission cross-sections of the fissile isotope, the capture cross-section of the inert isotope, the number of neutrons liberated per fission, the number of ``initiator'' neutrons, the radius of the core, and the neutron-reflection efficiency of a surrounding tamper. The simulation, which is predicated on ordinary kinematics, follows the three-dimensional motions and fates of neutrons as they travel through the core. Limitations of time and computer memory render it impossible to model a real-life core, but results of numerous runs clearly demonstrate the existence of a critical mass for a given set of parameters and the dramatic effects of enrichment and tamper efficiency on the growth (or decay) of the neutron population. The logic of the simulation will be described and results of typical runs will be presented and discussed.

  18. Magnetic Flux Cancellation in Ellerman Bombs

    CERN Document Server

    Reid, A; Doyle, J G; Scullion, E; Henriques, V; Nelson, C; Ray, T

    2016-01-01

    Ellerman Bombs (EBs) are often found co-spatial with bipolar photospheric magnetic fields. We use H$\\alpha$ imaging spectroscopy along with Fe I 6302.5 \\AA\\ spectro-polarimetry from the Swedish 1-m Solar Telescope (SST), combined with data from the Solar Dynamic Observatory (SDO) to study EBs and the evolution of the local magnetic fields at EB locations. The EBs are found via an EB detection and tracking algorithm. We find, using NICOLE inversions of the spectro-polarimetric data, that on average (3.43 $\\pm$ 0.49) x 10$^{24}$ ergs of stored magnetic energy disappears from the bipolar region during the EBs burning. The inversions also show flux cancellation rates of 10$^{14}$ - 10$^{15}$ Mx s$^{-1}$, and temperature enhancements of 200 K at the detection footpoints. We investigate near-simultaneous flaring of EBs due to co-temporal flux emergence from a sunspot, which shows a decrease in transverse velocity when interacting with an existing, stationary area of opposite polarity magnetic flux and the EBs are f...

  19. Ellerman Bombs with Jets: Cause and Effect

    CERN Document Server

    Reid, A; Scullion, E; Doyle, J G; Shelyag, S; Gallagher, P

    2015-01-01

    Ellerman Bombs (EBs) are thought to arise as a result of photospheric magnetic reconnection. We use data from the Swedish 1-m Solar Telescope (SST), to study EB events on the solar disk and at the limb. Both datasets show that EBs are connected to the foot-points of forming chromospheric jets. The limb observations show that a bright structure in the H$\\alpha$ blue wing connects to the EB initially fuelling it, leading to the ejection of material upwards. The material moves along a loop structure where a newly formed jet is subsequently observed in the red wing of H$\\alpha$. In the disk dataset, an EB initiates a jet which propagates away from the apparent reconnection site within the EB flame. The EB then splits into two, with associated brightenings in the inter-granular lanes (IGLs). Micro-jets are then observed, extending to 500 km with a lifetime of a few minutes. Observed velocities of the micro-jets are approximately 5-10 km s$^{-1}$, while their chromospheric counterparts range from 50-80 km s$^{-1}$....

  20. Statistical Analysis of Small Ellerman Bomb Events

    CERN Document Server

    Nelson, C J; Erdelyi, R; Huang, Z; Madjarska, M; Mathioudakis, M; Mumford, S; Reardon, K; 10.1007/s11207-012-0222-3

    2013-01-01

    The properties of Ellerman bombs (EBs), small-scale brightenings in the H-alpha line wings, have proved difficult to establish due to their size being close to the spatial resolution of even the most advanced telescopes. Here, we aim to infer the size and lifetime of EBs using high-resolution data of an emerging active region collected using the Interferometric BIdimensional Spectrometer (IBIS) and Rapid Oscillations of the Solar Atmosphere (ROSA) instruments as well as the Helioseismic and Magnetic Imager (HMI) onboard the Solar Dynamics Observatory (SDO). We develop an algorithm to track EBs through their evolution, finding that EBs can often be much smaller (around 0.3") and shorter lived (less than 1 minute) than previous estimates. A correlation between G-band magnetic bright points and EBs is also found. Combining SDO/HMI and G-band data gives a good proxy of the polarity for the vertical magnetic field. It is found that EBs often occur both over regions of opposite polarity flux and strong unipolar fie...

  1. Ellerman Bombs with Jets: Cause and Effect

    Science.gov (United States)

    Reid, A.; Mathioudakis, M.; Scullion, E.; Doyle, J. G.; Shelyag, S.; Gallagher, P.

    2015-05-01

    Ellerman Bombs (EBs) are thought to arise as a result of photospheric magnetic reconnection. We use data from the Swedish 1 m Solar Telescope to study EB events on the solar disk and at the limb. Both data sets show that EBs are connected to the foot points of forming chromospheric jets. The limb observations show that a bright structure in the Hα blue wing connects to the EB initially fueling it, leading to the ejection of material upwards. The material moves along a loop structure where a newly formed jet is subsequently observed in the red wing of Hα. In the disk data set, an EB initiates a jet which propagates away from the apparent reconnection site within the EB flame. The EB then splits into two, with associated brightenings in the inter-granular lanes. Micro-jets are then observed, extending to 500 km with a lifetime of a few minutes. Observed velocities of the micro-jets are approximately 5-10 km s-1, while their chromospheric counterparts range from 50 to 80 km s-1. MURaM simulations of quiet Sun reconnection show that micro-jets with properties similar to those of the observations follow the line of reconnection in the photosphere, with associated Hα brightening at the location of increased temperature.

  2. Characterizing the Performance of Pipe Bombs.

    Science.gov (United States)

    Oxley, Jimmie C; Smith, James L; Bernier, Evan T; Sandstrom, Fredrick; Weiss, Gregory G; Recht, Gunther W; Schatzer, David

    2017-05-24

    Pipe bombs of steel or PVC fragment in reproducible patterns when similarly configured. The power of the explosion correlates with number, mass, and size of the fragments recovered, where a large number of small, low-mass fragments indicate a high-power event and vice versa. In discussing performance, describing pipe fragmentation pattern by fragment weight distribution mapping (FWDM) or fragment surface area distribution mapping (FSADM) was useful. When fillers detonated, detonation velocities of ~4.4 mm/μs were measured. In such cases, side walls of the pipe were thrown first; the average fragment velocity was ~1000 km/s. In deflagrations, the end cap was first thrown; fragment velocities were only ~240 km/s. Blast overpressures varied; at 10 feet, 2 × 12 inch steel pipes containing ~550 g of detonable mixture produced overpressures of 5-6 psi; similar nondetonating pipes produced less than 2 psi. Maximum fragment throw distances were 250-300 m, with an average of ~100 m. © 2017 American Academy of Forensic Sciences.

  3. Observations and NLTE modeling of Ellerman bombs

    CERN Document Server

    Berlicki, Arkadiusz

    2014-01-01

    Ellerman bombs (EBs) are short-lived and compact structures that are observed well in the wings of the hydrogen H-alpha line. EBs are also observed in the chromospheric CaII lines and in UV continua. H-alpha line profiles of EBs show a deep absorption at the line center and enhanced emission in the line wings. Similar shapes of the line profiles are observed for the CaII IR line at 8542 ang. It is generally accepted that EBs may be considered as compact microflares located in lower solar atmosphere. However, it is still not clear where exactly the emission of EBs is formed in the solar atmosphere. High-resolution spectrophotometric observations of EBs were used for determining of their physical parameters and construction of semi-empirical models. In our analysis we used observations of EBs obtained in the H-alpha and CaII H lines. We also used NLTE numerical codes for the construction of grids of 243 semi-empirical models simulating EBs structures. In this way, the observed emission could be compared with th...

  4. The radiological management of bomb blast injury.

    Science.gov (United States)

    Hare, S S; Goddard, I; Ward, P; Naraghi, A; Dick, E A

    2007-01-01

    A need to understand the nature and patterns of bomb blast injury, particularly in confined spaces, has come to the fore with the current worldwide threat from terrorism. The purpose of this review article is to familiarize the radiologist with the imaging they might expect to see in a mass casualty terrorist event, illustrated by examples from two of the main institutions receiving patients from the London Underground tube blasts of 7 July 2005. We present examples of injuries that are typical in blast victims, as well as highlighting some blast sequelae that might also be found in other causes of multiple trauma. This should enable the radiologist to seek out typical injuries, including those that may not be initially clinically apparent. Terror-related injuries are often more severe than those seen in other trauma cases, and multi-system trauma at distant anatomical sites should be anticipated. We highlight the value of using a standardized imaging protocol to find clinically undetected traumatic effects and include a discussion on management of multiple human and non-human flying fragments. This review also discusses the role of radiology in the management and planning for a mass casualty terrorist incident and the optimal deployment of radiographic services during such an event.

  5. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  6. Sleep-disordered breathing in acute ischemic stroke and transient ischemic attack: effects on short- and long-term outcome and efficacy of treatment with continuous positive airways pressure--rationale and design of the SAS CARE study.

    Science.gov (United States)

    Cereda, Carlo W; Petrini, Liliane; Azzola, Andrea; Ciccone, Alfonso; Fischer, Urs; Gallino, Augusto; Györik, Sandor; Gugger, Matthias; Mattis, Johannes; Lavie, Lena; Limoni, Costanzo; Nobili, Lino; Manconi, Mauro; Ott, Sebastian; Pons, Marco; Bassetti, Claudio L

    2012-10-01

    Sleep-disordered breathing represents a risk factor for cardiovascular morbidity and mortality and negatively affects short-term and long-term outcome after an ischemic stroke or transient ischemic attack. The effect of continuous positive airways pressure in patients with sleep-disordered breathing and acute cerebrovascular event is poorly known. The SAS CARE 1 study assesses the effects of sleep-disordered breathing on clinical evolution, vascular functions, and markers within the first three-months after an acute cerebrovascular event. The SAS CARE 2 assesses the effect of continuous positive airways pressure on clinical evolution, cardiovascular events, and mortality as well as vascular functions and markers at 12 and 24 months after acute cerebrovascular event. SAS CARE 1 is an open, observational multicenter study in patients with acute cerebrovascular event acutely admitted in a stroke unit: a sample of 200 acute cerebrovascular event patients will be included. Vascular functions and markers (blood pressure, heart rate variability, endothelial function by peripheral arterial tonometry and specific humoral factors) will be assessed in the acute phase and at three-months follow-up. SAS CARE 2 will include a sample of patients with acute cerebrovascular event in the previous 60-90 days. After baseline assessments, the patients will be classified according to their apnea hypopnea index in four arms: non-sleep-disordered breathing patients (apnea hypopnea index acute cerebrovascular event and the feasibility/efficacy of continuous positive airways pressure treatment in selected patients with acute cerebrovascular event and sleep-disordered breathing. © 2012 The Authors. International Journal of Stroke © 2012 World Stroke Organization.

  7. An operated case with post-traumatic epilepsy following atomic bombing injury

    Energy Technology Data Exchange (ETDEWEB)

    Morioka, Takato; Nishio Shunji; Muraishi; Mitsuteru; Hisada, Kei; Takase, Keiichirou; Matsukado, Koichiro; Sasaki, Masayuki; Fukui, Masashi [Kyushu Univ., Fukuoka (Japan). Graduate School of Medicine; Ohta, Michiya

    1999-12-01

    The case was 54-years-old man who was bombed at 4-years old 1.5 km apart from the center of explosion in Hiroshima, and had intractable epilepsy after 10 years or more. He suffered from systemic convulsion from 18 years old and took anti-convulsant drugs from 23 years old. The frequency of seizure increased from once a half year to thrice 2 months for these 3-4 years. The attack mainly occurred at night, and it was generalized tonicoclonic convulsion accompanied with unconsciousness and urinary incontience. Valproate (1,800 mg) and clonazepam (1 mg) failed to control the attack, and then he was referred to author's hospital. By CT scanning, MRI and HMPAO-SPECT, the area around the ossified lesion in the right frontal lobe was considered the focus of the epilepsy, and the focus was removed on June 4, 1998. No neurodegeneration and convulsive seizure occurred after surgery. The ossified lesion was confirmed to be bone tissue containing osteoblasts from histological findings and was accompanied by severe gliosis to the brain surface. A large number of active astrocytes were found around the nerve cells in the cortex showing spine-like wave focus, but there were no significant changes in blood vessels in the brain. (K.H.)

  8. Is Einstein the Father of the Atomic Bomb

    Science.gov (United States)

    Lustig, Harry

    2009-05-01

    Soon after the American atomic bombs were dropped on Hiroshima and Nagasaki, the notion took hold in the popular mind that Albert Einstein was ``the father of the bomb.'' The claim of paternity rests on the belief that E=mc2 is what makes the release of enormous amounts of energy in the fission process possible and that the atomic bomb could not have been built without it. This is a misapprehension. Most physicists have known that all along. Nevertheless in his reaction to the opera Dr. Atomic, a prominent physicist claimed that Einstein's discovery that matter can be transformed into energy ``is precisely what made the bomb possible.'' In fact what makes the fission reaction and one of its applications,the atomic bomb, possible is the smaller binding energies of fission products compared to the binding energies of the nuclei that undergo fission.The binding energies of nuclei are a well understood consequence of the numbers and arrangements of protons and neutrons in the nucleus and of quantum-mechanical effects. The realization that composite systems have binding energies predates relativity. In the 19th century they were ascribed to potential and other forms of energy that reside in the system. With Einstein they became rest mass energy. While E=mc2 is not the cause of fission, measuring the masses of the participants in the reaction does permit an easy calculation of the kinetic energy that is released.

  9. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  10. The Rhetoric of "Unconditional Surrender" and the Decision to Drop the Atomic Bomb.

    Science.gov (United States)

    Hikins, James W.

    1983-01-01

    Analyzes the decision to drop the atomic bomb from a rhetorical point of view, arguing that the bombs were launched because of an American commitment to a particular rhetoric that focused on the propaganda slogan "unconditional surrender." (PD)

  11. Public knowledge of heart attack symptoms in Beijing residents

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-tan; HU Da-yi; YANG Jin-gang; ZHANG Shou-yan; ZHANG Xin-quan; LIU Shu-shan

    2007-01-01

    Background Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy,and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care.Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack.Methods A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006.Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community.Results A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms.Conclusions Public knowledge of common heart attack

  12. Forensic applications of {sup 14}C bomb-pulse dating

    Energy Technology Data Exchange (ETDEWEB)

    Zoppi, U. E-mail: ugo@ansto.gov.au; Skopec, Z.; Skopec, J.; Jones, G.; Fink, D.; Hua, Q.; Jacobsen, G.; Tuniz, C.; Williams, A

    2004-08-01

    After a brief review of the basics of {sup 14}C bomb-pulse dating, this paper presents two unique forensic applications. Particular attention is dedicated to the use of the {sup 14}C bomb-pulse to establish the time of harvest of illicit drugs such as heroin and opium. Preliminary measurements of {sup 14}C concentrations in milligram samples taken from seized drugs are presented. {sup 14}C bomb-pulse dating can determine whether drug distribution originates from stockpiles or recent manufacture, and support the action of law enforcement authorities against criminal organisations involved in drug trafficking. In addition, we describe the dating of wine vintages for a number of authenticated single label vintage red wines from the Barossa Valley - South Australia. Our results show that radiocarbon dating can be used to accurately determine wine vintages and therefore reveal the addition of unrelated materials of natural and synthetic origin.

  13. Reassessing the Bunbury Bombing: Juxtaposition of Political and Media Narratives

    Directory of Open Access Journals (Sweden)

    Kate O’Donnell

    2017-03-01

    Full Text Available This paper examines an Australian newspaper’s coverage of the bombing of an export port terminal in Bunbury, Western Australia on 19 July, 1976. We wanted to see how The West Australian newspaper framed the story, its precursor events, and the events that followed. We were particularly interested in whether the bombing was reported as an act of terrorism because the then Premier of Western Australia, Sir Charles Court, immediately decried it as “a gross act of terrorism.” We find the newspaper resisted the lure to apply this label, and couched the story in terms of serious criminality. However, it did so before the 1978 Hilton Hotel bombing; an event the news media heralded as the “arrival” of terrorism in Australia. Also, this occurred before what could be argued the sensationalist and politicised reporting of terror-related events became normalised.

  14. The anatomy of a shark attack: a case report and review of the literature.

    Science.gov (United States)

    Caldicott, D G; Mahajani, R; Kuhn, M

    2001-07-01

    Shark attacks are rare but are associated with a high morbidity and significant mortality. We report the case of a patient's survival from a shark attack and their subsequent emergency medical and surgical management. Using data from the International Shark Attack File, we review the worldwide distribution and incidence of shark attack. A review of the world literature examines the features which make shark attacks unique pathological processes. We offer suggestions for strategies of management of shark attack, and techniques for avoiding adverse outcomes in human encounters with these endangered creatures.

  15. Did NATO attacks in Yugoslavia cause a detectable environmental effect in Hungary?

    Science.gov (United States)

    Kerekes, A; Capote-Cuellar, A; Köteles, G J

    2001-02-01

    Because of the intensive NATO bombardment of the neighboring region to Hungary, i.e., Vojvodina, North Yugoslavia, air monitoring for detection of depleted uranium particles supposed to be used as a component of bullets was extended to the Southern region of the country. Alpha spectrometry was applied as a sensitive analytical technique able to detect uranium. Though no depleted uranium was detected in air by the sensitive technique of alpha-spectrometry, the increased uranium content in natural ratio as a component of normal soil, natural gas, etc., is suggested to originate from well dispersed dust (2.5 microm size) emitted to the atmosphere by explosions during bombing. This observation is supported by the geographical distribution and the relatively rapid decrease of pollution after the bomb attacks ceased.

  16. The development of the atomic bomb, Los Alamos

    Energy Technology Data Exchange (ETDEWEB)

    Seidel, R.W.

    1993-11-01

    The historical presentation begins with details of the selection of Los Alamos as the site of the Army installation. Wartime efforts of the Army Corps of Engineers, and scientists to include the leader of Los Alamos, Robert Oppenheimer are presented. The layout and construction of the facilities are discussed. The monumental design requirements of the bombs are discussed, including but not limited to the utilization of the second choice implosion method of detonation, and the production of bomb-grade nuclear explosives. The paper ends with a philosophical discussion on the use of nuclear weapons.

  17. The Manhattan Project: Making the Atomic Bomb. 1999 edition.

    Energy Technology Data Exchange (ETDEWEB)

    Gosling, F.G.

    1999-01-01

    ``The Manhattan Project: Making the Atomic Bomb`` is a short history of the origins and development of the American atomic bomb program during World War II. Beginning with the scientific developments of the pre-war years, the monograph details the role of the United States government in conducting a secret, nationwide enterprise that took science from the laboratory and into combat with an entirely new type of weapon. The monograph concludes with a discussion of the immediate postwar period, the debate over the Atomic Energy Act of 1946, and the founding of the Atomic Energy Commission.

  18. Deconstructing The Bomb: Confessions of a Nuclear Archeologist

    Science.gov (United States)

    Coster-Mullen, John

    2017-01-01

    I am the author of the groundbreaking book Atom Bombs: The Top Secret Inside Story of Little Boy and Fat Man. I will be sharing some of my quarter century of research and methodology that has allowed me to be the first researcher ever to unravel with an unprecedented level of accuracy, the most closely-guarded secrets of the first two Atomic Bombs (``Little Boy'' and ``Fat Man'') created by the Manhattan Project that were used to end WWII. I refer to this methodology as ``Nuclear Archeology'' and will demonstrate that this was done using entirely ``Open Sources'' of information.

  19. Hot-spring cure of atomic-bomb survivors, 16

    Energy Technology Data Exchange (ETDEWEB)

    Ouchi, Tamon (Beppu Genbaku Senta (Japan))

    1984-03-01

    Though a cold winter with snowfalls, in the fiscal year 1983, the number of the atomic-bomb sufferers using the Beppu Atomic-bomb Center (a medical hot spring) was large in January and February, 1984; throughout the fiscal year, the total number was about 3,800 persons. The diseases of the sufferers, mostly in locomotion organs, are such as osteoarthritis of spine, lame hip and knee arthropathy. Being the typical diseases for which hot spring treatment is good, the effect is clear, and those desiring to enter the Center twice in a year are increasing. The situation of usage of the Center from April, 1983, to March, 1984, is described.

  20. The Manhattan Project: Making the Atomic Bomb. 1999 edition.

    Science.gov (United States)

    Gosling, F. G.

    1999-01-01

    "The Manhattan Project: Making the Atomic Bomb" is a short history of the origins and development of the American atomic bomb program during World War II. Beginning with the scientific developments of the pre-war years, the monograph details the role of the United States government in conducting a secret, nationwide enterprise that took science from the laboratory and into combat with an entirely new type of weapon. The monograph concludes with a discussion of the immediate postwar period, the debate over the Atomic Energy Act of 1946, and the founding of the Atomic Energy Commission.

  1. Procedure Development to Determine the Heat of Combustion of an Energetic Liquid by Bomb Calorimetry

    Science.gov (United States)

    2015-01-01

    ENERGETIC LIQUID BY BOMB CALORIMETRY Peggy Sanchez Kimberly Griswold January 2015 Approved for public...2014 4. TITLE AND SUBTITLE PROCEDURE DEVELOPMENT TO DETERMINE THE HEAT OF COMBUSTION OF AN ENERGETIC LIQUID BY BOMB CALORIMETRY 5a. CONTRACT...experimentally determining the heat of formation of a liquid by bomb calorimetry can be challenging. Running the liquid pooled in the sample well leads to

  2. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  3. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  4. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  5. Age at exposure and attained age variations of cancer risk in the Japanese A-bomb and radiotherapy cohorts

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, Uwe, E-mail: uwe.schneider@uzh.ch [Institute of Physics, Science Faculty, University of Zürich, Zürich 8057, Switzerland and Radiotherapy Hirslanden, Uwe Schneider Institute of Radiotherapy, Witellikerstr. 40, Zürich 8032 (Switzerland); Walsh, Linda [Institute of Physics, Science Faculty, University of Zürich, Zürich 8057, Switzerland and BfS - Federal Office for Radiation Protection, Radiation Protection and Health, Neuherberg 85764 (Germany)

    2015-08-15

    Purpose: Phenomenological risk models for radiation-induced cancer are frequently applied to estimate the risk of radiation-induced cancers at radiotherapy doses. Such models often include the effect modification, of the main risk to radiation dose response, by age at exposure and attained age. The aim of this paper is to compare the patterns in risk effect modification by age, between models obtained from the Japanese atomic-bomb (A-bomb) survivor data and models for cancer risks previously reported for radiotherapy patients. Patterns in risk effect modification by age from the epidemiological studies of radiotherapy patients were also used to refine and extend the risk effect modification by age obtained from the A-bomb survivor data, so that more universal models can be presented here. Methods: Simple log-linear and power functions of age for the risk effect modification applied in models of the A-bomb survivor data are compared to risks from epidemiological studies of second cancers after radiotherapy. These functions of age were also refined and fitted to radiotherapy risks. The resulting age models provide a refined and extended functional dependence of risk with age at exposure and attained age especially beyond 40 and 65 yr, respectively, and provide a better representation than the currently available simple age functions. Results: It was found that the A-bomb models predict risk similarly to the outcomes of testicular cancer survivors. The survivors of Hodgkin’s disease show steeper variations of risk with both age at exposure and attained age. The extended models predict solid cancer risk increase as a function of age at exposure beyond 40 yr and the risk decrease as a function of attained age beyond 65 yr better than the simple models. Conclusions: The standard functions for risk effect modification by age, based on the A-bomb survivor data, predict second cancer risk in radiotherapy patients for ages at exposure prior to 40 yr and attained ages

  6. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  7. Locating bomb factories by detecting hydrogen peroxide.

    Science.gov (United States)

    Romolo, Francesco Saverio; Connell, Samantha; Ferrari, Carlotta; Suarez, Guillaume; Sauvain, Jean-Jacques; Hopf, Nancy B

    2016-11-01

    The analytical capability to detect hydrogen peroxide vapour can play a key role in localizing a site where a H2O2 based Improvised Explosive (IE) is manufactured. In security activities it is very important to obtain information in a short time. For this reason, an analytical method to be used in security activity needs portable devices. The authors have developed the first analytical method based on a portable luminometer, specifically designed and validated to locate IE manufacturing sites using quantitative on-site vapour analysis for H2O2. The method was tested both indoor and outdoor. The results demonstrate that the detection of H2O2 vapours could allow police forces to locate the site, while terrorists are preparing an attack. The collected data are also very important in developing new sensors, able to give an early alarm if located at a proper distance from a site where an H2O2 based IE is prepared.

  8. Genetic effects of radiation in atomic-bomb survivors and their children: past, present and future.

    Science.gov (United States)

    Nakamura, Nori

    2006-01-01

    Genetic studies in the offspring of atomic bomb survivors have been conducted since 1948 at the Atomic Bomb Casualty Commission and its successor, the Radiation Effects Research Foundation, in Hiroshima and Nagasaki. Past studies include analysis of birth defects (untoward pregnancy outcome; namely, malformation, stillbirth, and perinatal death), chromosome aberrations, alterations of plasma and erythrocyte proteins as well as epidemiologic study on mortality (any cause) and cancer incidence (the latter study is still ongoing). There is, thus far, no indication of genetic effects in the offspring of survivors. Recently, the development of molecular biological techniques and human genome sequence databases made it possible to analyze DNA from parents and their offspring (trio-analysis). In addition, a clinical program is underway to establish the frequency of adult-onset multi-factorial diseases (diabetes mellitus, high blood pressure, and cardiovascular disease etc) in the offspring. The complementary kinds of data that will emerge from this three-pronged approach (clinical, epidemiologic, and molecular aspects) promise to shed light on health effects in the offspring of radiation-exposed people.

  9. Before the bombing: High burden of traumatic injuries in Kunduz Trauma Center, Kunduz, Afghanistan.

    Science.gov (United States)

    Hemat, Hamayoun; Shah, Safieh; Isaakidis, Petros; Das, Mrinalini; Kyaw, Nang Thu Thu; Zaheer, Sattar; Qasemy, Abdul Qayeum; Zakir, Mutallib; Mahama, Gbane; Van Overloop, Catherine; Dominguez, Lynette

    2017-01-01

    Médecins Sans Frontières (MSF) has been providing healthcare in Afghanistan since 1981 including specialized health services for trauma patients in Kunduz Trauma Center (KTC) from 2011. On October 3rd, 2015, a US airstrike hit the KTC, killing 42 people including 14 MSF staff. This study aims to demonstrate the impact on healthcare provision, after hospital destruction, by assessing the extent of care provided for trauma and injuries by the MSF KTC and to report on treatment outcomes from January 2014 to June 2015, three months prior to the bombing. This is a descriptive, retrospective review of hospital records. All patients with traumatic injuries registered in the Emergency Department (ED) or hospitalized in In-Patients Department (IPD) and/or Intensive Care Unit (ICU) of KTC between January 2014 and June 2015 were included in the study. A total of 35647 patients were registered in KTC during the study period. 3199 patients registered in the ED were children aged Trauma Center's contribution to saving lives, preventing disabilities and alleviating suffering among adults and children within the region. The bombing and destruction of KTC has resulted in a specific gap in critical healthcare services for the local communities in the health system of this war-ravaged region. This suggests the urgent need for reconstruction and re-opening of the center.

  10. Plant defence responses in oilseed rape MINELESS plants after attack by the cabbage moth Mamestra brassicae.

    Science.gov (United States)

    Ahuja, Ishita; van Dam, Nicole Marie; Winge, Per; Trælnes, Marianne; Heydarova, Aysel; Rohloff, Jens; Langaas, Mette; Bones, Atle Magnar

    2015-02-01

    The Brassicaceae family is characterized by a unique defence mechanism known as the 'glucosinolate-myrosinase' system. When insect herbivores attack plant tissues, glucosinolates are hydrolysed by the enzyme myrosinase (EC 3.2.1.147) into a variety of degradation products, which can deter further herbivory. This process has been described as 'the mustard oil bomb'. Additionally, insect damage induces the production of glucosinolates, myrosinase, and other defences. Brassica napus seeds have been genetically modified to remove myrosinase-containing myrosin cells. These plants are termed MINELESS because they lack myrosin cells, the so-called toxic mustard oil mines. Here, we examined the interaction between B. napus wild-type and MINELESS plants and the larvae of the cabbage moth Mamestra brassicae. No-choice feeding experiments showed that M. brassicae larvae gained less weight and showed stunted growth when feeding on MINELESS plants compared to feeding on wild-type plants. M. brassicae feeding didn't affect myrosinase activity in MINELESS plants, but did reduce it in wild-type seedlings. M. brassicae feeding increased the levels of indol-3-yl-methyl, 1-methoxy-indol-3-yl-methyl, and total glucosinolates in both wild-type and MINELESS seedlings. M. brassicae feeding affected the levels of glucosinolate hydrolysis products in both wild-type and MINELESS plants. Transcriptional analysis showed that 494 and 159 genes were differentially regulated after M. brassicae feeding on wild-type and MINELESS seedlings, respectively. Taken together, the outcomes are very interesting in terms of analysing the role of myrosin cells and the glucosinolate-myrosinase defence system in response to a generalist cabbage moth, suggesting that similar studies with other generalist or specialist insect herbivores, including above- and below-ground herbivores, would be useful.

  11. Genomic instability in the epidermis induced by atomic bomb (A-bomb) radiation: a long-lasting health effect in A-bomb survivors.

    Science.gov (United States)

    Naruke, Yuki; Nakashima, Masahiro; Suzuki, Keiji; Kondo, Hisayoshi; Hayashi, Tomayoshi; Soda, Midori; Sekine, Ichiro

    2009-08-15

    Radiation etiology is suggested in the occurrence of basal cell carcinoma (BCC) of the skin among atomic bomb (A-bomb) survivors. Any genotoxicity, including ionizing radiation, can induce a DNA damage response (DDR), leading to genomic instability (GIN), which allows the accumulation of mutations during tumorigenesis. In this study, the authors evaluated the presence of GIN in the epidermis of survivors as a late effect of A-bomb radiation. In total, 146 BCCs, including 23 cases arising from nonexposed skin, were identified in survivors from 1968 to 1999. The incidence rate (IR) of BCC was calculated with stratification by distance in kilometers from the hypocenter ( or =3 km). Nineteen epidermal samples surrounding BCC at the nonexposed sites were collected and tested for p53 binding protein 1 (53BP1) expression with immunofluorescence. 53BP1 rapidly forms nuclear foci at the sites of DNA double strand breaks (DSBs). Because 1 manifestation of GIN is the induction of endogenous DSBs, the level of 53BP1-focus formation (DDR type) can be considered as a marker for GIN. : The incidence rate of BCC increased significantly as exposure distance approached the hypocenter. Of the 7 epidermal samples from the proximal group ( or =3 km) and all samples from the control group predominantly expressed the stable type of 53BP1 expression in the epidermis. : The current results demonstrated the endogenous activation of DDR in the epidermis surrounding BCC in the proximal group, suggesting the presence of a GIN in the survivors as a late effect of A-bomb radiation, which may indicate a predisposition to cancer.

  12. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  13. Health survey of atomic bomb survivors in South Korea

    Energy Technology Data Exchange (ETDEWEB)

    Arita, Ken-ichi; Iwamori, Hiroshi; Kishi, Akihiro; Koutoku, Michiya.

    1988-05-01

    Health survey was undertaken among Korea survivors exposed to atomic bomb in Japan who now reside in South Korea. Of 232 A-bomb survivors on whom raditation exposure information was available, all were exposed to atomic bomb in Hiroshima. According to the distance from the hypocenter, one (0.4 %) A-bomb survior was exposed at < 1,000 m, 60 (25.9 %) at 1,000 - 2,000 m, 124 (53.4 %) at > 2,000 - 3,000 m, and 43 (18.5 %) at < 3,000 m. In the four remaining, it was unknown. According to age, 14.7 % were in their forties, 33.6 % in their fifties, 32.6 % in their sixties, 16.0 % in their severties, and 3.1 % in their eighties, indicating the tendency for the aging of older persons. Common subjective symptoms were lumbar pain and joint pain, which seemed atributable to osteoarthritis. Other diseases included hypertension, chronic obstructive pulmonary disease, sequelae of cerebral stroke, eczema, and mycosis. (Namekawa, K.).

  14. Malignant Lymphoma in an Atomic-bomb Survivor

    Directory of Open Access Journals (Sweden)

    Cheng-Chia Lee

    2009-07-01

    Full Text Available Atomic bomb survivors outside of Japan are few and often hard to follow-up. Spinal malignant lymphoma among these survivors is rare in established studies from Japan or the United States. Here, we report an 81-year-old woman, who experienced the atomic bomb explosion in Nagasaki when she was 19 years old, who presented with papillary thyroid carcinoma when she was 70 years old. Both follicular lymphoma over the right elbow region and vertebral malignant lymphoma were found when she turned 81 years old. Bone scan did not show any increased uptake of isotope. However, thoracolumbar spine magnetic resonance imaging showed multiple infiltrative soft tissue masses involving vertebral bodies at the T10–11 level. Computed tomography-guided biopsy further showed lymphocyte infiltration. Fortunately, the neurological deficit was improved after chemotherapy. The diagnosis of malignant lymphoma in atomic bomb survivors should be more careful and aggressive, even when their bone scan results show negative findings. In addition, the authors suggest that atomic bomb survivors should be followed-up carefully throughout their entire life.

  15. Bombing beyond Democracy. Remembering the Ruins of Europe

    DEFF Research Database (Denmark)

    Hoffmann, Birthe

    2013-01-01

    to rewrite national narratives of the war that of course have served very different purposes. The case in point will be the debate on the allied, specifically the British bombing strategy in World War II, which has evolved since the end of the Cold War. In Britain as well as in the Germany, the debate...

  16. Accurate dating with radiocarbon from the atom bomb tests

    CSIR Research Space (South Africa)

    Vogel, JC

    2002-09-01

    Full Text Available The artificial radiocarbon produced by the thermonuclear bomb tests in the 1950s and 1960s significantly increased the level of C-14 in the environment. A detailed record of the subsequent changes in the C-14 concentration of the atmosphere can...

  17. Characterising argon-bomb balloons for high-speed photography

    CSIR Research Space (South Africa)

    Olivier, M

    2013-08-01

    Full Text Available A method to optimise the geometry, explosive charge mass and volume of an argon bomb for specific lighting requirements has been proposed. The method is specifically aimed at applications that require photographic diagnostics with ultra-high speed...

  18. Alabama University Professor's View of the Birmingham Bombing Trial.

    Science.gov (United States)

    Journal of Blacks in Higher Education, 2001

    2001-01-01

    Presents the views of Alabama university scholars regarding the historical significance of the 2001 trial of Thomas Blanton for his role in the Ku Klux Klan bombing of the Sixteenth Street Baptist church in Birmingham, Alabama thet killed four girls. Their discussions note the need to examine the American judicial system, the weak case against Mr.…

  19. Lack of strategic insight: the "dirty bomb" effort.

    Science.gov (United States)

    Goffman, Tom

    2009-01-01

    Multiple countries including the United States and France are investing heavily in countermeasures to the threat of a "dirty bomb." All of the machinery simply involves a variation on a Geiger counter that picks up excess photon irradiation. Classically, a "dirty bomb" is defined as a dangerous radioactive material mixed in a variety of ways with high explosive, so when detonated, radioactive material is dispersed. Solid radioactive material such as Cesium or Cobalt sends off very penetrating ('hard') photons from which one cannot simply be protected by sheet lead or a heavy door. For official occasions with dignitaries of State, such a bomb could prove a modest distraction, but simple radiation physics suggests such a bomb would be limited in the damage it could cause, would largely be a mess to be cleaned up by an appropriately trained crew, would involve a very confined area, and thoroughly fails to comprehend the mentality of al-Queda 'central' that wishes to follow 9/11 with an equal or greater show of terrorist force. The author would argue this sort of mind-think occurs when you have too few people in the hard sciences in your intelligence sections.

  20. The toxicology of zinc chloride smoke producing bombs and screens

    NARCIS (Netherlands)

    El Idrissi, Ayman; van Berkel, Lisanne; Bonekamp, Nadia E; Dalemans, Diana J Z; van der Heyden, Marcel A G|info:eu-repo/dai/nl/14276082X

    2017-01-01

    CONTEXT: Zinc chloride (ZnCl2)-based smoke bombs and screens are in use since the Second World War (1939-1945). Many case descriptions on ZnCl2 smoke inhalation incidents appeared since 1945. OBJECTIVE: We provide a comprehensive overview of the clinical symptoms and underlying pathophysiology due t

  1. The toxicology of zinc chloride smoke producing bombs and screens

    NARCIS (Netherlands)

    El Idrissi, Ayman; van Berkel, Lisanne; Bonekamp, Nadia E; Dalemans, Diana J Z; van der Heyden, Marcel A G

    CONTEXT: Zinc chloride (ZnCl2)-based smoke bombs and screens are in use since the Second World War (1939-1945). Many case descriptions on ZnCl2 smoke inhalation incidents appeared since 1945. OBJECTIVE: We provide a comprehensive overview of the clinical symptoms and underlying pathophysiology due

  2. A Guide for Explosion and Bombing Scene Investigation. Research Report.

    Science.gov (United States)

    Department of Justice, Washington, DC. National Inst. of Justice.

    This document presents an investigative outline of the tasks that law enforcement personnel should consider at every bombing and explosion scene. The following are among the topics discussed in the guide's seven sections: (1) procuring equipment and tools (safety, general crime scene tools/equipment, scene documentation, evidence collection,…

  3. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  4. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  5. Dynamic processes associated with the eastern Mediterranean 'bomb' of 2004

    Science.gov (United States)

    Karacostas, T. S.; Brikas, D.; Pytharoulis, I.

    2010-09-01

    The meteorological "bomb" of the 21st and 22nd of January 2004, that affected the eastern Aegean Sea with very strong winds reaching 80 kts, excessive rain and even snow, with accumulations of at least one (1) meter on Limnos island and mean sea-level pressure at the record level of 972 hPa on Ikaria island, is studied from the synoptic and mostly dynamic concept. Lagouvardos and co-authors have already proved that the upper tropospheric PV anomaly was a necessary ingredient of the explosive cyclogenesis and the latter was attributed to the merger of troughs coming from North Africa and Europe. The present study is mainly concerned with the dynamic processes that led to the explosive cyclogenesis of 21 - 22 January 2004. Relying upon the use of the original ECMWF data information, a serious attempt is made to investigate, verify and justify the space and time of the "bomb explosion", the accompanied characteristics and the reasons causing the cyclolysis. Upper and lower tropospheric level forcing mechanisms are identified and monitored and a quantitative dynamical picture is provided for the explosively (pre) cyclogenetic period. The explosive cyclogenesis begins in Gabes Sea, just off the Libyan coast, the low forming on a frontogenetically active occlusion of a Saharan depression, when a tropopause fold/upper level front system crosses aloft. The occlusion is traced back to the Sahara desert, as a low level convergence/frontal zone, along which Qs vectors indicate an anticyclonic rotation of the warm part of the front. Dynamic tropopause maps show significant cold air advection just upstream the area of surface cyclogenesis on the 21st of January 2004. Consequently, an upper level vortex forms, which perturbs the thermal field, maximizing Q vector convergence above the bomb. Gradually the role of the tropopause decreases, as the upper level front system weakens. During these initial stages, when the low level vortex of the bomb is not yet well defined, the

  6. Imaginary Savior: the image of the nuclear bomb in Korea, 1945-1960.

    Science.gov (United States)

    Kim, Dong-Won

    2009-01-01

    Two atomic bombs dropped on Hiroshima and Nagasaki in August 1945 brought the unexpected liberation of Korea from the 35-year Japanese occupation. Koreans therefore had a very favorable and positive image of the nuclear bomb and nuclear energy from the beginning. The image of the nuclear bomb as "savior" was strengthened during the Korean War when the United States openly mentioned the possible use of the nuclear bomb against North Korean and Chinese military. After the end of the Korean War in July 1953 South Koreans strongly supported the development of the nuclear bomb in order to deter another North Korean invasion. When the US government provided South Korea with a research nuclear reactor in the late 1950s, most South Koreans hailed it as the first step to developing their own nuclear bomb. This paper will analyze how and why the savior image of the nuclear bomb originated and spread in Korea during the 1950s.

  7. Automatic behavior sensing for a bomb-detecting dog

    Science.gov (United States)

    Nguyen, Hoa G.; Nans, Adam; Talke, Kurt; Candela, Paul; Everett, H. R.

    2015-05-01

    Bomb-detecting dogs are trained to detect explosives through their sense of smell and often perform a specific behavior to indicate a possible bomb detection. This behavior is noticed by the dog handler, who confirms the probable explosives, determines the location, and forwards the information to an explosive ordnance disposal (EOD) team. To improve the speed and accuracy of this process and better integrate it with the EOD team's robotic explosive disposal operation, SPAWAR Systems Center Pacific has designed and prototyped an electronic dog collar that automatically tracks the dog's location and attitude, detects the indicative behavior, and records the data. To account for the differences between dogs, a 5-minute training routine can be executed before the mission to establish initial values for the k-mean clustering algorithm that classifies a specific dog's behavior. The recorded data include GPS location of the suspected bomb, the path the dog took to approach this location, and a video clip covering the detection event. The dog handler reviews and confirms the data before it is packaged up and forwarded on to the EOD team. The EOD team uses the video clip to better identify the type of bomb and for awareness of the surrounding environment before they arrive at the scene. Before the robotic neutralization operation commences at the site, the location and path data (which are supplied in a format understandable by the next-generation EOD robots—the Advanced EOD Robotic System) can be loaded into the robotic controller to automatically guide the robot to the bomb site. This paper describes the project with emphasis on the dog-collar hardware, behavior-classification software, and feasibility testing.

  8. Physical injuries and fatalities resulting from the Oklahoma City bombing.

    Science.gov (United States)

    Mallonee, S; Shariat, S; Stennies, G; Waxweiler, R; Hogan, D; Jordan, F

    1996-08-07

    To provide an epidemiologic description of physical injuries and fatalities resulting from the April 19, 1995, bombing of the Alfred P. Murrah Federal Building in Oklahoma City. Descriptive epidemiologic study of all persons injured by the bombing and of all at-risk occupants of the federal building and 4 adjacent buildings. Data were gathered from hospital emergency and medical records departments, medical examiner records, and surveys of area physicians, building occupants, and survivors. All persons known to have been exposed to the blast. Characteristics of fatalities and injuries, injury maps, and injury rates by building location. A total of 759 persons sustained injuries, 167 persons died, 83 survivors were hospitalized, and 509 persons were treated as outpatients. Of the 361 persons who were in the federal building, 319 (88%) were injured, of whom 163 (45%) died, including 19 children. Persons in the collapsed part of the federal building were significantly more likely to die (153/175, 87%) than those in other parts of the building (10/186, 5%) (risk ratio [RR], 16.3; 95% confidence interval [CI], 8.9-29.8). In 4 adjacent buildings, injury rates varied from 38% to 100%; 3 persons in these buildings and 1 person in an outdoor location died. The most frequent cause of death was multiple injuries. Among survivors, soft tissue injuries, fractures, sprains, strains, and head injuries were most common; these injuries were most often caused by flying glass and other debris and collapsed ceilings. The Oklahoma City bombing resulted in the largest number of fatalities of any terrorist act in the United States, and there were 4 times as many nonfatal injuries as fatalities. Disaster management plans should include the possibility of terrorist bombing, and medical preparedness should anticipate that most injuries will be nonfatal. The role of building collapse in fatal injuries should be considered in the design of buildings at high risk of being bombed so as to

  9. The mental health state of atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Nakane, Yoshibumi; Imamura, Yoshihiro; Yoshitake, Kazuyasu; Honda, Sumihisa; Mine, Mariko; Hatada, Keiko; Tomonaga, Masao [Nagasaki Univ. (Japan). School of Medicine; Tagawa, Masuko

    1997-03-01

    Our department of Neuropsychiatry has clarified the clinical features of several mental disorders and surveyed the causes of those disorders from the psychosocial aspect using the methodology of epidemiological psychiatric approach. Using this previous research experience, we began a long-planned study to examine the mental health state of atomic bomb survivors. Fifty-one years have passed since the atomic bombing, and the survivors must have suffered various psychosocial stresses, other than any direct effect on the central nervous system from exposure to radiation, and it is assumed that victims` mental state has been affected in various ways as a result. The subjects of the survey were 7,670 people who had regular health examinations for atomic bomb survivors during the study period of three years and who consented to participate in the study. Of the total, 226 subjects were selected for a second phase according to the results of the General Health Questionnaire 12-item Version which was used in the first phase of the survey. The results were as follows: 1. The distance from the hypocenter was related to the degree of ill health, and the percentage of people with a high score was greater among those exposed to the atomic bomb in proximity to the hypocenter. 2. 14.6% of the subjects were diagnosed as having some kind of mental disorders according to clinical interviews by trained psychiatrists. These results had not expected prior to the study. On the based of the study, we will try to establish a mental health support system for atomic bomb survivors. (author)

  10. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  11. Anatomy of the Lockerbie bombing: Libya’s role and reactions to al-Megrahi’s release.

    Directory of Open Access Journals (Sweden)

    K. J. Ani

    2015-04-01

    Full Text Available Despite its long historical antecedents, terrorism is amongst the growing realities of the national history of contemporary sovereign states. With this emergence, destabilizing influence, and internationalization, terrorism has made the associated security challenge a major diplomatic headache for all key international actors and diplomats. This paper, which adopts a theoretical approach, assesses claims that Ghadafi’s Libya championed state-sponsored terrorism. It reviews the Lockerbie bombing and the conviction of al-Megrahi by the court in Netherland as well as his release from Scottish prison on compassionate grounds. It examines Libya’s use of available diplomatic tools and channels not only to prevent Abdelbaset Ali Mohammed al-Megrahi from facing justice but also to attain Ghadafi’s political and economic interests. This article documents the political communication that followed his release and calls for increased diplomatic investigations of the Lockerbie terrorist attack. Finally, the paper beckons on Libya’s new leaders and the leaderships of USA and Scotland to engage in a progressive multilateral strategic cooperation to unravel further facts on the Lockerbie bombing while promoting the current international “war” against terrorism

  12. What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response.

    Directory of Open Access Journals (Sweden)

    Jeannette Sutton

    Full Text Available Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials' Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events.

  13. Air Attack on America?: Vulnerabilities, Capabilities, and Implications of the Air Defense of the United States

    Science.gov (United States)

    2013-06-01

    development of anti-ballistic missile ( ABM ) technology is outside the purview of the individual services. The threat is limited to ballistic... ABCs .” This article was supposed to answer questions such as: “Will the Russians make an atom-bomb attack on the U.S.? If it comes, what is the...We Accuse!,” Harper’s Magazine, October 1954, 43. 28 Time, “Atomic ABCs ,” Time, 21 August 1950, 16. 60 Service Has Entered the Supersonic Age

  14. An assessment of the terrorist threat to use a nuclear or radiological device in an attack

    Energy Technology Data Exchange (ETDEWEB)

    Kingshott, B.F. [Grand Valley State University, 275C DeVos Center, 401 West Fulton Street, Grand Rapids, MI 49504 (United States)]. E-mail: kingshob@gvsu.edu

    2006-07-01

    This paper will discuss terrorism from the perspective of a terrorist organisation acquiring nuclear material to build weapons and how security of radiological material world wide will minimise the risk of such devices being used. It will discuss the need to improve security at nuclear waste processing and storage sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device containing nuclear material be detonated. (author)

  15. 'What to do if it happens': planners, pamphlets and propaganda in the age of the H-bomb.

    Science.gov (United States)

    Smith, Melissa

    2009-06-01

    In 1955, a highly secret Government report painted a bleak picture of Britain after a nuclear war. Without greatly improved civil defence measures, the report warned, a hydrogen bomb attack on Britain could kill one-third of the population within 24h and leave swathes of land uninhabitable. But Government advice to the public told a different story, offering cheerful advice about vacuuming up radioactive fallout and building shelters from books and furniture. Meanwhile, civil defence spending cuts left the public lacking even the standard of protection they had enjoyed during the Second World War. This seemingly paradoxical Government response was shaped by conflicting financial and political pressures, and by the work of the Home Office scientists whose research underpinned British civil defence planning.

  16. Medical examination of A-bomb survivors on Nagasaki A-bomb Casualty

    Energy Technology Data Exchange (ETDEWEB)

    Tagawa, Masuko [Nagasaki Atomic Bomb Casualty Council (Japan)

    1996-03-01

    Medical examination of A-bomb survivors was described and discussed on history, time change of examinee number, action for subjects not examined, change of prevalence, cancer examination, examination for the second generation, and education and enlightenment. Free examination of the survivors was begun in 1953 and the present casualty was made in 1958 on the law for medical care for the survivors. Systematic examination started from 1967 and the examination for the 2nd generation, from 1974. Cancer examination was from 1988. The number of the survivors was the maximum of 82,439 in 1974 and decreased to 61,388 in 1994, when the actual number of examinees, which being rather settled recently, was 32,294 and their average age was 64 y. The examination is done by tour or at the Center. Subjects receive the information of the examination twice by mail. Hematopoietic diseases like anemia, hepatic ones, metabolic and endocrinic ones like diabetes, renal impairment and others (mostly hyperlipidemia) are increasing recently. The number of examinees for cancer is increasing. Lung cancer is examined by the direct roentgenography, gastric cancer by transillumination, and other cancers like myeloma, those in large bowel, uterus and mammary gland, by the respective suitable methods. Health education and enlightenment have been conceivably effective. (H.O.)

  17. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  18. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  19. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  20. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  1. Aerosolization of Water Ejected from a Full Container Impacted by Bomb Fragments

    Directory of Open Access Journals (Sweden)

    Leo W. Stockham

    2012-01-01

    Full Text Available In assessing the potential collateral effects of bomb attacks on tanks of stored liquids, it is useful to separate the liquid that is aerosolized as an escaping cloud from that which remains inside the tank or rapidly falls to the nearby ground. One relationship currently in use partitions the two categories using a linear model of aerosolized fraction versus fragment energy deposited per unit mass of liquid which is based on calculations and a few test data points. Since this model is incorporated in popular programs used by an expanding number of first responders to assess potential hazards, there is a need for high-confidence test data across the parameter space of interest to improve and/or validate the model. Such a series of tests was conducted during November of 2008 in which 7.57-liter (ℓ sized cans of water were impacted with fragments of known mass using scored cased explosive charges. Impact velocities were measured, and the remaining water in the can and on the nearby ground platform was collected and weighed. The missing water was assumed to be aerosolized. This new data establishes an S-curve as a more accurate relationship between aerosolized fraction (AF and the fragment energy deposited per unit mass of liquid in the container.

  2. Blast Injuries: From Improvised Explosive Device Blasts to the Boston Marathon Bombing.

    Science.gov (United States)

    Singh, Ajay K; Ditkofsky, Noah G; York, John D; Abujudeh, Hani H; Avery, Laura A; Brunner, John F; Sodickson, Aaron D; Lev, Michael H

    2016-01-01

    Although most trauma centers have experience with the imaging and management of gunshot wounds, in most regions blast wounds such as the ones encountered in terrorist attacks with the use of improvised explosive devices (IEDs) are infrequently encountered outside the battlefield. As global terrorism becomes a greater concern, it is important that radiologists, particularly those working in urban trauma centers, be aware of the mechanisms of injury and the spectrum of primary, secondary, tertiary, and quaternary blast injury patterns. Primary blast injuries are caused by barotrauma from the initial increased pressure of the explosive detonation and the rarefaction of the atmosphere immediately afterward. Secondary blast injuries are caused by debris carried by the blast wind and most often result in penetrating trauma from small shrapnel. Tertiary blast injuries are caused by the physical displacement of the victim and the wide variety of blunt or penetrating trauma sustained as a result of the patient impacting immovable objects such as surrounding cars, walls, or fences. Quaternary blast injuries include all other injuries, such as burns, crush injuries, and inhalational injuries. Radiography is considered the initial imaging modality for assessment of shrapnel and fractures. Computed tomography is the optimal test to assess penetrating chest, abdominal, and head trauma. The mechanism of blast injuries and the imaging experience of the victims of the Boston Marathon bombing are detailed, as well as musculoskeletal, neurologic, gastrointestinal, and pulmonary injury patterns from blast injuries.

  3. Physicists and the 1945 Decision to Drop the Bomb

    CERN Document Server

    Byers, N

    2002-01-01

    In 1943 fear that the German war machine might use atomic bombs was abating and among physicists another fear was taking its place - that of a postwar nuclear arms race with worldwide proliferation of nuclear weapons. Manhattan Project scientists and engineers began to discuss uses of nuclear energy in the postwar world. Niels Bohr, Leo Szilard, James A. Franck and others launched a concerted effort to lay groundwork for international control of the technology. Realizing the devastation nuclear weapons could cause and that they could be made and delivered much more cheaply than conventional weapons of the same power, they tried to persuade policy makers to take into account long range consequences of using atomic bombs and not base their decisions on short range military expediency alone. They met with little success. The scientists' main message, unheeded then and very relevant now, is that worldwide international agreements are needed to provide for inspection and control of nuclear weapons technology. Thei...

  4. Increased relative risk of myelodysplastic syndrome in atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Oda, Kenji [Hiroshima City Hospital (Japan); Kimura, Akiro; Matsuo, Tatsuki; Tomonaga, Masao; Kodama, Kazunori; Mabuchi, Kiyohiko

    1998-12-01

    It was investigated what blood disorders except leukemia increased the relative risk with dose dependency in atomic bomb survivors. Subjects were 217 patients of atomic bomb survivors in Hiroshima and Nagasaki, who had blood disorders except leukemia and died between 1950 and 1990. Their medical records were analyzed and their diagnoses were reevaluated. Sixteen cases were diagnosed as the aplastic anemia and 12 as the myelodysplastic syndrome (MDS). In the aplastic anemia, there was no correlation between the exposure dose and the mortality. In MDS, the excess relative risk (ERR)/bone marrow exposure dose of 1 Sv was very high (13.0). These results supports the hypothesis that MDS would be broken out by the clonal abnormality of the hematopoietic stem cell and radiation exposure could cause the appearance of the abnormal stem cell clone. (K.H.)

  5. By emotion, no atomic bomb and no blackhole

    Science.gov (United States)

    Shin, Philip

    2011-10-01

    As to be, we glory to God and that is basic theology for christian. And I want to say that BE means just thinking. There is no clue of nature and no proposition to prove it. I just believe by feeling and emotion. I trust that it can be the physic really. As for me, I believe when there is atomic bomb, than anytime it has to blow out the world each time of we are living. So the atomic bomb we thinking is just accident and not by the atomic theory. Also when there is blackhole, than there must be the wall to block me forever and never to walk again. So there are no blackhole. And these two subject is the best two subject for the physic.

  6. Fallout from atmospheric bomb tests and releases from nuclear installations

    Science.gov (United States)

    Völkle, H.; Murith, C.; Surbeck, H.

    This work presents the radioactivity monitoring programme in Switzerland. Environmental radioactivity measurements for atomic bomb test fallout are discussed together with the radiation doses to the public caused by fallout. In the second part the monitoring programme around nuclear power stations is presented. The radioactivity releases to the environment, the results of the monitoring programme and the radiation doses to the public in the vicinity of the plants are discussed.

  7. Cancer mortality among atomic bomb survivors exposed as children.

    Science.gov (United States)

    Goto, Hitomi; Watanabe, Tomoyuki; Miyao, Masaru; Fukuda, Hiromi; Sato, Yuzo; Oshida, Yoshiharu

    2012-05-01

    To compare cancer mortality among A-bomb survivors exposed as children with cancer mortality among an unexposed control group (the entire population of Japan, JPCG). The subjects were the Hiroshima and Nagasaki A-bomb survivor groups (0-14 years of age in 1945) reported in life span study report 12 (follow-up years were from 1950 to 1990), and a control group consisting of the JPCG. We estimated the expected number of deaths due to all causes and cancers of various causes among the exposed survivors who died in the follow-up interval, if they had died with the same mortality as the JPCG (0-14 years of age in 1945). We calculated the standardized mortality ratio (SMR) of A-bomb survivors in comparison with the JPCG. SMRs were significantly higher in exposed boys overall for all deaths, all cancers, leukemia, and liver cancer, and for exposed girls overall for all cancers, solid cancers, liver cancer, and breast cancer. In boys, SMRs were significantly higher for all deaths and liver cancer even in those exposed to very low doses, and for all cancers, solid cancers, and liver cancer in those exposed to low doses. In girls, SMRs were significantly higher for liver cancer and uterine cancer in those exposed to low doses, and for leukemia, solid cancers, stomach cancer, and breast cancer in those exposed to high doses. We calculated the SMRs for the A-bomb survivors versus JPCG in childhood and compared them with a true non-exposed group. A notable result was that SMRs in boys exposed to low doses were significantly higher for solid cancer.

  8. Forensic Medicine: Age Written in Teeth by Nuclear Bomb Tests

    Energy Technology Data Exchange (ETDEWEB)

    Lawrence Livermore National Laboratory

    2005-05-04

    Establishing the age of individuals is an important step in identification and a frequent challenge in forensic medicine. This can be done with high precision up to adolescence by analysis of dentition, but establishing the age of adults has remained difficult. Here we show that measuring {sup 14}C from nuclear bomb tests in tooth enamel provides a sensitive way to establish when a person was born.

  9. Surveys right after the atomic bombing and a relief squad

    Energy Technology Data Exchange (ETDEWEB)

    Mine, Mariko [Nagasaki Univ. (Japan). School of Medicine

    1998-12-01

    An outline of four survey reports right after the atomic bombing in Nagasaki and Hiroshima is introduced. The report of Manhattan District Atomic Bomb Investigating Groups: The subjects of this survey were 900 inpatients in Nagasaki (for 16 days from September 20) and Hiroshima (for 5 days from October 3). Two hundreds and forty-nine patients (16%) died. In cases died without injury, the severe symptoms were alopecia, purpura, hemorrhage, oral cavity and pharynx lesion, vomiting, diarrhea and fever. The residual radioactivity measured at six weeks later was 6-25 roentgen in Hiroshima and 30-110 roentgen in Nagasaki (Nishiyama riverhead area). These values were lower than the predicted value from the clinical consequence. The report of Joint Commission for the Investigation of the Atomic Bomb: Following the above survey, about 6500 subjects were investigated both in Nagasaki and Hiroshima. Incidence of alopecia was investigated by shielded situation at a spot of 2.1 to 2.5 km from a blast center. It was 7.2% of outdoors (shielded: 7.3%, non-shielded: 17.4%) and 2.9% of indoors. The report of the Special Committee for Atomic Bomb Casualty Investigation and Research of the Scientific Research Council of Japan: General part of the report consists of medical part and physical part, and reports from each university were classified and listed in the supplement. Survey of Nagasaki Medical College (not in public): About 8000 subjects were investigated from October to December. Data were gathered up about lethality, time of death, injury and radiation sickness, etc. There was also autograph of a relief squad of the Nagasaki Medical College. (K.H.)

  10. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  11. A-bomb radiation and diseases; M proteinemia

    Energy Technology Data Exchange (ETDEWEB)

    Fujimura, Kingo (Hiroshima Univ. (Japan). Research Inst. for Nuclear Medicine and Biology); Ito, Chikako

    1994-03-01

    Mass health screening was conducted in 65,483 A-bomb survivors (23,153 men and 42,336 women). Among them, 553 (0.84%) was found to have M proteinemia. The incidence of M proteinemia was higher in men (1.1%) than women (0.72%). M proteinemia was simply classified as benign monoclonal gammopathy (BMG) in 372 A-bomb survivors (67.3%), pre-myeloma (PreMM) in 81 (14.6%), myeloma (MM) in 77 (13.9%), and macroglobulinemia in 23 (4.2%). A higher incidence of M proteinemia was associated with aging; it was rapidly increased in the age-group of 70. Death was seen in 45 (8%) of all cases, frequently due to vascular disorder and cancer. Some of the BMG cases had a long process or developed either PreMM or MM. The incidence of BMG was significantly higher in the group of A-bomb survivors exposed to 100 rad or more than the control group. (N.K.).

  12. Confronting the bomber: coping at the site of previous terror attacks.

    Science.gov (United States)

    Strous, Rael D; Mishaeli, Nurit; Ranen, Yaniv; Benatov, Joy; Green, Dovid; Zivotofsky, Ari Z

    2007-03-01

    Terror exposure has become commonplace in Israel, with civilians needing to develop appropriate coping mechanisms. This study investigated coping mechanisms of those who are able to return to leisure activity at sites of previous terror attacks. A specially designed questionnaire, exploring knowledge of the terror event, previous terror exposure, coping mechanisms, state of anxiety, and mood, was administered to 93 restaurant attendees at sites of well-known recent terror attacks (2001-2005). Most respondents were aware of the previous terror attack (92.3%) and most reported no fear at revisiting (70.3%), with 20.9% reporting some anxiety and 5.5% reporting moderate or severe anxiety. Sixty percent reported that they have no fear that a terror attack will reoccur at the same place. Some (27.7%) reported change in practices or decrease in one or more activity, especially use of public transport (18%). The most helpful reported resource for facilitating stress coping following a suicide bombing was to "call or be in touch with friends or relatives," and least helpful was "medicines." Over half of respondents (53%) reported that the current security climate affected their mood. Older individuals and females were more affected by terror events. Study observations confirm that resilience develops in the general population in response to ongoing terror attacks. Response to terror is heterogeneous with a range of coping mechanisms expressed.

  13. Hereditary angioedema attacks resolve faster and are shorter after early icatibant treatment.

    Directory of Open Access Journals (Sweden)

    Marcus Maurer

    Full Text Available BACKGROUND: Attacks of hereditary angioedema (HAE are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B(2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. OBJECTIVE: To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. METHODS: The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009-February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. RESULTS: Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥ 1 hour (6.1 hours versus 16.8 hours [p<0.001]. Similar significant effects were observed for <2 hours versus ≥ 2 hours (7.2 hours versus 20.2 hours [p<0.001] and <5 hours versus ≥ 5 hours (8.0 hours versus 23.5 hours [p<0.001]. Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]. Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. CONCLUSION: Early blockade of the bradykinin B(2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution.

  14. The Last Act: The Atomic Bomb and the End of World War II.

    Science.gov (United States)

    Smithsonian Institution, Washington, DC. National Air And Space Museum.

    This text was to have been the script for the National Air and Space Museum's exhibition of the Enola Gay, focusing on the end of World War II and the decision of the United States to use of the atomic bomb. The Enola Gay was a B-29 aircraft that carried the atomic bomb dropped on Hiroshima, Japan, on August 6, 1945. The atomic bomb brought a…

  15. BDA: Anglo-American Air Intelligence, Bomb Damage Assessment, and the Bombing Campaigns Against Germany, 1914-1945

    Science.gov (United States)

    2005-05-19

    attention at the Bombing 8 See Colin Sinnott, The RoyalAir Force andAircraft Design, 1923-1939: Air Staff Operational Requirements (London: Frank Cass...supporting, motorized unit fielding five detached parties for ground surveys. The BAU was commanded by Group Captain E.S.D. Drury , the Chief Armament...dossiers, collective analysis of materials, and collaborative production of finished reports. A combined committee, chaired by Drury and Fickel, met

  16. Age validation of quillback rockfish (Sebastes maliger) using bomb radiocarbon

    Energy Technology Data Exchange (ETDEWEB)

    Kerr, L A; Andrews, A H; Munk, K; Coale, K H; Frantz, B R; Cailliet, G M; Brown, T A

    2005-01-05

    Rockfishes (Sebastes spp.) support one of the most economically important fisheries of the Pacific Northwest and it is essential for sustainable management that age estimation procedures be validated for these species. Atmospheric testing of thermonuclear devices during the 1950s and 1960s created a global radiocarbon ({sup 14}C) signal in the ocean environment that scientists have identified as a useful tracer and chronological marker in natural systems. In this study, we first demonstrated that fewer samples are necessary for age validation using the bomb-generated {sup 14}C signal by emphasizing the utility of the time-specific marker created by the initial rise of bomb-{sup 14}C. Second, the bomb-generated {sup 14}C signal retained in fish otoliths was used to validate the age and age estimation methodology of the quillback rockfish (Sebastes maliger) in the waters of southeast Alaska. Radiocarbon values from the first year's growth of quillback rockfish otoliths were plotted against estimated birth year producing a {sup 14}C time series spanning 1950 to 1985. The initial rise of bomb-{sup 14}C from pre-bomb levels ({approx} -90 {per_thousand}) occurred in 1959 {+-} 1 year and {sup 14}C levels rose relatively rapidly to peak {Delta}{sup 14}C values in 1967 (+105.4 {per_thousand}), with a subsequent declining trend through the end of the record in 1985 (+15.4 {per_thousand}). The agreement between the year of initial rise of {sup 14}C levels from the quillback rockfish record and the chronometer determined for the waters of southeast Alaska from yelloweye rockfish (S. ruberrimus) otoliths validated the ageing methodology for the quillback rockfish. The concordance of the entire quillback rockfish {sup 14}C record with the yelloweye rockfish time series demonstrated the effectiveness of this age validation technique, confirmed the longevity of the quillback rockfish up to a minimum of 43 years, and strongly supports higher age estimates of up to 90 years.

  17. Research on Semi-automatic Bomb Fetching for an EOD Robot

    Directory of Open Access Journals (Sweden)

    Qian Jun

    2008-11-01

    Full Text Available An EOD robot system, SUPER-PLUS, which has a novel semi-automatic bomb fetching function is presented in this paper. With limited support of human, SUPER-PLUS scans the cluttered environment with a wrist-mounted laser distance sensor and plans the manipulator a collision free path to fetch the bomb. The model construction of manipulator, bomb and environment, C-space map, path planning and the operation procedure are introduced in detail. The semi-automatic bomb fetching function has greatly improved the operation performance of EOD robot.

  18. Research on Semi-Automatic Bomb Fetching for an EOD Robot

    Directory of Open Access Journals (Sweden)

    Zeng Jian-Jun

    2007-06-01

    Full Text Available An EOD robot system, SUPER-PLUS, which has a novel semi-automatic bomb fetching function is presented in this paper. With limited support of human, SUPER-PLUS scans the cluttered environment with a wrist-mounted laser distance sensor and plans the manipulator a collision free path to fetch the bomb. The model construction of manipulator, bomb and environment, C-space map, path planning and the operation procedure are introduced in detail. The semi-automatic bomb fetching function has greatly improved the operation performance of EOD robot.

  19. UNDERSTANDING DIFFERENTIAL ASSOCIATION AND GENERAL STRAIN THEORIES TO ANALYZE SUICIDE BOMBING IN INDONESIA

    Directory of Open Access Journals (Sweden)

    Alfons Zakaria

    2013-12-01

    Full Text Available On Friday 21st April 2011, Indonesia was shocked by a suicide bombing in a police mosque in Cirebon,West Java Indonesia. The bombing exploded just before the Friday prayer began. Historically, althoughsuicide bombings or mosque bombing have occurred elsewhere, the suicide mosque bombing in Cirebonwas the first time this had occurred in Indonesia. There are similarities between the Cirebon bombingand other bombings occurring in Indonesia. First, there is a similar relationship among the suspects.Second, the suspects were all involved in organizations that have hard-line Islamic ideology. The aim ofthis paper is to understand the differential association and general strain theories in the light of the newform suicide bombing that occurred in Indonesia. This paper will be argued that differential associationtheory is an appropriate approach to explain the cause of the suicide bombing related to the relationshipamong suspects. Similarly, general strain theory is a suitable approach to explain the cause of theterrorism in Indonesia. KeyWords: terrorism, suicide bombing, differential association and general strain theories.

  20. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  1. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  2. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  3. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  4. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  5. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  6. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  7. Microarchitectural Side-Channel Attacks

    OpenAIRE

    Gallais, Jean-Francois

    2013-01-01

    Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weaknesses and flaws. Initially confined to the black-box model, where only the input and output data were considered, cryptanalysis is now broadened to the security evaluation of the physical implementation of a cryptosystem. The implementation attacks which compose physical cryptanalysis are divided into fault attacks, exploiting the effect of disruption of the normal functioning of the device, and s...

  8. Reducing the Impact of Attacks against Healthcare by Curbing the Use of Explosive Weapons in Populated Areas: Developments at the Global Level.

    Science.gov (United States)

    Bagshaw, Simon

    2016-01-01

    Attacks against healthcare in situations of armed conflict have emerged as an issue of increasing concern with explosive weapons - such as aircraft bombs, mortars and improvised explosive devices - accounting for more deaths, injuries and damage than any other type of weapon in attacks on healthcare facilities. While this is perhaps unsurprising, it offers some insight into a possible course of action for dealing with the problem of attacks against healthcare - by curbing the use of explosive weapons in populated areas. There has been growing recognition in recent years of the humanitarian problems caused by the use of such weapons in populated areas. Steps are now being taken at the global level to curb this use which could, in time, make an important contribution to reducing the incidence and devastating impact of attacks against healthcare.

  9. Additive attacks on speaker recognition

    Science.gov (United States)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  10. 360° FILM BRINGS BOMBED CHURCH TO LIFE

    Directory of Open Access Journals (Sweden)

    K. Kwiatek

    2012-09-01

    Full Text Available This paper explores how a computer-generated reconstruction of a church can be adapted to create a panoramic film that is presented in a panoramic viewer and also on a wrap-around projection system. It focuses on the fundamental principles of creating 360º films, not only in 3D modelling software, but also presents how to record 360º video using panoramic cameras inside the heritage site. These issues are explored in a case study of Charles Church in Plymouth, UK that was bombed in 1941 and has never been rebuilt. The generation of a 3D model of the bombed church started from the creation of five spherical panoramas and through the use of Autodesk ImageModeler software. The processed files were imported and merged together in Autodesk 3ds Max where a visualisation of the ruin was produced. A number of historical images were found and this collection enabled the process of a virtual reconstruction of the site. The aspect of merging two still or two video panoramas (one from 3D modelling software, the other one recorded on the site from the same locations or with the same trajectories is also discussed. The prototype of 360º non-linear film tells a narrative of a wartime wedding that occurred in this church. The film was presented on two 360º screens where members of the audience could make decisions on whether to continue the ceremony or whether to run away when the bombing of the church starts. 3D modelling software made this possible to render a number of different alternati ves (360º images and 360º video. Immersive environments empower the visitor to imagine the building before it was destroyed.

  11. UNCOVERING THEIR STORIES: THE RUBBLE OF MEMORY AND BOMBING WAR

    OpenAIRE

    Rasch, William; Universidad de Indiana

    2006-01-01

    In this brilliant essay, WILLIAM RASCH traces current ideas about global war to their first installment in the post-war climate of occupied Germany. RASCH takes issue, in particular, with the current transformation in the nature of war —so called zero casualties war or war at a distance—, hailed as the most important transformation in the field of international relations and international law in the 21st century, and rediscovers its articulation with the carpet bombing (bombenkrieg) of World ...

  12. Mortality of atomic bomb survivors predicted from laboratory animals

    Science.gov (United States)

    Carnes, Bruce A.; Grahn, Douglas; Hoel, David

    2003-01-01

    Exposure, pathology and mortality data for mice, dogs and humans were examined to determine whether accurate interspecies predictions of radiation-induced mortality could be achieved. The analyses revealed that (1) days of life lost per unit dose can be estimated for a species even without information on radiation effects in that species, and (2) accurate predictions of age-specific radiation-induced mortality in beagles and the atomic bomb survivors can be obtained from a dose-response model for comparably exposed mice. These findings illustrate the value of comparative mortality analyses and the relevance of animal data to the study of human health effects.

  13. Water-Triggered Luminescent "Nano-bombs" Based on Supra-(Carbon Nanodots)

    NARCIS (Netherlands)

    Lou, Q.; Qu, S.; Jing, P.; Ji, W.; Li, D.; Cao, J.; Zhang, H.; Liu, L.; Zhao, J.; Shen, D.

    2015-01-01

    Novel luminescent "nano-bombs" based on a self-assembled system of carbon-nanodots, termed supra-CDs, are developed. The luminescence of these luminescent "nano-bombs" depends strongly on water contact; they show weak emission in toluene and decompose in contact with water, resulting in strong

  14. A Confusion of Signals: James Franck, the Chicago Scientists and Early Efforts to Stop the Bomb

    Science.gov (United States)

    Villa, Brian Loring

    1975-01-01

    If the scientists working on the Manhattan Project had realized the consequences of the atomic bomb earlier, formulated their recommendations more precisely, and approached the statesmen in time, American policy on use and control of the bomb might well have been different. (Author/BT)

  15. The association between chronic kidney disease and cardiovascular disease risk factors in atomic bomb survivors.

    Science.gov (United States)

    Sera, Nobuko; Hida, Ayumi; Imaizumi, Misa; Nakashima, Eiji; Akahoshi, Masazumi

    2013-01-01

    Atomic bomb (A-bomb) radiation is associated with cardiovascular disease (CVD) and metabolic CVD risk factors. Chronic kidney disease (CKD) is also known to be a risk factor for CVD and little is known whether CKD is associated with A-bomb radiation. To examine whether CKD is associated with CVD risk factors or with A-bomb radiation in A-bomb survivors, we classified renal dysfunction in 1,040 A-bomb survivors who were examined in 2004-2007 as normal [n = 121; estimated glomerular filtration rate (eGFR) ≥ 90 ml/min/1.73 m(2)]; mild (n = 686; eGFR 60-89 ml/min/1.73 m(2)); moderate (n = 217; eGFR 30-59 ml/min/1.73 m(2)); or severe (n = 16; eGFR bomb radiation. Hypertension [odds ratio (OR), 1.57; 95% confidence interval (CI), 1.12-2.20, P = 0.009]; DM (OR, 1.79; 95% CI, 1.23-2.61, P = 0.002); hyperlipidemia (OR, 1.55; 95% CI, 1.12-2.14, P = 0.008); and MetS (OR, 1.86; 95% CI, 1.32-2.63, P bomb survivors.

  16. Interpreting the Atomic Age: Scientific News Coverage of the Atomic Bomb in Representative Newspapers and Magazines.

    Science.gov (United States)

    Barwis, Gail L.

    A study examined the coverage of the scientific aspects of the atomic bomb in four representative newspapers (New York "Times," New York "Herald Tribune," Chicago "Daily Tribune," and Boston "Daily Globe") and in 14 general mass circulation magazines in the time period immediately following the dropping of the bomb. Among the conclusions of the…

  17. Role Playing: The Atomic Bomb and the End of World War II

    Science.gov (United States)

    Eggleston, Noel C.

    1978-01-01

    Describes how a role playing exercise can be used to teach students in a college level history course about the use of the atomic bomb in World War II. Information is presented on general use of role playing in history courses, objectives, questions to consider about use of the atomic bomb, and course evaluation. For journal availability, see so…

  18. 33 CFR 334.120 - Delaware Bay off Milford Neck; naval aircraft bombing target area.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Delaware Bay off Milford Neck; naval aircraft bombing target area. 334.120 Section 334.120 Navigation and Navigable Waters CORPS OF....120 Delaware Bay off Milford Neck; naval aircraft bombing target area. (a) The danger zone. A circular...

  19. Total 9 Illegal RE Mining Districts in Dingnan County Were Bombed out

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    On October 17th, mineral managing departments in Dingnan county of Jiangxi province took actions toward illegal mining activity. Total 9 mining districts without licenses were bombed out. Rare earth is the protectively strategic resources in China. They are major minerals with good prospect in Dingnan county.Total 9 Illegal RE Mining Districts in Dingnan County Were Bombed out

  20. Stock Market Reaction to Terrorist Attacks: Empirical Evidence from a Front Line State

    Directory of Open Access Journals (Sweden)

    Muhammad Tahir Suleman

    2012-03-01

    Full Text Available The world financial markets have reacted in a highly consistent pattern to the incident of 9/11 in the United States, suicide blasts at night clubs at Bali in 2002, the Madrid and London train bombings in 2004-2005 and a series of continuous blasts and suicide attacks in Pakistan. In this study, we examined the effect of terrorist attack news on returns and volatility for the Karachi Stock Exchange. We employ the EGARCH model proposed by Engle and Ng (1993as it allows good and bad news to have a different impact on volatility. Our results indicate that terrorist attack news has negative impact on the returns of all the sector indices. However, news of these events increased the volatility of KSE100 index and financial sector index. Further it is concluded that the results of oil and gas, and industry are not statistically significant in response to terrorist attack news, indicating that such type of news does not affect the volatility of these two sectors. Moreover, volatility asymmetry is negative in all of the sectors including KSE100 confirming leverage effect.

  1. Not to be forgotten: The bombing of Novi Sad: An ecological black area

    Directory of Open Access Journals (Sweden)

    Nježić Zvonko B.

    2009-01-01

    Full Text Available During the 1999 NATO bombing of Yugoslavia, the second largest Yugoslav city Novi Sad was one of the cities that bore the brunt of the bombing. According to NATO press releases, the bombing targeted oil refineries, roads, bridges, and telecommunications relay stations, facilities which had used for military purposes. The bombing of Novi Sad's refinery caused fires which burned 50000 tons of crude oil, sending toxins and carcinogens into the air and contaminating groundwater. The bombing of the city caused great damage to local civilians, including severe pollution and widespread ecological damage, health consequences which will remain for years as well as permanent psychological consequences caused by almost 3 months of trauma and fear.

  2. 33 CFR 334.60 - Cape Cod Bay south of Wellfleet Harbor, Mass.; naval aircraft bombing target area.

    Science.gov (United States)

    2010-07-01

    ... Harbor, Mass.; naval aircraft bombing target area. 334.60 Section 334.60 Navigation and Navigable Waters... REGULATIONS § 334.60 Cape Cod Bay south of Wellfleet Harbor, Mass.; naval aircraft bombing target area. (a... bombing target hulk James Longstreet in Cape Cod Bay at latitude 41°49′46″, longitude 70°02′54″. (b) The...

  3. 33 CFR 334.1460 - Atlantic Ocean and Vieques Sound, in vicinity of Culebra Island; bombing and gunnery target area.

    Science.gov (United States)

    2010-07-01

    ..., in vicinity of Culebra Island; bombing and gunnery target area. 334.1460 Section 334.1460 Navigation...; bombing and gunnery target area. (a) The danger zone. From Punta Resaca on the north coast of Culebra at... danger zone is subject to use as a target area for bombing and gunnery practice. It will be open to...

  4. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  5. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  6. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  7. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  8. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  9. Radiation and cancer risk in atomic-bomb survivors.

    Science.gov (United States)

    Kodama, K; Ozasa, K; Okubo, T

    2012-03-01

    With the aim of accurately assessing the effects of radiation exposure in the Japanese atomic-bomb survivors, the Radiation Effects Research Foundation has, over several decades, conducted studies of the Life Span Study (LSS) cohort, comprising 93 000 atomic-bomb survivors and 27 000 controls. Solid cancer: the recent report on solid cancer incidence found that at age 70 years following exposure at age 30 years, solid cancer rates increase by about 35%  Gy(-1) for men and 58% Gy(-1) for women. Age-at-exposure is an important risk modifier. In the case of lung cancer, cigarette smoking has been found to be an important risk modifier. Radiation has similar effects on first-primary and second-primary cancer risks. Finally, radiation-associated increases in cancer rates appear to persist throughout life. Leukaemia: the recent report on leukaemia mortality suggests that radiation effects on leukaemia mortality persisted for more than 50 years. Moreover, significant dose-response for myelodysplastic syndrome was observed in Nagasaki LSS members even 40-60 years after radiation exposure. Future perspective: given the continuing solid cancer increase in the survivor population, the LSS will likely continue to provide important new information on radiation exposure and solid cancer risks for another 15-20 years, especially for those exposed at a young age.

  10. Mortality in the Children of Atomic Bomb Survivors and Controls

    Science.gov (United States)

    Neel, James V.; Kato, Hiroo; Schull, William J.

    1974-01-01

    A continuing study of mortality rates among children born to survivors of the atomic bombings and a suitable group of controls has been updated; the average interval between birth and verification of death or survival is 17 years. The mortality experience is now based on 18,946 children liveborn to parents one or both of whom were proximally exposed, receiving jointly an estimated dose of 117 rem; 16,516 children born to distally exposed parents receiving essentially no radiation; and 17,263 children born to parents not in Hiroshima or Nagasaki at the time of the bombings. No clearly significant effect of parental exposure on child's survival can be demonstrated either by a contingency χ2 type of analysis or regression analysis. On the basis of the regression data, the minimal gametic doubling dose of radiation of this type for mutations resulting in death during (on the average) the first 17 years of life among liveborn infants conceived 0–13 years after parental exposure is estimated at 46 rem for fathers and 125 rem for mothers. On the basis of experimental data, the gametic doubling dose for chronic, low-level radiation would be expected to be three to four times this value for males and as much as 1000 rem for females. PMID:4822470

  11. Genetic radiation effects of Hiroshima and Nagasaki atomic bombs

    Energy Technology Data Exchange (ETDEWEB)

    Srsen, S. (Komenskeho Univ., Bratislava (Czechoslovakia). Lekarska Fakulta)

    1984-05-01

    A group of researchers examined persons who had survived the Hiroshima and Nagasaki bombs and were irradiated and their progeny with the aim of getting an idea of the genetic effects of these explosions. Teratogenic effects are not discussed. In the lymphocytes of the peripheral blood of persons who had been exposed to high dose irradiation the researchers found a significant increase in chromosomal aberrations by conventional and more recent methods of chromosomal analysis. In parents who had survived the atomic holocaust there were no significant deviations as against the rest of the population in still births, neonatal defects, infant mortality, and mortality of first generation progeny, in neonate weight, the sex ratio, increased occurence of leukosis and chromosomal aberrations in their children. These negative findings in the first generation do not signify that there is no danger from atomic bomb blasts for human kind. They only indicate that the effects of radiation were too small to be found by routine methods or that the methods used were not suitable.

  12. Bonebrake Theological Seminary - Most Secret A-Bomb Project Site

    Science.gov (United States)

    Sopka, Katherine R.; Sopka, Elisabeth M.

    2004-05-01

    In late 1943, a small number of nuclear scientists was urgently assembled in Dayton, Ohio by the U.S. Army Manhattan District Engineers and Monsanto Chemical Company Research Division to set up a top secret research project essential to counteract the German atomic bomb threat. The site chosen was an old stone building built in 1879 by the United Brethren Church in a residential area known locally as the Bonebrake Seminary. Centered on a sizeable open plot, the austere three story building was surrounded by a tall cyclone fence with a narrow gate and a minimal guard post - nothing revealed the site's intense research activity then or even in the post-WWII Cold War period. Bonebrake scientists would produce the highly radioactive polonium sources for the plutonium (Pu-239) bomb igniter used in August over Nagasaki just before the end of WWII against Japan. The existence of Bonebrake and its research/production work remained classified top secret throughout the Cold War. Only in recent times can any reference be found even to the existence of this project (unlike , for example, Los Alamos or Oak Ridge) and few, if any details, have ever been published. The primary source of information for this paper is Dr. John J. Sopka who was recruited from Princeton University by the Manhattan District in 1943 as physicist for this project.

  13. Bomb radiocarbon in annual tree rings from Thailand and Australia

    Science.gov (United States)

    Hua, Q.; Barbetti, M.; Jacobsen, G. E.; Zoppi, U.; Lawson, E. M.

    2000-10-01

    We have examined the atmospheric 14C excess in the tropics and the southern hemisphere temperate region in the bomb pulse period, using two sets of cross-dated tree rings. One set was from a medium-sized three-leaf pine ( Pinus kesiya) grown in northwestern Thailand and the other was from a Huon pine ( Lagarostrobos franklinii) grown in northwestern Tasmania, Australia. A total of 48 annual tree rings (24 pairs) from 1952 to 1975 AD were pretreated to alpha-cellulose, combusted to CO 2 and converted to graphite for 14C measurement in the tandem accelerator at ANSTO. Excellent agreement was found between our measured 14C data from tree rings and atmospheric 14C records at similar latitudes. A large depletion of atmospheric 14C for Thailand in 1953-1954 AD was observed. This might be due to a combination of the Suess effect and upwelling in the tropical Indian Ocean. The results also showed the rise and decay of bomb 14C peaks from north to south with a time delay of about 1.5 yr, and the effects of minor atmospheric nuclear tests in the late 1960s and early 1970s. A delay of at least one month for 14C in tree cellulose of Huon pine compared with that in the atmosphere was also found.

  14. Axial length of atomic bomb survivors in Nagasaki

    Energy Technology Data Exchange (ETDEWEB)

    Wakiyama, Harumi; Kishikawa, Yasuhiro; Imamura, Naoki [Nagasaki Atomic Bomb Hospital (Japan); Amemiya, Tsugio [Nagasaki Univ. (Japan). School of Medicine

    2002-03-01

    We reviewed a series of 778 patients who had cataract surgery during the past 4 years at the Nagasaki Atomic Bomb Memorial Hospital. We evaluated the history of exposure to radiation by atomic bomb in 1945, axial length and state of refraction. All were born before 1945. The series comprised 263 males and 515 females. Their ages averaged 76.5{+-}8.6 years. History of exposure to radiation was present in 356 patients. The remaining 422 patients served as control. There was no difference in the type of cataract between the two groups. High myopia was present in 11 irradiated patients (3.2%) and in 24 patients in the control group (6.0%). The difference was not significant (p=0.083). There was no high myopia among 24 patients who were aged 18 years or less at the time of radiation and who were within 2 km from the epicenter. No difference was present regarding the axial length between the two groups or between both sexes. The present result is not definitive because ''irradiated group'' would include those with little or no exposure and because precise data has not been available about the dosis of radiation. (author)

  15. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang; Cui, Shuguang

    2014-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to evaluate how a complex network responds to random and possibly correlated attacks.

  16. Review of Injuries from Terrorist Bombings and Earthquakes

    Science.gov (United States)

    2016-08-31

    provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid...These attacks resulted in 1,582 casualties and 117 deaths (Frykberg and Tepas 1988; Hadden et al. 1978). Of the total casualties, the records of...century bronze cannon. The attack resulted in 37 casualties and 1 death as a result of severe brain damage. The records indicate that only 19 victims

  17. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... side-channels attacks can be applied to ECC. This paper reflects an ongoing research in the field of countermeasures against the attacks mentioned above....

  18. The Italian Bombings over Valencia during the Spanish Civil War: A Photographic Study | Los bombardeos italianos sobre el País Valenciano durante la Guerra Civil española: un estudio fotográfico

    Directory of Open Access Journals (Sweden)

    Gaspar Díez Pomares

    2016-12-01

    Full Text Available During the Spanish Civil War, Valencia was one of the hardest hit areas by the air raids of the rebel army supported by their international allies, Italy and Germany. The attacks carried out by the Regia Aeronautica -the Italian military air faction, were outstanding. From a documentary perspective, the importance of these attacks by the Italians lies in the production of a series of photographs taken from the airplanes during the raids. These images add to our understanding of the bombings as they contribute aspects and data ignored in the written reports. This photographic documentation makes it possible to investigate certain characteristics of the bombings, such as the attack intervals, or the nature of the dropped projectiles, allowing for the assessment and interpretation of the reasons for those bombings. | Durante la Guerra Civil española, el País Valenciano fue una de las zonas más castigadas por los ataques aéreos llevados a cabo por el ejército rebelde en colaboración con sus aliados internacionales, Italia y Alemania. Especialmente destacadas fueron las incursiones perpetradas por la Regia Aeronautica, el ejército aéreo italiano. Desde un punto de vista documental, la importancia de estos ataques por parte de los italianos se encuentra en la disponibilidad de una serie de fotografías tomadas desde los aviones en el momento de las incursiones. Gracias a estas fotografías podemos profundizar en el conocimiento de los bombardeos a través de su contribución a aspectos y datos no incluidos en la documentación escrita. Esta documentación fotográfica hace que sea posible investigar ciertas características de las incursiones como la secuencia del ataque o los proyectiles lanzados, lo que permite una evaluación e interpretación de las razones de estos bombardeos.

  19. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    permutations of rows and columns. 3 Related Work Most prior empirical cyber security work is interested in characterizing the mode of operation of attack...The attribute networks (ICT att, bandwidth att, bribes att, ICT vie and ICT % diff) have all 1 component, and density and clustering coefficient...attnlrutes or attackers and victims ICT att x ICT vie 0.19*** 0.23*** 0.51*** 0.47*** Bribes att x ICT vie 0.21• 0.21* -0.26* -0.27 Bandwidth att

  20. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error...

  1. Effects of radiation on the incidence of prostate cancer among Nagasaki atomic bomb survivors.

    Science.gov (United States)

    Kondo, Hisayoshi; Soda, Midori; Mine, Mariko; Yokota, Kenichi

    2013-10-01

    Atomic bomb survivors have been reported to have an increased risk of some cancers, especially leukemia. However, the risk of prostate cancer in atomic bomb survivors is not known to have been examined previously. This study examined the association between atomic bomb radiation and the incidence of prostate cancer among male Nagasaki atomic bomb survivors. The subjects were classified by distance from the hypocenter into a proximal group (atomic bomb survivors who were alive in 1996. The Cox proportional hazard model was used to estimate the risk of prostate cancer development, with adjustment for age at atomic bomb explosion, attained age, smoking status, and alcohol consumption. Compared with the distal group, the proximal group had significant increased risks of total, localized, and high-grade prostate cancer (relative risk and 95% confidence interval: 1.51 [1.21-1.89]; 1.80 [1.26-2.57]; and 1.88 [1.20-2.94], respectively). This report is the first known to reveal a significant relationship between atomic bomb radiation and prostate cancer. © 2013 Japanese Cancer Association.

  2. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  3. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  4. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  5. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  6. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst 24...

  7. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  8. Factors governing risk of cougar attacks on humans

    Science.gov (United States)

    Mattson, David; Logan, Kenneth; Sweanor, Linda

    2011-01-01

    Since the 1980s wildlife managers in the United States and Canada have expressed increasing concern about the physical threat posed by cougars (Puma concolor) to humans. We developed a conceptual framework and analyzed 386 human–cougar encounters (29 fatal attacks, 171 instances of nonfatal contact, and 186 close-threatening encounters) to provide information relevant to public safety. We conceived of human injury and death as the outcome of 4 transitions affected by different suites of factors: (1) a human encountering a cougar: (2) given an encounter, odds that the cougar would be aggressive; (3) given aggression, odds that the cougar would attack; and (4) given an attack, odds that the human would die. We developed multivariable logistic regression models to explain variation in odds at transitions three and four using variables pertaining to characteristics of involved people and cougars. Young (≤ 2.5 years) or unhealthy (by weight, condition, or disease) cougars were more likely than any others to be involved in close (typically females were more likely than males to attack, and of attacking animals, adults were more likely than juveniles to kill the victim (32% versus 9% fatality, respectively). During close encounters, victims who used a weapon killed the involved cougar in 82% of cases. Other mitigating behaviors (e.g., yelling, backing away, throwing objects, increasing stature) also substantially lessened odds of attack. People who were moving quickly or erratically when an encounter happened (running, playing, skiing, snowshoeing, biking, ATV-riding) were more likely to be attacked and killed compared to people who were less active (25% versus 8% fatality). Children (≤ 10 years) were more likely than single adults to be attacked, but intervention by people of any age reduced odds of a child’s death by 4.6×. Overall, cougar attacks on people in Canada and the United States were rare (currently 4 to 6/year) compared to attacks by large felids and

  9. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  10. The United States twenty-year experience with bombing incidents: implications for terrorism preparedness and medical response.

    Science.gov (United States)

    Kapur, G Bobby; Hutson, H Range; Davis, Mark A; Rice, Phillip L

    2005-12-01

    Terrorist bombings remain a significant threat in the United States. However, minimal longitudinal data exists regarding the medical and public health impact because of bombings. We conducted a retrospective analysis of the number of incidents, injuries, and deaths because of explosive, incendiary, premature, and attempted bombings from January 1983 to December 2002. Morbidity and mortality by motives, target locations, and materials used were evaluated. In the United States, 36,110 bombing incidents, 5,931 injuries, and 699 deaths were reported. There were 21,237 (58.8%) explosive bombings, 6,185 (17.1%) incendiary bombings, 1,107 (3.1%) premature bombings, and 7,581 (21.0%) attempted bombings. For explosive bombings with known motives, 72.9% of injuries and 73.8% of deaths were because of homicide. For incendiary bombings with known motives, 68.2% of injuries were because of extortion and revenge, and 53.5% of deaths were due to homicide. Private residences accounted for 29.0% of incidents, 31.5% of injuries, and 55.5% of deaths. Government installations accounted for 4.4% of incidents but were the site of 12.7% of injuries and 25.5% of deaths. In bombings with known materials, nitrate-based fertilizers accounted for 36.2% of injuries and 30.4% of deaths, and smokeless powder and black powder accounted for 33.2% of injuries and 27.1% of deaths. Illegal bombings and related injuries commonly occur in the United States. Because of the easy availability of bombing materials, government agencies and healthcare providers should prepare for potential mass-casualty bombings.

  11. Laser Proximity Sensor for Fuel-air Explosive Bomb

    Directory of Open Access Journals (Sweden)

    Durga Singh

    2007-05-01

    Full Text Available Present study deals with design and development aspects of a diode laser proximity sensorbased on principle of optical triangulation. This sensor incorporates a laser transmitter and anoptical receiver. The beam divergence of laser transmitter and look angle of receiver are orientedin such a way that they intersect at a predetermined measuring segment. The sensor can be setto give signal output at predetermined distance from the target. Theoretical studies have beencarried out to determine the minimum power required for transmitter with a trade-off between S/Nratio, aperture of receiver optics, reflectivity of target and range requirement. The scattered laserradiation from the target in this segment is utilised in deriving a signal output to detonate thebomb at a predetermined distance from the target. The laser proximity sensor has been developedfor 3 ± 0.5 m operational range and has qualified various environmental tests and live fuel-airexplosive bomb trials.

  12. Lessons from the atomic bomb about secondary MDS.

    Science.gov (United States)

    Hata, Tomoko; Imanishi, Daisuke; Miyazaki, Yasushi

    2014-12-01

    Myelodysplastic syndromes (MDSs) is a hematological neoplasm defined by ineffective hematopoiesis, dysplasia of hematopoietic cells, and risk of progression to acute leukemia. MDS occurs as de novo or secondary, and chemoradiotherapy for cancers is thought to increase the risk of MDS among patients. Recently, an epidemiological study for MDS among A-bomb survivors was performed, and it clearly demonstrated that the exposure to external radiation significantly increased the risk of MDS. Precise epidemiological data among survivors have revealed important clinical factors related to the risk of leukemias. In this review, by comparing data for secondary MDS and leukemia/MDS among survivors, several factors which would affect the risk of MDS, especially secondary MDS, are discussed.

  13. Explosion and final state of the charged black hole bomb

    CERN Document Server

    Sanchis-Gual, Nicolas; Montero, Pedro J; Font, José A; Herdeiro, Carlos

    2015-01-01

    A Reissner-Nordstr\\"om black hole (BH) is superradiantly unstable against spherical perturbations of a charged scalar field, enclosed in a cavity, with frequency lower than a critical value. We use numerical relativity techniques to follow the development of this unstable system -- dubbed charged BH bomb -- into the non-linear regime, solving the full Einstein--Maxwell--Klein-Gordon equations, in spherical symmetry. We show that: $i)$ the process stops before all the charge is extracted from the BH; $ii)$ the system settles down into a hairy BH: a charged horizon in equilibrium with a scalar field condensate, whose phase is oscillating at the (final) critical frequency. For low scalar field charge, $q$, the final state is approached smoothly and monotonically. For large $q$, however, the energy extraction overshoots and an explosive phenomenon, akin to a $bosenova$, pushes some energy back into the BH. The charge extraction, by contrast, does not reverse.

  14. Oscillatory thermal instability - the Bhopal disaster and liquid bombs

    CERN Document Server

    Ball, Rowena

    2011-01-01

    Thermal runaway reactions were involved in the Bhopal disaster of 1984, in which methyl isocyanate was vented from a storage tank of the liquid, and occur in liquid peroxide explosions, yet to date there have been few investigations into the mechanism of thermal runaway in such liquid thermoreactive systems. Consequently protocols for storing thermally unstable liquids and deactivating liquid bombs may be suboptimal. In this work the hydrolysis of methyl isocyanate and the thermal decomposition of triacetone triperoxide were simulated using a gradientless, continuous-flow reactor paradigm. This approximation enabled stability analyses on the steady state solutions of the dynamical mass and enthalpy equations. The results indicate that thermal runaway in both systems is due to the onset of a large amplitude, hard thermal oscillation initiated at a subcritical Hopf bifurcation. This type of thermal misbehaviour cannot be predicted using classical ignition theory, and may be typical of liquid thermoreactive syst...

  15. The Radium Terrors. Science Fiction and Radioactivity before the Bomb.

    Science.gov (United States)

    Candela, Andrea

    2015-01-01

    At the beginning of the 20th century the collective imagination was fascinated and terrified by the discovery of radium. A scientific imagery sprang up around radioactivity and was disseminated by public lectures and newspaper articles discussing the ambiguous power of this strange substance. It was claimed that radium could be used to treat cholera, typhus and tuberculosis, but at the same time there were warnings that it could be used for military purposes. The media and the scientists themselves employed a rich vocabulary influenced by religion, alchemy and magic. The ambivalent power of radioactive elements exerted a great influence on science fiction novelists. This paper will examine some significant works published in Europe, America and Russia during the first decades of the 20th century and their role in the creation of the complex imagery of radioactivity that seized the public imagination long before the invention of the atomic bomb.

  16. Detecting body cavity bombs with nuclear quadrupole resonance

    Science.gov (United States)

    Collins, Michael London

    Nuclear Quadrupole Resonance (NQR) is a technology with great potential for detecting hidden explosives. Past NQR research has studied the detection of land mines and bombs concealed within luggage and packages. This thesis focuses on an NQR application that has received less attention and little or no publicly available research: detecting body cavity bombs (BCBs). BCBs include explosives that have been ingested, inserted into orifices, or surgically implanted. BCBs present a threat to aviation and secure facilities. They are extremely difficult to detect with the technology currently employed at security checkpoints. To evaluate whether or not NQR can be used to detect BCBs, a computational model is developed to assess how the dielectric properties of biological tissue affect the radio frequency magnetic field employed in NQR (0.5-5MHz). The relative permittivity of some biological tissue is very high (over 1,000 at 1MHz), making it conceivable that there is a significant effect on the electromagnetic field. To study this effect, the low-frequency approximation known as the Darwin model is employed. First, the electromagnetic field of a coil is calculated in free space. Second, a dielectric object or set of objects is introduced, and the free-space electric field is modified to accommodate the dielectric object ensuring that the relevant boundary conditions are obeyed. Finally, the magnetic field associated with the corrected electric field is calculated. This corrected magnetic field is evaluated with an NQR simulation to estimate the impact of dielectric tissue on NQR measurements. The effect of dielectric tissue is shown to be small, thus obviating a potential barrier to BCB detection. The NQR model presented may assist those designing excitation and detection coils for NQR. Some general coil design considerations and strategies are discussed.

  17. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  18. Atomic Bomb Survivors Life-Span Study: Insufficient Statistical Power to Select Radiation Carcinogenesis Model.

    Science.gov (United States)

    Socol, Yehoshua; Dobrzyński, Ludwik

    2015-01-01

    The atomic bomb survivors life-span study (LSS) is often claimed to support the linear no-threshold hypothesis (LNTH) of radiation carcinogenesis. This paper shows that this claim is baseless. The LSS data are equally or better described by an s-shaped dependence on radiation exposure with a threshold of about 0.3 Sievert (Sv) and saturation level at about 1.5 Sv. A Monte-Carlo simulation of possible LSS outcomes demonstrates that, given the weak statistical power, LSS cannot provide support for LNTH. Even if the LNTH is used at low dose and dose rates, its estimation of excess cancer mortality should be communicated as 2.5% per Sv, i.e., an increase of cancer mortality from about 20% spontaneous mortality to about 22.5% per Sv, which is about half of the usually cited value. The impact of the "neutron discrepancy problem" - the apparent difference between the calculated and measured values of neutron flux in Hiroshima - was studied and found to be marginal. Major revision of the radiation risk assessment paradigm is required.

  19. Zika Attacks Nerves, Muscles, Other Tissues

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  20. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and classified. The goal...

  1. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  2. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  3. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  4. A Probabilistic Analysis to Quantify the Effect of March 11, 2004, Attacks in Madrid on the March 14 Elections in Spain: A Dynamic Modelling Approach

    Directory of Open Access Journals (Sweden)

    Juan-Carlos Cortés

    2015-01-01

    Full Text Available The bomb attacks in Madrid three days before the general elections of March 14, 2004, and their possible influence on the victory of PSOE (Spanish Workers Socialist Party, defeating PP (Popular Party, have been a matter of study from several points of view (i.e., sociological, political, or statistical. In this paper, we present a dynamic model based on a system of differential equations such that it, using data from Spanish CIS (National Center of Sociological Research, describes the evolution of voting intention of the Spanish people over time. Using this model, we conclude that the probability is very low that the PSOE would have won had the attack not happened. Moreover, after the attack, the PSOE increased an average of 5.6% in voting on March 14 and an average of 11.2% of the Spanish people changed their vote between March 11 and March 14. These figures are in accordance with other studies.

  5. Leo Szilard Lectureship Award Lecture: North Korea: Reactors, bombs and people

    Science.gov (United States)

    Hecker, Siegfried

    2012-03-01

    In November 2010, during my seventh trip to North Korea, Pyongyang produced a big surprise--it decided to build its own light-water reactor and uranium enrichment plant. During my first visit I was shown plutonium produced in its Yongbyon nuclear complex to convince me they have the bomb. For nearly 40 years, Pyongyang has moved along parallel paths of nuclear energy and nuclear weapons, opting to chose bombs over electricity. I will discuss how North Korea got the bomb, why it got it, and the prospects of whether or not it will give up the bomb. Finally, I will try to show with photos and stories of how North Korea is not such a hermit kingdom after all.

  6. Incidence of dementia among atomic-bomb survivors--Radiation Effects Research Foundation Adult Health Study.

    Science.gov (United States)

    Yamada, Michiko; Kasagi, Fumiyoshi; Mimori, Yasuyo; Miyachi, Takafumi; Ohshita, Tomohiko; Sasaki, Hideo

    2009-06-15

    Radiotherapy has been reported to cause neuropsychological dysfunction. Here we examined whether exposure to atomic bomb radiation affected the incidence of dementia among 2286 atomic bomb survivors and controls - all members of the Adult Health Study cohort. Study subjects were non-demented and aged >or=60 years at baseline examination and had been exposed in 1945 at >or=13 years of age to a relatively low dose (or=500 mGy group. Alzheimer disease was the predominant type of dementia in each dose category. After adjustment for potential risk factors, radiation exposure did not affect the incidence rate of either all dementia or any of its subtypes. No case of dementia had a history of therapeutic cranial irradiation. Although we found no relationship between radiation exposure and the development of dementia among atomic bomb survivors exposed at >or=13 years old in this longitudinal study, effects on increased risk of early death among atomic bomb survivors will be considered.

  7. Accident in science history. Hitler's atomic bomb; Stoerfall der Wissenschaftsgeschichte. Hitlers Atombombe

    Energy Technology Data Exchange (ETDEWEB)

    Popp, Manfred

    2016-07-01

    Up to now the historical explanation for the fact that NS Germany did not develop an atomic bomb was that there was enough scientific and technical knowledge but not enough resources. Recent historical research showed that the German scientists in the ''Uranverein'' did not know the cross section of U-235 and had no possibility to measure these cross sections. There exist only very few documents dealing with the bomb. The bomb was treated as a special case of a reactor. Obviously the German scientists did not know he bomb technology. It seems that the project was not success-oriented because the scientists expected to be sent to the front in case of a project stop.

  8. Effects of bombing after five years: Development of early maladaptive cognitive schemas in children

    Directory of Open Access Journals (Sweden)

    Nikoloski-Končar Nataša

    2006-01-01

    Full Text Available The main aim of the study is to examine effects of bombing on development of early maladaptive schemas in children who live in directly bombed towns in comparison with children who live in towns not directly exposed to bombing. The subjects were twelve years old at the moment of testing (February 2005 meaning that they were at the age of seven during the bombing. Additional aim was to examine gender differences in development of early maladaptive schemas. The theory of Young (1990 provided framework for the study. According to the theory, early maladaptive cognitive schemas, which present basis for psychological disorder later in life, begin to develop in childhood in connection with traumatic experiences and/or other aversive circumstances. The results showed that the early maladaptive schemas are more frequent in children from directly exposed towns; and in male subjects comparing with females.

  9. Ellerman bombs at high resolution III. Simultaneous observations with IRIS and SST

    CERN Document Server

    Vissers, Gregal J M; Rutten, Robert J; Carlsson, Mats; De Pontieu, Bart

    2015-01-01

    Ellerman bombs are transient brightenings of the extended wings of the solar Balmer lines in emerging active regions. We describe their properties in the ultraviolet lines sampled by the Interface Region Imaging Spectrograph (IRIS), using simultaneous imaging spectroscopy in H$\\alpha$ with the Swedish 1-m Solar Telescope (SST) and ultraviolet images from the Solar Dynamics Observatory for Ellerman bomb detection and identification. We select multiple co-observed Ellerman bombs for detailed analysis. The IRIS spectra strengthen the view that Ellerman bombs mark reconnection between bipolar kilogauss fluxtubes with the reconnection and the resulting bi-directional jet located within the solar photosphere and shielded by overlying chromospheric fibrils in the cores of strong lines. The spectra suggest that the reconnecting photospheric gas underneath is heated sufficiently to momentarily reach stages of ionization normally assigned to the transition region and the corona. We also analyze similar outburst phenome...

  10. Long-Term Health Effects of Atom Bomb on Japan Not as Bad as Feared: Study

    Science.gov (United States)

    ... Long-Term Health Effects of Atom Bomb on Japan Not as Bad as Feared: Study Survivors of ... 2011 at a nuclear power plant in Fukushima, Japan, after an earthquake triggered a massive tsunami shows ...

  11. Threat perception after the Boston Marathon bombings: The effects of personal relevance and conceptual framing.

    Science.gov (United States)

    Wormwood, Jolie Baumann; Lynn, Spencer K; Feldman Barrett, Lisa; Quigley, Karen S

    2016-01-01

    We examined how the Boston Marathon bombings affected threat perception in the Boston community. In a threat perception task, participants attempted to "shoot" armed targets and avoid shooting unarmed targets. Participants viewing images of the bombings accompanied by affectively negative music and text (e.g., "Terror Strikes Boston") made more false alarms (i.e., more errors "shooting" unarmed targets) compared to participants viewing the same images accompanied by affectively positive music and text (e.g., "Boston Strong") and participants who did not view bombing images. This difference appears to be driven by decreased sensitivity (i.e., decreased ability to distinguish guns from non-guns) as opposed to a more liberal bias (i.e., favouring the "shoot" response). Additionally, the more strongly affected the participant was by the bombings, the more their sensitivity was reduced in the negatively framed condition, suggesting that this framing was particularly detrimental to the most vulnerable individuals in the affected community.

  12. The recovery and analysis of mitochondrial DNA from exploded pipe bombs.

    Science.gov (United States)

    Foran, David R; Gehring, Michael E; Stallworth, Shawn E

    2009-01-01

    Improvised explosive devices (IEDs) represent one of the most common modes of arbitrarily injuring or killing human beings. Because of the heat generated by, and destruction to, an IED postconflagration, most methods for identifying who assembled the device are ineffective. In the research presented, steel pipe bombs were mock-assembled by volunteers, and the bombs detonated under controlled conditions. The resultant shrapnel was collected and swabbed for residual cellular material. Mitochondrial DNA profiles were generated and compared blind to the pool of individuals who assembled the bombs. Assemblers were correctly identified 50% of the time, while another 19% could be placed into a group of three individuals with shared haplotypes. Only one bomb was assigned incorrectly. In some instances a contaminating profile (mixture) was also observed. Taken together, the results speak to the extreme sensitivity the methods have for identifying those who assemble IEDs, along with precautions needed when collecting and processing such evidence.

  13. Pattern of injury in those dying from traumatic amputation caused by bomb blast.

    Science.gov (United States)

    Hull, J B; Bowyer, G W; Cooper, G J; Crane, J

    1994-08-01

    Traumatic amputation of limbs caused by bomb blast carries a high risk of mortality. This paper describes 73 amputations in 34 deaths from bomb blast in Northern Ireland. The principal aim was to determine the sites of traumatic amputation to provide a biophysical basis for the development of protective measures. Few amputations were through joints; nearly all were through the bone shafts. The most common site in the tibia was the upper third. The distribution of femoral sites resulting from car bombs differed from that characterizing other types of explosion. For car bombs the principal site of amputation was the upper third; for other types of device it was the lower third. It is concluded that flailing is not a notable contributor to limb avulsion. The pattern of amputation is consistent with direct local pressure loads leading to bone fracture; the amputation itself is a secondary event arising from the flow of combustion products.

  14. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    at- tack analysis as opposed to analyzing individual attacks; making detection sensors temporally and spatially dynamic; making attack identification...and Analysis Environment Asymmetry 22 3.5 Legacy Support Requirements 27 3.6 Sensors are Static Spatially and Temporally , While Attacks are Dynamic 28...or analysis, typically due to a lack of context from the points of attack. 2. Systems are designed for expressiveness and flexibility a. Many languages

  15. Terror attacks influence driving behavior in Israel

    Science.gov (United States)

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  16. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  17. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin , S.; M. FAIZAL A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  18. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  19. Factors Determining Satisfaction with Daily Life of Elderly A-bomb Survivors

    OpenAIRE

    Mine, Mariko; Okumura, Yutaka; Kondo, Hisayoshi; Yokota, Kenichi

    1993-01-01

    From the analysis of questionnaires to elderly A-bomb survivors of over 65 years old, we analysed factors which determined satisfaction with daily life. Analysed categories were housing condition, life style, occupational status, health condition and family status. From the analysis, to be an A-bomb survivor was not a factor for satisfaction with daily life, and it became clear that living in a rented room, not satisfying one's job and low income were serious factors which kept elderly people...

  20. Medical Database for the Atomic-Bomb Survivors at Nagasaki University

    OpenAIRE

    Mori, Hiroyuki; Mine, Mariko; Kondo, Hisayoshi; Okumura, Yutaka

    1992-01-01

    The Scientific Data Center for Atomic-Bomb Disasters at Nagasaki University was established in 1974. The database of atomicbomb survivors has been in operation since 1977. The database is composed of following 6 physical database : (1) Fundamental information database. (2) Atomic-Bomb Hospital database, (3) Pathological database, (4) Household reconstruction database, (5) Second generation database, and (6) Address database. We review the current contents of the database for its further appli...

  1. Bomb disposal in the Tropics:a cocktail of metabolic and environmental heat

    OpenAIRE

    Stewart, Ian B; Townshend, Andrew; Rojek, Amanda M.; Costello, Joseph

    2013-01-01

    Bomb technicians perform their work while encapsulated in explosive ordnance disposal (EOD) suits. Designed primarily for safety, these suits have an unintended consequence of impairing the body’s natural mechanisms for heat dissipation. Purpose: To quantify the heat strain encountered during an EOD operational scenario in the tropical north of Australia. Methods: All active police male bomb technicians, located in a tropical region of Australia (n=4, experience 7 ± 2.1 yrs, age 34 ± 2 yrs, h...

  2. Effects of A-bomb radiation on the human body. Genbaku hoshasen no jintai eikyo 1992

    Energy Technology Data Exchange (ETDEWEB)

    Shigematsu, Itsuzo; Akiyama, Mitoshi; Sasaki, Hideo (Radiation Effects Research Foundation, Hiroshima (Japan)); Ito, Chikato; Kamada, Nanao (eds.)

    1992-01-01

    This publication consists of contributions by 39 authors in Hiroshima who are active in the forefront of research, diagnosis and treatment concerning atomic bomb survivors. Following a brief description on the damage of the atomic bomb, the subjects of malignant tumors, endocrine and metabolic diseases, ocular lesions, dermatologic effects, prenatal exposure, chromosomal aberrations, mutations, sensitivity to radiation, immune function, genetic effects and other effects of radiation are described. All of the 45 chapters are indexed individually. (J.P.N.).

  3. Multiple endocrine tumors in A-bomb survivors, autopsy cases, Hiroshima. Preliminary report

    Energy Technology Data Exchange (ETDEWEB)

    Takeichi, Nobuo; Fujikura, Toshio (Radiation Effects Research Foundation, Hiroshima (Japan)); Ezaki, Haruo

    1984-03-01

    Multiple endocrine tumors (MET) were observed in 27 of 4,136 autopsy cases (0.3%) of the fixed population including Hiroshima atomic bomb survivors and the control group. The thyroid was the most common organ in which MET occurred, followed by the ovary. Thirteen cases, including two cases of three MET, had MET in both the tyroid and the ovary, 11 of which had been exposed to one rad or more of atomic bomb.

  4. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  5. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  6. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  7. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like...

  8. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...

  9. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  10. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  11. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  12. A NASA study of the impact of technology on future sea based attack aircraft

    Science.gov (United States)

    Hahn, Andrew S.

    1992-01-01

    A conceptual aircraft design study was recently completed evaluating carrier-based, subsonic attack aircraft using contemporary and future technology assumptions. The study examined a configuration matrix that was made up of light and medium bomb loads, one and two man crews, internal and external weapons carriage, as well as conventional and flying wing planforms. Use of common technology assumptions, engine cycle simulation code, design mission, and consistent application of methods allow for direct comparison of the aircraft. This paper describes the design study ground rules and the aircraft designed. The aircraft descriptions include weights, dimensions, layout, design mission, design constraints, maneuver performance, and fallout mission performance. The strengths, and weaknesses of each aircraft are highlighted.

  13. Animal attack: an unusual case of multiple trauma in childhood.

    LENUS (Irish Health Repository)

    O'Grady, E

    2014-11-01

    A 2½ year old girl attended our facility following attack by a tapir at a city zoo. She sustained multiple injuries including a forearm laceration and multiple perforating wounds to her abdominal wall. She had several procedures, including bowel resection, performed under the care of the General Paediatric Surgery and Plastic Surgery teams and was treated with a course of IV antibiotics. She recovered well and to date has suffered no long-term adverse outcome.

  14. Animal attack: an unusual case of multiple trauma in childhood.

    Science.gov (United States)

    O'Grady, E; Doyle, M; Fitzgerald, C W R; Mortell, A; Murray, D

    2014-01-01

    A 2½ year old girl attended our facility following attack by a tapir at a city zoo. She sustained multiple injuries including a forearm laceration and multiple perforating wounds to her abdominal wall. She had several procedures, including bowel resection, performed under the care of the General Paediatric Surgery and Plastic Surgery teams and was treated with a course of IV antibiotics. She recovered well and to date has suffered no long-term adverse outcome.

  15. Personality and Major Depression among Directly Exposed Survivors of the Oklahoma City Bombing

    Directory of Open Access Journals (Sweden)

    Carol S. North

    2012-01-01

    Full Text Available Background. Few disaster studies have specifically examined personality and resilience in association with disaster exposure, posttraumatic stress disorder (PTSD, and major depression. Methods. 151 directly-exposed survivors of the Oklahoma City bombing randomly selected from a bombing survivor registry completed PTSD, major depression, and personality assessments using the Diagnostic Interview Schedule for DSM-IV and the Temperament and Character Inventory, respectively. Results. The most prevalent postdisaster psychiatric disorder was bombing-related PTSD (32%; major depression was second in prevalence (21%. Bombing-related PTSD was associated with the combination of low self-directedness and low cooperativeness and also with high self-transcendence and high harm avoidance in most configurations. Postdisaster major depression was significantly more prevalent among those with (56% than without (5% bombing-related PTSD (P<.001 and those with (72% than without (14% predisaster major depression (P<.001. Incident major depression was not associated with the combination of low self-directedness and low cooperativeness. Conclusions. Personality features can distinguish resilience to a specific life-threatening stressor from general indicators of well-being. Unlike bombing-related PTSD, major depression was not a robust marker of low resilience. Development and validation of measures of resilience should utilize well-defined diagnoses whenever possible, rather than relying on nonspecific measures of psychological distress.

  16. Was Nazi Germany on the Road to an Atomic Bomb after all?

    Science.gov (United States)

    Lustig, Harry

    2006-04-01

    The story of Germany's efforts to develop a nuclear weapon during World War II is a much written about and contentious subject. However there has been agreement on one thing: by the end of the War the Germans had not achieved and were nowhere near to building a bomb. The dispute therefore has been about why Germany did not succeed. Now, from Germany, comes a challenge to this truth, in the provocative book Hitlers Bombe by Rainer Karlsch. The bombshell in Hitler's Bombe is the assertion that German scientists developed and tested a primitive fission and fusion nuclear weapon in March 1945. Karlsch bases this claim on testimony of witnesses in 1962, previously secret Russian documents, and the results of soil tests carried out in 2004 and 2005. However the physics is very murky and it seems out of the question that Germany had enough Uranium 235 or produced any Plutonium for a bomb. Hitlers Bombe also makes other, better documented and more credible revisionist assertions. These include the claim that the Nazis did continue to try to build a bomb after 1942 and that not Werner Heisenberg, but Kurt Diebner and Walther Gerlach were then the leaders of the German Uranium project. Karlsch's book therefore deserves more attention from physicists and historians than it has received in the United States.

  17. The night of the physicists. Heisenberg, Hahn, Weizsaecker, and the German bomb; Die Nacht der Physiker. Heisenberg, Hahn, Weizsaecker und die deutsche Bombe

    Energy Technology Data Exchange (ETDEWEB)

    Schirach, Richard von

    2014-07-01

    Finally the German atomic physicists around Heisenberg, von Weizsaecker, and Hahn worked on their ''uranium machine'' in a Swabian beer-cellar - and took themselves for the world elite of nuclear research. In imprisonment they heared from the dropping of the Hiroshima bomb - a shock. Richard von Schirach shows the hindered ''fathers of the German atomic bomb'' in close-up, their eagerness, their hybris, their true importance, and their attempts to give after the war a new interpretation of their own role. A book, which raises in the sense of Duerrenmatt the question for the responsibility of science.

  18. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  19. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  20. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  1. Strictosidine activation in Apocynaceae: towards a "nuclear time bomb"?

    Directory of Open Access Journals (Sweden)

    Guirimand Grégory

    2010-08-01

    strictosidine vacuolar pool upon enzyme-substrate reunion occurring during potential herbivore feeding constituting a so-called "nuclear time bomb" in reference to the "mustard oil bomb" commonly used to describe the myrosinase-glucosinolate defence system in Brassicaceae.

  2. Continuous Weight Attack on Complex Network

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We introduce a continuous weight attack strategy and numerically investigate the effect of continuous use a weight coefficient ω to define the attack intensity. The weight coefficient ω increases continuously from 1 to infinity, where 1 represents no attack and infinity represents complete destructive attack. Our results show that the continuous weight attack on two selected nodes with small ω (ω≈ 3) could achieve the same damage of complete elimination of a single selected node on both BA and ER networks. It is found that the continuous weight attack on a single selected edge with small ω (ω≈ 2) can reach the same effect of complete elimination of a single edge on BA network, but on ER network the damage of the continuous weight attack on a single edge is close to but always smaller than that of complete elimination of edge even if ω is very large.

  3. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  4. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  5. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  6. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identifi...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  7. Treating a patient with lower limb injury from shark attack – a case report

    Directory of Open Access Journals (Sweden)

    Uroš Ahčan

    2014-02-01

    Full Text Available Background: Every year a number of people are attacked by sharks worldwide; however, death as a consequence is quite unusual. In recent years, the number of reported shark attacks worldwide has been around 67 per year with fatalities averaging 5 persons annually. Shark attacks in the Adriatic Sea are very rare.Case report: In 2008, a great white shark attack happened in the Adriatic Sea, in which a man suffered a severe injury to his lower extremity and profuse bleeding that led to haemorrhagic shock.Conclusion: The expeditious intervention at the site of attack and the exemplary cooperation of medical teams in two centres in the neighbouring countries of Croatia and Slovenia has saved the life of the unusually injured patient and resulted in a satisfactory functional outcome.

  8. Terrorist Attacks and Financial Markets

    OpenAIRE

    Bonekamp, Bas; van Veen, Tom

    2017-01-01

    This paper investigates the magnitude and the duration of the effect of a terrorist attack on stock market indices. We investigate the impact of New York (2001), Madrid (2004), London (2005), Boston (2013), Paris (2015), Brussels (2016), Nice (2016) and Berlin(2016) on the stock indices of the USA (S&P), Japan (NIKKEI), Germany (DAX), Spain (IBEX), UK (FTSE), France (CAC) and the Euronext Index (BEL). We use both a graphical analysis and an event study methodology to assess the effect of terr...

  9. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  10. Bioassays for bomb-makers: proof of concept.

    Science.gov (United States)

    Bell, Suzanne C; Gayton-Ely, Melissa; Nida, Corey M

    2009-09-01

    Clandestine bomb-makers are exposed to significant amounts of explosives and allied materials. As with any ingested xenobiotic substance, these compounds are subject to biotransformation. As such, the potential exists that characteristic suites of biomarkers may be produced and deposited in matrices that can be exploited for forensic and investigative purposes. However, before such assays can be developed, foundational data must be gathered regarding the toxicokinetics, fate, and transport of the resulting biomarkers within the body and in matrices such as urine, hair, nails, sweat, feces, and saliva. This report presents an in vitro method for simulation of human metabolic transformations using human liver microsomes and an assay applicable to representative nitro-explosives. Control and metabolized samples of TNT, RDX, HMX, and tetryl were analyzed using high-performance liquid chromatography coupled to tandem mass spectrometry (LC/MS/MS) and biomarkers identified for each. The challenges associated with this method arise from solubility issues and limitations imposed by instrumentation, specifically, modes of ionization.

  11. Fine-scale Photospheric Connections of Ellerman Bombs

    Science.gov (United States)

    Yang, Heesu; Chae, Jongchul; Lim, Eun-Kyung; Song, Donguk; Cho, Kyuhyoun; Kwak, Hannah; Yurchyshyn, Vasyl B.; Kim, Yeon-Han

    2016-10-01

    We investigate the photospheric and magnetic field structures associated with Ellerman bombs (EBs) using the 1.6 m New Solar Telescope at Big Bear Solar Observatory. The nine observed EBs were accompanied by elongated granule-like features (EGFs) that showed transverse motions prior to the EBs with an average speed of about 3.8 km s-1. Each EGF consisted of a sub-arcsecond bright core encircled by a dark lane around its moving front. The bright core appeared in the TiO broadband filter images and in the far wings of the Hα and Ca ii 8542 Å lines. In four EBs, the bi-directional expanding motion of the EGFs was identified in the TiO images. In those cases, the EGFs were found to be accompanied by an emerging flux (EF). In four other EBs, the EGF developed at the edge of a penumbra and traveled in the sunspot’s radial direction. The EGFs in these cases were identified as a moving magnetic feature (MMF). Our results show a clear connection among the magnetic elements, photospheric features, and EBs. This result suggests that the EBs result from magnetic reconnection forced by EFs or MMFs that are frequently manifested by EGFs.

  12. Why did the Germans not produce an atomic bomb?

    Science.gov (United States)

    Lustig, Harry

    2003-04-01

    The question has been examined and debated in books and articles by physicists and historians of science for the past half century. Since 2000,the controversy has been heightened by Michael Frayn's play Copenhagen. Was the reason for the failure that Werner Heisenberg, the leader of Germany's Uranium Project,for moral reasons, gave incomplete and misleading information to the Nazis, such as withholding the knowledge that fissionable plutonium can be produced in a uranium reactor? Was Heisenberg's science the cause, because it resulted in a critically wrong critical mass for fission of tons instead of kilograms? Did he not make the calculation at all because he was convinced, for practical reasons, that a bomb couldn't be assembled in time to be of use to anyone in World War II? And what about Hans Bethe's assertion that Walter Bothe's mistake in ruling out graphite as a moderator, which obliged the Germans to embark on the difficult, long range effort to obtain enough heavy water, doomed even Heisenberg's reactor program to failure? Can the different answers that have been given to these and other questions be reconciled? If not, which are likely to be correct and which should be abandoned? The talk will be a progress report on this investigation.

  13. Application of Bomb Radiocarbon Chronologies to Shortfin Mako (Isurus oxyrinchus)

    Energy Technology Data Exchange (ETDEWEB)

    Ardizzone, D; Cailliet, G M; Natanson, L J; Andrews, A H; Kerr, L A; Brown, T A

    2007-07-16

    and the number of samples for MIA analysis was insufficient for some months. Hence, unequivocal validation of shortfin mako age estimates has yet to be accomplished. Atmospheric testing of thermonuclear devices in the 1950s and 1960s effectively doubled the natural atmospheric radiocarbon ({sup 14}C). The elevated {sup 14}C levels were first recorded in 1957-58, with a peak around 1963. As a consequence, {sup 14}C entered the ocean through gas exchange with the atmosphere at the ocean surface and in terrestrial runoff. Despite variable oceanographic conditions, a worldwide rise of the bomb {sup 14}C signal entered the ocean mixed layer as dissolved inorganic carbon (DIC) in 1957-58. The large amounts of {sup 14}C released from the bomb tests produced a signature that can be followed through time, throughout the marine food web, and into deeper waters. The marked increase of radiocarbon levels was first measured in the DIC of seawater and in biogenic marine carbonates of hermatypic corals in Florida. Subsequently, this record was documented in corals from other regions and in the thallus of rhodoliths. The accumulation of radiocarbon in the hard parts of most marine organisms in the mixed layer (such as fish otoliths and bivalves) was synchronous with the coral time-series. This technique has been used to validate age estimates and longevity of numerous bony fishes to date, as well as to establish bomb radiocarbon chronologies from different oceans. In the first application of this technique to lamnoid sharks, validated annual band-pair deposition in vertebral growth bands for the porbeagle (Lamna nasus) aged up to 26 years. Radiocarbon values from samples obtained from 15 porbeagle caught in the western North Atlantic Ocean (some of which were known-age) produced a chronology similar in magnitude to the reference carbonate chronology for that region. The observed phase shift of about 3 years was attributed to different sources of carbon between vertebrae and those for

  14. Small-Scale Structuring Of Ellerman Bombs at Solar Limb

    CERN Document Server

    Nelson, C J; Doyle, J G; Freij, N; Erdélyi, R

    2014-01-01

    Ellerman bombs (EBs) have been widely studied in recent years due to their dynamic, explosive nature and apparent links to the underlying photospheric magnetic field implying that they may be formed by magnetic reconnection in the photosphere. Despite a plethora of researches discussing the morphologies of EBs, there has been a limited investigation of how these events appear at the limb, specifically, whether they manifest as vertical extensions away from the disc. In this article, we make use of high-resolution, high-cadence observations of an AR at the solar limb, collected by the CRISP instrument, to identify EBs and infer their physical properties. The upper atmosphere is also probed using the SDO/AIA. We analyse 22 EB events evident within these data, finding that 20 appear to follow a parabolic path away from the solar surface at an average speed of 9 km s^(-1), extending away from their source by 580 km, before retreating back at a similar speed. These results show strong evidence of vertical motions ...

  15. METROLOGICAL PERFORMANCES OF BOMB CALORIMETERS AT REAL CONDITIONS

    Directory of Open Access Journals (Sweden)

    Yu. V. Maksimuk

    2016-01-01

    Full Text Available The high-usage measurement equipment for heat of combustion of organic fuels are bomb isoperibol calorimeters with a water thermostat. The stability of work of calorimeters at real conditions is important for maintenance of reliability of measurement results. The article purpose – the analysis of stability for parameters of calorimeters to environment changes. In this work influence room temperature (Тк and heat exchange conditions on metrological characteristics of two models of calorimeters is considered with different degree of thermal protection: V-08МА and BIC 100. For calorimeters V-08МА the increase in a effective heat capacity (W on 0,1 % by growth of Tк on everyone 5 °С is established. To use value W in all interval laboratory temperatures Tк = 14–28 °С it is necessary to correct W on 2,8 J/°C on everyone 1 °С changes of Tк. Updating W is required, if the correction exceeds error in determination W. For calorimeter BIC 100 it is not revealed dependences W from Tк. BIC 100 have constant-temperature cap, high stability a temperature in thermostat and stabilized heat exchange. It is established that an standard deviation of cooling constant for all calorimeters in direct proportional to standard deviation W. 

  16. Diagnostics of Ellerman bombs with high-resolution spectral data

    Science.gov (United States)

    Li, Zhen; Fang, Cheng; Guo, Yang; Chen, Peng-Fei; Xu, Zhi; Cao, Wen-Da

    2015-09-01

    Ellerman bombs (EBs) are tiny brightenings often observed near sunspots. The most impressive characteristic of EB spectra is the two emission bumps in both wings of the Hα and Ca II 8542Å lines. High-resolution spectral data of three small EBs were obtained on 2013 June 6 with the largest solar telescope, the 1.6 m New Solar Telescope at the Big Bear Solar Observatory. The characteristics of these EBs are analyzed. The sizes of the EBs are in the range of 0.3‧ - 0.8‧ and their durations are only 3-5 min. Our semi-empirical atmospheric models indicate that the heating occurs around the temperature minimum region with a temperature increase of 2700-3000 K, which is surprisingly higher than previously thought. The radiative and kinetic energies are estimated to be as high as 5 × 1025 - 3.0 × 1026 erg despite the small size of these EBs. Observations of the magnetic field show that the EBs just appeared in a parasitic region with mixed polarities and were accompanied by mass motions. Nonlinear force-free field extrapolation reveals that the three EBs are connected with a series of magnetic field lines associated with bald patches, which strongly implies that these EBs should be produced by magnetic reconnection in the solar lower atmosphere. According to the lightcurves and the estimated magnetic reconnection rate, we propose that there is a three phase process in EBs: pre-heating, flaring and cooling phases.

  17. Telomere loss: mitotic clock or genetic time bomb?

    Science.gov (United States)

    Harley, C B

    1991-01-01

    The Holy Grail of gerontologists investigating cellular senescence is the mechanism responsible for the finite proliferative capacity of somatic cells. In 1973, Olovnikov proposed that cells lose a small amount of DNA following each round of replication due to the inability of DNA polymerase to fully replicate chromosome ends (telomeres) and that eventually a critical deletion causes cell death. Recent observations showing that telomeres of human somatic cells act as a mitotic clock, shortening with age both in vitro and in vivo in a replication dependent manner, support this theory's premise. In addition, since telomeres stabilize chromosome ends against recombination, their loss could explain the increased frequency of dicentric chromosomes observed in late passage (senescent) fibroblasts and provide a checkpoint for regulated cell cycle exit. Sperm telomeres are longer than somatic telomeres and are maintained with age, suggesting that germ line cells may express telomerase, the ribonucleoprotein enzyme known to maintain telomere length in immortal unicellular eukaryotes. As predicted, telomerase activity has been found in immortal, transformed human cells and tumour cell lines, but not in normal somatic cells. Telomerase activation may be a late, obligate event in immortalization since many transformed cells and tumour tissues have critically short telomeres. Thus, telomere length and telomerase activity appear to be markers of the replicative history and proliferative potential of cells; the intriguing possibility remains that telomere loss is a genetic time bomb and hence causally involved in cell senescence and immortalization.

  18. Diagnostics of Ellerman Bombs with High-resolution Spectral Data

    CERN Document Server

    Li, Z; Guo, Y; Chen, P F; Xu, Z; Cao, W

    2015-01-01

    Ellerman bombs (EBs) are tiny brightenings often observed near sunspots. The most impressive characteristic of the EB spectra is the two emission bumps in both wings of the H$\\alpha$ and \\ion{Ca}{II} 8542 {\\AA} lines. High-resolution spectral data of three small EBs were obtained on 2013 June 6 with the largest solar telescope, the 1.6 meter New Solar Telescope (NST), at the Big Bear Solar Observatory. The characteristics of these EBs are analyzed. The sizes of the EBs are in the range of 0.3\\arcsec\\--0.8\\arcsec\\ and their durations are only 3--5 minutes. Our semi-empirical atmospheric models indicate that the heating occurs around the temperature minimum region with a temperature increase of 2700--3000 K, which is surprisingly higher than previously thought. The radiative and kinetic energies are estimated to be as high as 5$\\times$10$^{25}$--3.0$\\times$10$^{26}$ ergs despite the small size of these EBs. Observations of the magnetic field show that the EBs appeared just in a parasitic region with mixed polar...

  19. Design, Development, and Innovation of an Interactive Multimedia Training Simulator for Responding to Air Transportation Bomb Threats

    Science.gov (United States)

    Chung, Christopher A.; Marwaha, Shweta

    2005-01-01

    This paper describes an interactive multimedia simulator for air transportation bomb threat training. The objective of this project is to improve the air transportation sector s capability to respond to bomb threats received by commercial airports and aircraft. The simulator provides realistic training on receiving and responding to a variety of bomb threats that might not otherwise be possible due to time, cost, or operational constraints. Validation analysis indicates that the use of the simulator resulted in statistically significant increases in individual ability to respond to these types of bomb threats.

  20. Plasma Exchange in Severe Attacks of Neuromyelitis Optica

    Directory of Open Access Journals (Sweden)

    Mickael Bonnan

    2012-01-01

    Full Text Available Background. Neuromyelitis optica (NMO attacks are poorly controlled by steroids and evolve in stepwise neurological impairments. Assuming the strong humoral response underlying NMO attacks, plasma exchange (PLEX is an appropriate technique in severe NMO attacks. Objective. Presenting an up-to-date review of the literature of PLEX in NMO. Methods. We summarize the rationale of PLEX in relation with the physiology of NMO, the main technical aspects, and the available studies. Results. PLEX in severe attacks from myelitis or optic neuritis are associated with a better outcome, depending on PLEX delay (“time is cord and eyes”. NMO-IgG status has no influence. Finally, we build up an original concept linking the inner dynamic of the lesion, the timing of PLEX onset and the expected clinical results. Conclusion. PLEX is a safe and efficient add-on therapy in NMO, in synergy with steroids. Large therapeutic trials are required to definitely assess the procedure and define the time opportunity window.

  1. Posttraumatic Stress Disorder Following the September 11, 2001, Terrorist Attacks

    Science.gov (United States)

    Neria, Yuval; DiGrande, Laura; Adams, Ben G.

    2012-01-01

    The September 11, 2001 (9/11), terrorist attacks were unprecedented in their magnitude and aftermath. In the wake of the attacks, researchers reported a wide range of mental and physical health outcomes, with posttraumatic stress disorder (PTSD) the one most commonly studied. In this review, we aim to assess the evidence about PTSD among highly exposed populations in the first 10 years after the 9/11 attacks. We performed a systematic review. Eligible studies included original reports based on the full Diagnostic and Statistical Manual of Mental Disorders (4th ed., rev.; American Psychiatric Association, 2000) criteria of PTSD among highly exposed populations such as those living or working within close proximity to the World Trade Center (WTC) and the Pentagon in New York City and Washington, DC, respectively, and first responders, including rescue, cleaning, and recovery workers. The large body of research conducted after the 9/11 attacks in the past decade suggests that the burden of PTSD among persons with high exposure to 9/11 was substantial. PTSD that was 9/11-related was associated with a wide range of correlates, including sociodemographic and background factors, event exposure characteristics, loss of life of significant others, and social support factors. Few studies used longitudinal study design or clinical assessments, and no studies reported findings beyond six years post-9/11, thus hindering documentation of the long-term course of confirmed PTSD. Future directions for research are discussed. PMID:21823772

  2. Ophthalmologic survey of atomic bomb survivors in Japan, 1949. Atomic bomb radiation cataract case report with histopathologic study. Medical examination of Hiroshima patients with radiation cataracts

    Energy Technology Data Exchange (ETDEWEB)

    Cogan, D.G.; Martin, S.F.; Kimura, S.J.; Ikui, Hiroshi; Fillmore, P.G.

    1959-01-01

    This document contains 3 reports dealing with the delayed effects of radiation on the eyes of survivors of the atomic explosions in Hiroshima and Nagasaki. In the first study, 1000 persons who were listed as having been in the open and within two kilometers of the hypocenter at the time of the explosion were selected at random from the census files of the Atomic Bomb Casualty Commission for study. In addition, 231 others, comprising the total available number of surviving persons listed at present in the census files as having been within one kilometer of the hypocenter, were examined, as were several hundred others who were contacted through newspaper publicity, referrals from local ophthalmologists, or through hearsay. The survey resulted in bringing in persons having, or having had, a variety of ocular conditions. Those connected with the atomic bomb included the following diagnoses; multiple injuries of eyes and eyelids; keratoconjunctivitis from ultraviolet and ionizing radiations; thermal burn of the cornea and of the retina; retinitis proliferans; and radiation cataracts. The cataracts were the only delayed manifestations of ocular injury from the atomic bomb. The second paper is a case report of a histopathologic study of atomic bomb radiation cataract. The third paper presents the results of medical examinations of survivors having radiation induced cataracts. 32 references, 8 figures. (DMC)

  3. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  4. ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL

    Institute of Scientific and Technical Information of China (English)

    Wei Baodian; Liu Dongsu; Wang Xinmei

    2004-01-01

    The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.

  5. Psychological interventions following terrorist attacks.

    Science.gov (United States)

    Mansdorf, Irwin J

    2008-01-01

    Psychological reactions to terror attacks have been documented as ranging from no symptoms to transient behavioural symptoms to more serious posttraumatic stress. A review of representative studies is presented, with a critical analysis of the salient points of the various psychological intervention strategies for terrorist attacks. Common aspects of both most intervention approaches include multifaceted models that foster social support and include a preparatory phase, a phase of 'psychological first aid' and a follow-up phase of referral for more severe cases. The notion of intervention for all who may show some symptoms is not universally accepted. Where treatment or intervention is used, the debriefing aspect of CISM (Critical Incident Stress Management) remains highly disputed, with the focus on intrusively revisiting the trauma appearing to have questionable value at best. Some data questions whether formal treatment or intervention is necessary or even desirable. For many who choose not to seek out any help following a trauma, clinical data shows no negative results. Moreover, the preponderance of data shows that conventional 'debriefing' is not recommended. If the debriefing mechanism is refined so that intrusive emotional rehashing of the traumatic event is eliminated, the resultant interventions resemble resilience based approaches. Further defining when intervention is called for and refining the mechanisms of intervention in multi-stage intervention.

  6. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to ...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs.......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...

  7. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  8. Thrombolytic therapy for acute ischemic stroke after recent transient ischemic attack.

    Science.gov (United States)

    Alonso de Leciñana, María; Fuentes, Blanca; Masjuan, Jaime; Simal, Patricia; Díaz-Otero, Fernando; Reig, Gemma; Díez-Tejedor, Exuperio; Gil-Nuñez, Antonio; Vivancos, Jose; Egido, Jose-Antonio

    2012-04-01

    Safety and efficacy of intravenous thrombolysis in stroke patients with recent transient ischemic attack are hotly debated. Patients suffering transient ischemic attack may present with diffusion-weighted imaging lesions, and although normal computed tomography would not preclude thrombolysis, the concern is that they may be at higher risk for hemorrhage post-thrombolysis treatment. Prior ipsilateral transient ischemic attack might provide protection due to ischemic preconditioning. We assessed post-thrombolysis outcomes in stroke patients who had prior transient ischemic attack. Multicentered prospective study of consecutive acute stroke patients treated with intravenous tissue plasminogen activator (tPA). Ipsilateral transient ischemic attack, baseline characteristics, risk factors, etiology, and time-lapse to treatment were recorded. National Institutes of Health Stroke Scale at seven-days and modified Rankin Scale at three-months, symptomatic intracranial hemorrhage, and mortality were compared in patients with and without transient ischemic attack. There were 877 patients included, 60 (6·84%) had previous ipsilateral transient ischemic attack within one-month prior to the current stroke (65% in the previous 24 h). Transient ischemic attack patients were more frequently men (70% vs. 53%; P = 0·011), younger (63 vs. 71 years of age; P = 0·011), smokers (37% vs. 25%; P = 0·043), and with large vessel disease (40% vs. 25%; P = 0·011). Severity of stroke at onset was similar to those with and without prior transient ischemic attack (median National Institutes of Health Stroke Scale score 12 vs. 14 P = 0·134). Those with previous transient ischemic attack were treated earlier (117 ± 52 vs. 144 ± 38 mins; P ischemic attack was not associated with differences in stroke outcome such as independence (modified Rankin Scale 0-2) (odds ratios: 1·035 (0·57-1·93) P = 0·91), mortality (odds ratios: 0·99 (0·37-2·67) P = 0

  9. Generation of reactive oxygen species by lethal attacks from competing microbes

    OpenAIRE

    Dong, Tao G.; Dong, Shiqi; Catalano, Christy; Moore, Richard; Liang, Xiaoye; Mekalanos, John J.

    2015-01-01

    How microbes respond to lethal attacks from competing species is not fully understood. Here, we investigated the response of Escherichia coli to attacks from the type VI secretion system (T6SS), bacteriophage P1vir, and polymyxin B. We report that generation of reactive oxygen species (ROS) is a general outcome of potentially lethal activities mediated by contact-dependent or contact-independent interactions of aggressive competing bacterial species and phage. An ROS response gene, soxS, is h...

  10. ANM to Perceive and Thwart Denial of Service Attack in WLAN

    Directory of Open Access Journals (Sweden)

    Durairaj M

    2015-05-01

    Full Text Available Wireless infrastructure network is vulnerable to Denial of Service (DoS attack which makes the resources unavailable for its intended user. As an outcome of DoS attack, authenticated user is denied from accessing the network by spoofing legitimate client identity. Reduced protection in management frame led to MAC spoof DoS attack. Though 802.11w was developed to protect the management frame, the network is vulnerable to different DoS attacks and unable to prevent all types of DoS attacks. This motivated us to propose a mechanism to detect and prevent substantial number of DoS attacks. This paper proposes an algorithm called Alternative Numbering Mechanism (ANM which prevents DoS attacks. The proposed solution is simulated in NS2 for experimentation. Packet delivery ratio, control overhead, normalized routing overhead, delay time, throughput and packet drop were measured for experimentation and to evaluate the performance of ANM. The experimental results of ANM demonstrate that the performance of ANM is encouraging and prevents nearly all types of DoS attacks.

  11. The bomb black market - Inquiry about nuclear proliferation; Le marche noir de la bombe - Enquete sur la proliferation nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, B

    2009-07-01

    Nuclear weapons remain for a long time in the hands of the five big powers: USA, Soviet Union, Great Britain, France and China. Things started to change when Israel, and then India acquired the atomic bomb as well. Pakistan took up the race too but Abdul Qadeer Khan, one of the nuclear program maker of the country, took profit of the situation to set up a huge international proliferation network for the spreading of the technologies, tools and materials necessary for weapons fabrication. He offered his services not only to Iran and North Korea, but to Iraq and Libya as well and probably to some other countries. Today, the Iranian nuclear program generates both envy and fear in the Middle East. Who is going to be the next domino of the nuclear game? Egypt, Saudi Arabia, Algeria and Turkey are potential candidates. But while Pakistan sinks into crisis, the terrorists are taking interest in nukes. The author of this book has worked for more than 10 years on this dossier. He has had access to the most sensible documents and to essential testimonies. He now lifts the curtain on the secrets of nuclear proliferation. In this book, where reality sometimes surpasses fiction, he explains how the CIA finally succeeded in infiltrating the 'Khan ring' after having closed its eyes on his deals for a long time. He describes the branches of the Pakistani atomic complex and analyses with lucidity the nuclear terrorism risk.

  12. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  13. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  14. Characteristic expression of fukutin in gastric cancer among atomic bomb survivors.

    Science.gov (United States)

    Pham, Trang T B; Oue, Naohide; Yamamoto, Manabu; Fujihara, Megumu; Ishida, Teruyoshi; Mukai, Shoichiro; Sakamoto, Naoya; Sentani, Kazuhiro; Yasui, Wataru

    2017-02-01

    Approximately 70 years have passed since the atomic bombs were dropped on Nagasaki and Hiroshima. To elucidate potential biomarkers and possible mechanisms of radiation-induced cancer, the expression of FKTN, which encodes fukutin protein and causes Fukuyama-type congenital muscular dystrophy, was analyzed in gastric cancer (GC) tissue samples from atomic bomb survivors. Expression of cluster of differentiation (CD) 10 was also evaluated, as it has previously been observed that positive fukutin expression was frequently noted in CD10-positive GC cases. In the first cohort from Hiroshima Red Cross Hospital and Atomic-Bomb Survivors Hospital (Hiroshima, Japan; n=92), 102 (53%) of the GC cases were positive for fukutin. Expression of fukutin was not associated with exposure status, but was associated with CD10 expression (P=0.0001). The second cohort was from Hiroshima University Hospital (Hiroshima, Japan; n=86), and these patients were also in the Life Span Study cohort, in which atomic bomb radiation doses were precisely estimated using the DS02 system. Expression of fukutin was detected in 58 (67%) of GC cases. GC cases positive for fukutin were observed more frequently in the low dose-exposed group than in the high dose-exposed group (P=0.0001). Further studies with a larger cohort, including precise radiation dose estimation, may aid in clarifying whether fukutin could serve as a potential biomarker to define radiation-induced GC in atomic-bomb survivors.

  15. Non-cancer Diseases of Korean Atomic Bomb Survivors in Residence at Hapcheon, Republic of Korea

    Science.gov (United States)

    Ju, Young-Su; Kim, Jung-Bum; Kim, Jin-Kook

    2006-01-01

    Many Koreans, in addition to Japanese, were killed or injured by the atomic bombs detonated over Hiroshima and Nagasaki, Japan, in 1945. Our study examined non-cancer diseases of Korean A-bomb survivors in residence at Hapcheon, Republic of Korea and evaluated whether they had significantly higher prevalence of non-cancer diseases than non-exposed people. We evaluated a number of tests, including anthropometric measurements, blood pressure, blood chemistry, hepatitis B surface antigen, and urinalysis, of survivors (n=223) and controls (n=372). Univariate analysis revealed significantly lower fasting glucose and creatinine, and higher diastolic blood pressure, aspartate aminotransferase, alanine aminotransferase, and blood urea nitrogen levels in the survivors than in the controls. The calculation of crude prevalence ratios (PRs) revealed that A-bomb survivors had a significantly higher prevalence of hypertension (PR, 1.16; 95% CI, 1.00-1.35) and chronic liver disease (2.20; 1.59-3.06) than controls. After adjusting for covariates (age, sex, body mass index, marital status, education, alcohol consumption, and smoking), A-bomb survivors had a significantly higher prevalence of hypertension (1.24; 1.06-1.44), chronic liver disease (2.07; 1.51-2.84), and hypercholesterolemia (1.79; 1.11-2.90) than controls. This study suggests that A-bomb exposure is associated with a higher prevalence of non-cancer diseases in Korean survivors. PMID:16778377

  16. Noncancer mortality based on the Hiroshima Atomic Bomb survivors registry over 30 years, 1968-1997

    Energy Technology Data Exchange (ETDEWEB)

    Kasagi, Keiko [Hiroshima Univ. (Japan). Research Inst. for Radiation Biology and Medicine

    2002-04-01

    The relation of radiation exposure with noncancer mortality was examined on 44,514 atomic bomb survivors (17,935 males, 26,579 females, and mean age 22.8{+-}15.7 yrs at the time of bombing) registered at Research Institute for Radiation Biology and Medicine, Hiroshima University, based on mortality follow-up over 30 years, 1968-1997. Noncancer mortality was significantly related to radiation dose with relative risk of 1.06 at 1 Sv radiation dose, although weaker than the dose response in solid cancer mortality. The significant dose responses were observed especially in circulatory disease, stroke and urinary organ disease, and suggestive dose response in pneumonia. The temporal pattern in dose response by age at the time of bombing indicated that the relative risk of noncancer mortality was higher with follow-up period, which is contrary to a decreasing dose response in solid cancer mortality with follow-up period. The tendency was remarkable in those survivors younger at the time of bombing. These findings suggest that the significant radiation risk observed in noncancer mortality might increase as the proportion of younger survivors among atomic bomb survivors increases. (author)

  17. Scaling Laws for Impacts into Wet Substrates: Applied to the Bomb Sag at Home Plate, Mars

    Science.gov (United States)

    Birch, S. P.; Manga, M.; Delbridge, B. G.; Patel, A.; Knappe, E.; Dufek, J.

    2013-12-01

    The Mars Exploration Rover Spirit imaged a volcanic bomb sag in Gusev crater at Home Plate (Squyres et al., Science 2007). In order to gain a more complete understanding of these types of craters, we perform laboratory experiments to identify controls on the main features of bomb sags. In our previous work (Manga et al., GRL 2012), we were able to identify clear qualitative differences in the crater morphology, which allowed us to determine that the substrate at Home Plate was fully saturated. The current study focuses on further understanding the relationship between the depth of particle penetration, crater radius, impact velocity, impactor radius and substrate grain size for impacts into a fully saturated substrate. The results of these measurements provide a physical understanding to the previous empirical scaling relationships in crater morphology at intermediate impact velocities between 10 m/s and 100 m/s. By gaining insight into the mechanisms of how a saturated granular medium deforms under the load of an impacting sphere we are able to obtain revised scaling laws for the penetration depth of bomb sags with respect to impact velocity for observable bomb sags. With an inferred impact velocity for the case of the Home Plate bomb sag, we can provide a more accurate estimate of a paleo-Mars atmospheric density.

  18. Nuclear shadows on silvered walls: Atomic Bomb Cinema, from 1935 to 1991

    Energy Technology Data Exchange (ETDEWEB)

    Shapiro, J.F.

    1991-01-01

    The cinema and the atomic bomb are two of the most significant technological innovations of the past-century - their influence on culture has provoked tremendous political, academic, and popular debate. The point at which these two technologies intersect is what the author calls Atomic Bomb Cinema.' Since 1945 almost six hundred films with images of nuclear weapons have been released in the US, and they have been virtually ignored by everyone but the film going public. This study shows how Bomb films' use recurring themes and formal structures, and therefore must be treated as a coherent body of films; identifies historical, mythological, and contemporary motifs; and analyzes these films from two points of view: interdisciplinary (history, politics, economics, sociology, and aesthetics) and cross-cultural (American, Japanese, British, and Australian). The most important element of Atomic Bomb Cinema is the Apocalyptic Imagination; film makers use it to structure their narratives and explore a wide range of ideological issues. In contrast to commonly held beliefs, Atomic Bomb Cinema is undeniably part of a process that helps people to understand the threat of nuclear war. In this instance, the cinema is one cultural institution that contributes to a healthy society.

  19. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  20. Impact of Alleged Russian Cyber Attacks

    Science.gov (United States)

    2009-05-01

    March 14, 2009). 96 Ivan Buranov, Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal...Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated by Open Source...Buranov, Ivan; Vodo, Vladimir; and Yegikyan, Seda Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated

  1. Proteinuria in Hiroshima and Nagasaki atomic bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Freedman, L.R.; Seki, Masafumi; Phair, J.P.; Nefzger, M.D.

    1966-08-25

    A study of the epidemiology of proteinuria was conducted on about 5000 persons comprising a portion of the clinical sample under study at the Atomic Bomb Casualty Commission. In addition, data from previous examinations of similar samples were analyzed. Proteinuria was more common in Hiroshima than in Nagasaki. The rates for men and women did not differ within cities. Age-specific rates of proteinuria were peculiar, peaking in adolescence and old age. In the subjects under study proteinuria was frequently inconstant and usually represented excretion of less than 1.0 g of protein per day. Prior exposure to radiation as measured by distance from the hypocenter was correlated with increased proteinuria rates in 18-year-old subjects who were in utero ATB. Subjects exposed after birth did not show this tendency. It is unsettled whether radiation results in renal disease by increasing the subject's susceptibility to the usual causes of glomerulonephritis or by some more direct mechanism. Persons with proteinuria had higher mean blood pressures and serum urea nitrogen levels than controls and had other findings indicative of generalized cardiovascular-renal disease. Persons with thyroid disease had an increased risk of proteinuria whereas the converse was true of those with a history of treatment for peptic ulcer. Many other factors were tested for a relation to proteinuria, including family history of renal disease, socioeconomic status, urinary symptoms, ingestion of medications, physical findings, hemoglobin levels, height, weight, ABO blood groups, audiometry, vibrometry, and serum cholesterol levels. Although urinary symptoms were more common in persons with proteinuria, the findings in other areas were not sufficiently different to suggest meaningful relations. 20 references, 2 figures, 13 tables.

  2. Application of Bomb Radiocarbon Chronologies to Shortfin Mako (Isurus oxyrinchus)

    Energy Technology Data Exchange (ETDEWEB)

    Ardizzone, D; Cailliet, G M; Natanson, L J; Andrews, A H; Kerr, L A; Brown, T A

    2007-07-16

    and the number of samples for MIA analysis was insufficient for some months. Hence, unequivocal validation of shortfin mako age estimates has yet to be accomplished. Atmospheric testing of thermonuclear devices in the 1950s and 1960s effectively doubled the natural atmospheric radiocarbon ({sup 14}C). The elevated {sup 14}C levels were first recorded in 1957-58, with a peak around 1963. As a consequence, {sup 14}C entered the ocean through gas exchange with the atmosphere at the ocean surface and in terrestrial runoff. Despite variable oceanographic conditions, a worldwide rise of the bomb {sup 14}C signal entered the ocean mixed layer as dissolved inorganic carbon (DIC) in 1957-58. The large amounts of {sup 14}C released from the bomb tests produced a signature that can be followed through time, throughout the marine food web, and into deeper waters. The marked increase of radiocarbon levels was first measured in the DIC of seawater and in biogenic marine carbonates of hermatypic corals in Florida. Subsequently, this record was documented in corals from other regions and in the thallus of rhodoliths. The accumulation of radiocarbon in the hard parts of most marine organisms in the mixed layer (such as fish otoliths and bivalves) was synchronous with the coral time-series. This technique has been used to validate age estimates and longevity of numerous bony fishes to date, as well as to establish bomb radiocarbon chronologies from different oceans. In the first application of this technique to lamnoid sharks, validated annual band-pair deposition in vertebral growth bands for the porbeagle (Lamna nasus) aged up to 26 years. Radiocarbon values from samples obtained from 15 porbeagle caught in the western North Atlantic Ocean (some of which were known-age) produced a chronology similar in magnitude to the reference carbonate chronology for that region. The observed phase shift of about 3 years was attributed to different sources of carbon between vertebrae and those for

  3. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  4. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  5. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  6. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  7. Attacks on Local Searching Tools

    CERN Document Server

    Nielson, Seth James; Wallach, Dan S

    2011-01-01

    The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

  8. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  9. Preventing Heart Attacks and Strokes: Increasing Awareness ...

    Science.gov (United States)

    Summary: Chronic cardiovascular disease imposes a significant health and economic burden on individuals and communities. Despite decades of improvement in cardiovascular mortality, cardiovascular disease and stroke remain the leading cause of death in the U.S. and disparities in health outcomes persist. Moreover, the continuous improvement in cardiovascular mortality typical of the last four decades has ended motivating new and innovative approaches to improve population health and wellbeing. Apart from continued focus on traditional risk factor modification such as identification and treatment of high blood pressure and cholesterol, cessation of smoking, and appropriate use of evidence-based pharmacological prevention measures and disease management, other factors should be considered such as increasing physical activity, dietary sodium reduction and modification of social and environmental determinants known to cause heart attacks and stroke and exacerbate vascular disease. Such an approach will require greater cooperation among public health, environmental health, the broader public and private healthcare delivery and payment systems, and federal agencies. To introduce this concept the U.S. EPA held a workshop in September 2016 bringing together representatives of local and state public health officials, the healthcare system, educators, data analytics, and federal partners (CMS, CDC, Dept. of State and EPA) for the purpose of exploring the idea of prom

  10. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  11. Ellerman bombs at high resolution. IV. Visibility in Na I and Mg I

    CERN Document Server

    Rutten, R J; Vissers, G J M

    2015-01-01

    Ellerman bombs are transient brightenings of the wings of the solar Balmer lines that mark reconnection in the photosphere. Ellerman noted in 1917 that he did not observe such brightenings in the Na I D and Mg I b lines. This non-visibility should constrain EB interpretation, but has not been addressed in published bomb modeling. We therefore test Ellerman's observation and confirm it using high-quality imaging spectrometry with the Swedish 1-m Solar Telescope. However, we find diffuse brightness in these lines that seems to result from prior EBs. We tentatively suggest this is a post-bomb hot-cloud phenomenon also found in recent EB spectroscopy in the ultraviolet.

  12. Impact of Nagasaki atomic bomb exposure on myelodysplastic syndrome patients who are treated with azacitidine.

    Science.gov (United States)

    Jo, Tatsuro; Horio, Kensuke; Shigematsu, Kazuto

    2015-05-01

    High-dose radiation exposure greatly increases the risk of myelodysplastic syndromes (MDS), however the clinical characteristics of MDS among atomic bomb survivors have not been thoroughly investigated to date. We designed this study to identify these characteristics. We retrospectively evaluated data from 13 atomic bomb survivors with MDS and 15 elderly patients with de novo MDS who were diagnosed between April 2011 and April 2013 at the Nagasaki Genbaku Hospital. All patients were treated with azacitidine (AZA; a hypomethylating agent) and overall survival rates were estimated. No clear difference was observed in the clinical response to AZA between the two groups. However, atomic bomb survivors had a survival disadvantage, independent of their karyotype. Minute genetic alterations caused by exposure to atomic radiation can adversely affect the response to AZA, even 66 years after the exposure. Further studies are required to clarify the mechanisms underlying this phenomenon. Copyright© 2015 International Institute of Anticancer Research (Dr. John G. Delinassios), All rights reserved.

  13. Biological Profiles of Korean Atomic Bomb Survivors in Residence at Daegu and Kyungbuk, Republic of Korea

    Science.gov (United States)

    Jhun, Hyung-Joon; Kim, Byoung-Gwon; Kim, Su-Young; Koo, Bon-Min; Kim, Jin-Kook

    2008-01-01

    In 1945, many Koreans, in addition to Japanese, were killed or injured by the atomic bombs dropped on Hiroshima and Nagasaki, Japan. This study compared the biological profiles of Korean atomic bomb survivors in residence at Daegu and Kyungbuk, Republic of Korea with those of a representative sample of Koreans obtained during a similar period. We evaluated anthropometric measurements, blood pressure, blood cell counts, blood chemistry, and urinalysis of survivors (n=414) and age- and sex-matched controls (n=414) recruited from the third Korea National Health and Nutrition Examination Survey conducted in 2005. Univariate analyses revealed significantly higher systolic blood pressure, white blood cell count, and serum total cholesterol, triglycerides, high-density lipoprotein-cholesterol, and aspartate aminotransferase levels (patomic bomb survivors were adversely affected by radiation exposure. PMID:19119455

  14. [Cohort studies of the atomic bomb survivors at the Radiation Effects Research Foundation].

    Science.gov (United States)

    Ozasa, Kotaro

    2012-03-01

    The Radiation Effects Research Foundation has been evaluating the risk of atomic bomb radiation for various diseases since the beginning of its former organization, the Atomic Bomb Casualty Commission. Cohorts of atomic-bomb survivors, in-utero survivors, and survivors' offspring have been followed up. The risk of all solid cancers at 1 Gy was estimated as ERR = 0.47 and EAR = 52/10,000 person-years for people who were exposed at 30 years of age and had reached 70 years of age, based on the cancer incidence during 1958-1998. The risk seemed to be increased in the in-utero survivors, but was rather lower than the risk for the survivors exposed at a young age. Effects on the offspring of survivors have not been shown to be significant. Continuing the research is important in order to more accurately estimate and understand radiation-induced health effects.

  15. Radiation exposure and circulatory disease risk: Hiroshima and Nagasaki atomic bomb survivor data, 1950-2003.

    Science.gov (United States)

    Shimizu, Yukiko; Kodama, Kazunori; Nishi, Nobuo; Kasagi, Fumiyoshi; Suyama, Akihiko; Soda, Midori; Grant, Eric J; Sugiyama, Hiromi; Sakata, Ritsu; Moriwaki, Hiroko; Hayashi, Mikiko; Konda, Manami; Shore, Roy E

    2010-01-14

    To investigate the degree to which ionising radiation confers risk of mortality from heart disease and stroke. Prospective cohort study with more than 50 years of follow-up. Atomic bomb survivors in Hiroshima and Nagasaki, Japan. 86 611 Life Span Study cohort members with individually estimated radiation doses from 0 to >3 Gy (86% received atomic bomb radiation. About 9600 participants died of stroke and 8400 died of heart disease between 1950 and 2003. For stroke, the estimated excess relative risk per gray was 9% (95% confidence interval 1% to 17%, P=0.02) on the basis of a linear dose-response model, but an indication of possible upward curvature suggested relatively little risk at low doses. For heart disease, the estimated excess relative risk per gray was 14% (6% to 23%, Patomic bomb survivors.

  16. Investigations of Lateral Stability of a Glide Bomb Using Automatic Control Having No Time Lag

    Science.gov (United States)

    Sponder, E. W.

    1950-01-01

    The investigation of the lateral stability of an automatically controlled glide bomb led also to the attempt of clarifying the influence of a phugoid oscillation or of any general longitudinal oscillation on the lateral stability of a glide bomb. Under the assumption that its period of oscillation considerably exceeds the rolling and yawing oscillation and that c(sub a) is, at least in sections, practically constant, the result of this test is quite simple. It becomes clear that the influence of the phugoid oscillation may be replaced by suitable variation of the rolling-yawing moment on a rectilinear flight path instead of the phugoid oscillation. If the flying weight of the glide bomb of unchanged dimensions is increased, an increase of the flight velocity will be more favorable than an increase of the lift coefficient. The arrangement of the control permits lateral stability to be achieved in every case; a minimum rolling moment due to sideslip proves of great help.

  17. Ellerman Bombs at High Resolution. IV. Visibility in Na I and Mg I

    Science.gov (United States)

    Rutten, R. J.; Rouppe van der Voort, L. H. M.; Vissers, G. J. M.

    2015-08-01

    Ellerman bombs are transient brightenings of the wings of the solar Balmer lines that mark reconnection in the photosphere. Ellerman noted in 1917 that he did not observe such brightenings in the Na i D and Mg i b lines. This non-visibility should constrain EB interpretation, but has not been addressed in published bomb modeling. We therefore test Ellerman’s observation and confirm it using high-quality imaging spectrometry with the Swedish 1-m Solar Telescope. However, we find a diffuse brightness in these lines that seems to result from prior EBs. We tentatively suggest this is a post-bomb hot-cloud phenomenon also found in recent EB spectroscopy in the ultraviolet.

  18. Sulfur activation at the Little Boy-Comet Critical Assembly: a replica of the Hiroshima bomb

    Energy Technology Data Exchange (ETDEWEB)

    Kerr, G.D.; Emery, J.F.; Pace, J.V. III

    1985-04-01

    Studies have been completed on the activation of sulfur by fast neutrons from the Little Boy-Comet Critical Assembly which replicates the general features of the Hiroshima bomb. The complex effects of the bomb's design and construction on leakage of sulfur-activation neutrons were investigated both experimentally and theoretically. Our sulfur activation studies were performed as part of a larger program to provide benchmark data for testing of methods used in recent source-term calculations for the Hiroshima bomb. Source neutrons capable of activating sulfur play an important role in determining neutron doses in Hiroshima at a kilometer or more from the point of explosion. 37 refs., 5 figs., 6 tabs.

  19. The Office of Censorship's Attempt to Control Press Coverage of the Atomic Bomb during World War II.

    Science.gov (United States)

    Washburn, Patrick S.

    The Office of Censorship's struggle to keep journalists from revealing the development of the first atomic bomb, the sites where the development was taking place, and the fact that the bomb might be available for use in the war, was desperate and in many ways heroic. Soon after it was created on December 19, 1941, the office issued a voluntary…

  20. Seeing the Light: Visibility of the July '45 Trinity Atomic Bomb Test from the Inner Solar System

    Science.gov (United States)

    Reed, B. Cameron

    2006-01-01

    In his "The Making of the Atomic Bomb," Richard Rhodes remarks of the July 16, 1945, Trinity atomic bomb test in New Mexico that "had astronomers been watching they could have seen it reflected from the moon, literal moonshine," an allusion to Ernest Rutherford's famous dismissal of the prospect of atomic energy. Investigating…

  1. 33 CFR 334.40 - Atlantic Ocean in vicinity of Duck Island, Maine, Isles of Shoals; naval aircraft bombing target...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Atlantic Ocean in vicinity of Duck Island, Maine, Isles of Shoals; naval aircraft bombing target area. 334.40 Section 334.40... Shoals; naval aircraft bombing target area. (a) The danger zone. A circular area with a radius of 500...

  2. 33 CFR 334.1470 - Caribbean Sea and Vieques Sound, in vicinity of Eastern Vieques; bombing and gunnery target area.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Caribbean Sea and Vieques Sound, in vicinity of Eastern Vieques; bombing and gunnery target area. 334.1470 Section 334.1470 Navigation...; bombing and gunnery target area. (a) The danger zone. From Punta Conejo on the south coast of Vieques at...

  3. 33 CFR 334.10 - Gulf of Maine off Seal Island, Maine; naval aircraft bombing target area.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Gulf of Maine off Seal Island, Maine; naval aircraft bombing target area. 334.10 Section 334.10 Navigation and Navigable Waters CORPS... REGULATIONS § 334.10 Gulf of Maine off Seal Island, Maine; naval aircraft bombing target area. (a) The danger...

  4. Seeing the Light: Visibility of the July '45 Trinity Atomic Bomb Test from the Inner Solar System

    Science.gov (United States)

    Reed, B. Cameron

    2006-01-01

    In his "The Making of the Atomic Bomb," Richard Rhodes remarks of the July 16, 1945, Trinity atomic bomb test in New Mexico that "had astronomers been watching they could have seen it reflected from the moon, literal moonshine," an allusion to Ernest Rutherford's famous dismissal of the prospect of atomic energy. Investigating…

  5. Aerodynamic Configuration Design of Gliding Extended Range Guided Bomb%滑翔增程制导航弹气动外形设计

    Institute of Scientific and Technical Information of China (English)

    雷娟棉; 吴甲生

    2011-01-01

    To improve the range of guided bomb, the scheme of aerodynamic configuration of extended range GPS guided bomb was put forward based on the gliding extended range technique. The designed aerodynamic configuration was the tail control configuration having great span-chord ratio up-wing and the tail/rudder with " X " form. By aerodynamic characteristics calculation and analysis, the parameters of configuration geometry were determined. Wind tunnel experiments were conducted for two models of wing stretch-out and wing folded model, respectively. The experiment conditions were as follows. The rolling angles are (ψ)=0(wing is horizontal, tail is" X "form) , 22. 5° and 45. 0°. The Mach number are Ma = 0.6, 0. 8 and 1. 0. The angles of attack are a = 0 ~ 12°. The rudder deflection angles are δz - 0; δs = - 5°, - 10° (pitching control); δy = - 5°, - 10° (yawing control); δX = - 5°, - 10° (rolling control). Experiment results indicate that the designed GPS guided bomb' s longitudinal stability and controllability match well, and the controlling efficiency of tail rudder is very high. The angle of attack being propitious to gliding flight is from 4° to 6° and the maximal lift-drag ratio is greater than 10. From the experiment result, it could be concluded that the effective range of the guided bomb would over 120 km while it is released at 12 km altitude.%为了提高制导航弹的射程,在滑翔增程技术研究基础上提出了远程卫星制导炸弹的气动布局方案,即采取大展弦比上弹翼、“×”形全动尾舵的正常式气动布局,通过计算选择了外形参数.对所提出的外形方案进行了风洞测力实验.实验条件为:滚转角(φ)=0(弹翼水平,尾翼呈“×”形),22.5°,45.0°;马赫数Ma=0.6,0.8,1.0;攻角α=0~12°;舵偏角δ=0,δz=-5°,-10°(俯仰控制),δy=-5°,-10°(偏航控制),δr=-5°,-10°(滚转控制).模型有弹翼张开与折叠两种状态.实验结果表明,所设计的卫星制导炸弹

  6. Thyroid Dysfunction and Autoimmune Thyroid Diseases Among Atomic Bomb Survivors Exposed in Childhood.

    Science.gov (United States)

    Imaizumi, Misa; Ohishi, Waka; Nakashima, Eiji; Sera, Nobuko; Neriishi, Kazuo; Yamada, Michiko; Tatsukawa, Yoshimi; Takahashi, Ikuno; Fujiwara, Saeko; Sugino, Keizo; Ando, Takao; Usa, Toshiro; Kawakami, Atsushi; Akahoshi, Masazumi; Hida, Ayumi

    2017-07-01

    The risk of thyroid cancer increases and persists for decades among individuals exposed to ionizing radiation in childhood, although the long-term effects of childhood exposure to medium to low doses of radiation on thyroid dysfunction and autoimmune thyroid diseases have remained unclear. To evaluate radiation dose responses for the prevalence of thyroid dysfunction and autoimmune thyroid disease among atomic bomb survivors exposed in childhood. Hiroshima and Nagasaki atomic bomb survivors who were younger than 10 years old at exposure underwent thyroid examinations at the Radiation Effects Research Foundation between 2007 and 2011, which was 62 to 66 years after the bombing. Data from 2668 participants (mean age, 68.2 years; 1455 women) with known atomic bomb thyroid radiation doses (mean dose, 0.182 Gy; dose range, 0 to 4.040 Gy) were analyzed. Dose-response relationships between atomic bomb radiation dose and the prevalence of hypothyroidism, hyperthyroidism (Graves' disease), and positive for antithyroid antibodies. Prevalences were determined for hypothyroidism (129 cases, 7.8%), hyperthyroidism (32 cases of Graves' disease, 1.2%), and positive for antithyroid antibodies (573 cases, 21.5%). None of these was associated with thyroid radiation dose. Neither thyroid antibody-positive nor -negative hypothyroidism was associated with thyroid radiation dose. Additional analyses using alternative definitions of hypothyroidism and hyperthyroidism found that radiation dose responses were not significant. Radiation effects on thyroid dysfunction and autoimmune thyroid diseases were not observed among atomic bomb survivors exposed in childhood, at 62 to 66 years earlier. The cross-sectional design and survival bias were limitations of this study.

  7. Epidemiological research on radiation-induced cancer in atomic bomb survivors.

    Science.gov (United States)

    Ozasa, Kotaro

    2016-08-01

    The late effects of exposure to atomic bomb radiation on cancer occurrence have been evaluated by epidemiological studies on three cohorts: a cohort of atomic bomb survivors (Life Span Study; LSS), survivors exposed IN UTERO : , and children of atomic bomb survivors (F1). The risk of leukemia among the survivors increased remarkably in the early period after the bombings, especially among children. Increased risks of solid cancers have been evident since around 10 years after the bombings and are still present today. The LSS has clarified the dose-response relationships of radiation exposure and risk of various cancers, taking into account important risk modifiers such as sex, age at exposure, and attained age. Confounding by conventional risk factors including lifestyle differences is not considered substantial because people were non-selectively exposed to the atomic bomb radiation. Uncertainty in risk estimates at low-dose levels is thought to be derived from various sources, including different estimates of risk at background levels, uncertainty in dose estimates, residual confounding and interaction, strong risk factors, and exposure to residual radiation and/or medical radiation. The risk of cancer in subjects exposed IN UTERO : is similar to that in LSS subjects who were exposed in childhood. Regarding hereditary effects of radiation exposure, no increased risk of cancers associated with parental exposure to radiation have been observed in the F1 cohort to date. In addition to biological and pathogenetic interpretations of the present results, epidemiological investigations using advanced technology should be used to further analyze these cohorts. © The Author 2016. Published by Oxford University Press on behalf of The Japan Radiation Research Society and Japanese Society for Radiation Oncology.

  8. A community study of the psychological effects of the Omagh car bomb on adults.

    Directory of Open Access Journals (Sweden)

    Michael Duffy

    Full Text Available BACKGROUND: The main aims of the study were to assess psychological morbidity among adults nine months after a car bomb explosion in the town of Omagh, Northern Ireland and to identify predictors of chronic posttraumatic stress disorder symptoms. METHOD: A questionnaire was sent to all adults in households in The Omagh District Council area. The questionnaire comprised established predictors of PTSD (such as pre-trauma personal characteristics, type of exposure, initial emotional response and long-term adverse physical or financial problems, predictors derived from the Ehlers and Clark (2000 cognitive model, a measure of PTSD symptoms and the General Health Questionnaire. RESULTS: Among respondents (n = 3131 the highest rates of PTSD symptoms and probable casesness (58.5% were observed among people who were present in the street when the bomb exploded but elevated rates were also observed in people who subsequently attended the scene (21.8% probable caseness and among people for whom someone close died (11.9%. People with a near miss (left the scene before the explosion did not show elevated rates. Exposure to the bombing increased PTSD symptoms to a greater extent than general psychiatric symptoms. Previously established predictors accounted for 42% of the variance in PTSD symptoms among people directly exposed to the bombing. Predictors derived from the cognitive model accounted for 63%. CONCLUSIONS: High rates of chronic PTSD were observed in individuals exposed to the bombing. Psychological variables that are in principle amenable to treatment were the best predictors of PTSD symptoms. Teams planning treatment interventions for victims of future bombings and other traumas may wish to take these results into account.

  9. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  10. Radiation Effects on Cognitive Function Among Atomic Bomb Survivors Exposed at or After Adolescence.

    Science.gov (United States)

    Yamada, Michiko; Landes, Reid D; Mimori, Yasuyo; Nagano, Yoshito; Sasaki, Hideo

    2016-06-01

    The objective of this study was to investigate radiation effects on longitudinal pre-dementia cognitive decline among participants who developed dementia as well as on those who did not develop dementia during follow-up. Measuring cognitive function with the Cognitive Abilities Screening Instrument approximately every 2 years, we followed 1844 atomic bomb survivors participating in the Adult Health Study of the Radiation Effects Research Foundation from 1992 to 2011. Participants were adolescents or older when exposed to between 0 and 4 Gy. Approximately 15% and 40% of participants were exposed to ≥1 Gy and atomic bomb survivors exposed at or after adolescence. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. Genius in the shadows a biography of Leo Szilard, the man behind the bomb

    CERN Document Server

    Lanouette, William

    2013-01-01

    Well-known names such as Albert Einstein, Enrico Fermi, J. Robert Oppenheimer, and Edward Teller are usually those that surround the creation of the atom bomb. One name that is rarely mentioned is Leo Szilard, known in scientific circles as "father of the atom bomb." The man who first developed the idea of harnessing energy from nuclear chain reactions, he is curiously buried with barely a trace in the history of this well-known and controversial topic.Born in Hungary and educated in Berlin, he escaped Hitler's Germany in 1933 and that first year developed his concept of nucle

  12. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  13. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc)

    2006-01-01

    textabstractIn this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to

  14. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  15. Revisiting attacker model for smart vehicles

    NARCIS (Netherlands)

    Petit, Jonathan; Feiri, Michael; Kargl, Frank

    Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this

  16. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks with c...... with cascaded Erbium-doped fiber amplifiers and a comb laser....

  17. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...

  18. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  19. Minimization and Reliability Analyses of Attack Graphs

    Science.gov (United States)

    2002-02-01

    they model only attacks. Since we have a generic state machine model , we can simultaneously model not just attacks, but also seemingly benign system...Finite State Machine Model The Network We model the network as a set of facts, each represented as a relational predicate. The state of the network

  20. Attack tree generation by policy invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified th

  1. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  2. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  3. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  4. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  5. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  6. Performance Evaluation of Wormhole Attack In AODV

    Directory of Open Access Journals (Sweden)

    Samuel Jacob

    2015-02-01

    Full Text Available The Mobile Ad hoc Networks (MANETs is a collection of wireless nodes which interact with each other by sending packets to one another or on behalf of another node, without any central network infrastructure to control data routing. For communication, the nodes cooperatively forward data packets to other nodes in network by using the routing protocol. But, these routing protocols are not secure, thus paving the way for the MANET to be open to malicious attacks. A malicious attack which is commonly observed in MANET environment is wormhole attack. The objective of this work is to analyze the performance parameters of throughput, delay and packet loss in AODV with the existence of wormhole attack. Simulation results have shown that the performance parameters are affected very much when there is an attack due to wormholes.

  7. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  8. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  9. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...... but not the computation. Such weaker model can still be practically useful and moreover, may provide nice building-blocks to tackle full-fledged tampering in future. In this dissertation we study different models of memory-tampering and provide a number of solutions with different flavors. Mainly we took two different...

  10. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  11. Exposure to Atomic Bomb Radiation and Age-Related Macular Degeneration in Later Life: The Hiroshima-Nagasaki Atomic Bomb Survivor Study.

    Science.gov (United States)

    Itakura, Katsumasa; Takahashi, Ikuno; Nakashima, Eiji; Yanagi, Masahide; Kawasaki, Ryo; Neriishi, Kazuo; Wang, Jie Jin; Wong, Tien Yin; Hida, Ayumi; Ohishi, Waka; Kiuchi, Yoshiaki

    2015-08-01

    To investigate the association between radiation exposure from the atomic bombings and the prevalence of age-related macular degeneration (AMD) among older residents of Hiroshima and Nagasaki. The Adult Health Study is a cohort study of atomic bomb survivors living in Hiroshima and Nagasaki, comprising 2153 participants who underwent examinations with retinal fundus photographs in 2006-2008. The radiation dose to the eye for the analysis was estimated with the revised dosimetry system (DS02). The retinal photographs were graded according to the Wisconsin Age-Related Maculopathy Grading System modified for nonstereoscopic retinal images. Early and late AMD were defined according to the type of lesion detected in the worse eye of the participants. Person-specific data were analyzed by using a logistic regression model to assess the association between radiation dose and AMD. Among the 1824 subjects with gradable retinal images (84.7% of the overall participants), the estimated eye dose was widely distributed, with a mean of 0.45 Gy and standard deviation of 0.74 Gy. The prevalence of early and late AMD was 10.5% and 0.3%, respectively. There were no significant associations between radiation dose and AMD, with each 1-Gy increase in exposure, adjusted odds ratio was 0.93 (95% confidence interval [CI], 0.75-1.15) for early AMD and 0.79 (95% CI, 0.21-2.94) for late AMD. No significant associations were found between atomic bomb irradiation early in life and the prevalence of early or late AMD later in life among Japanese atomic bomb survivors.

  12. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  13. An Intrusion Detection System Against UDP Flood Attack and Ping of Death Attack (DDOS in MANET

    Directory of Open Access Journals (Sweden)

    Ankur Ashok Acharya

    2016-04-01

    Full Text Available DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death attack are considered to be important as these two attacks may cause severe damage to the network. To provide better security to the network, efficient intrusion detection (IDS system is required to monitor the network continuously, keeping track of malicious activities and policy violations and produce report to the network administrator. UDP flood attack and ping of death attack are given importance in this paper as they are not well addressed in the existing research works. Packet capture and packet decoder is used to identify the packets and retrieve the packet details. A threshold is set for each node that is connected to the network. If the packet flow into the node exceeds the threshold that is set then the administrator is notified about the same.

  14. Assessment of information impacts in power system security against malicious attacks in a general framework

    Energy Technology Data Exchange (ETDEWEB)

    Bompard, E. [Dipartimento di Ingegneria Elettrica, Politecnico di Torino, I-10129 Torino (Italy)], E-mail: ettore.bompard@polito.it; Napoli, R.; Xue, F. [Dipartimento di Ingegneria Elettrica, Politecnico di Torino, I-10129 Torino (Italy)

    2009-06-15

    In the analysis of power systems security, recently a new concern related to possible malicious attacks caught much attention. Coordination among different transmission system operators (TSO) in an interconnected power system to counteract such attacks has become an important problem. This paper presents a general framework for describing the physical, cyber and decision-making aspects of the problem and their interrelations; within this framework, an analytic tool for the assessment of information impacts in handling on-line security after a malicious attack is proposed and discussed. The model is based on the socially rational multi-agent systems and the equilibrium of a fictitious play is considered to analyze the impacts of various levels of information available to the interconnected system operators on the outcomes of the decision-making process under attack. A 34-buses test system, with 3 systems interconnected by tie-lines, is presented to illustrate the model and compare the impacts of different information scenarios.

  15. Heart attack risk perception biases among hypertension patients: the role of educational level and worry.

    Science.gov (United States)

    Peterson, Laurel M; Helweg-Larsen, Marie; Volpp, Kevin G; Kimmel, Stephen E

    2012-01-01

    Risk biases such as comparative optimism (thinking one is better off than similar others) and risk inaccuracy (misestimating one's risk compared to one's calculated risk) for health outcomes are common. Little research has investigated racial or socioeconomic differences in these risk biases. Results from a survey of individuals with poorly controlled hypertension (N=813) indicated that participants showed (1) comparative optimism for heart attack risk by underestimating their heart attack risk compared to similar others, and (2) risk inaccuracy by overestimating their heart attack risk compared to their calculated heart attack risk. More highly educated participants were more comparatively optimistic because they rated their personal risk as lower; education was not related to risk inaccuracy. Neither race nor the federal poverty level was related to risk biases. Worry partially mediated the relationship between education and personal risk. Results are discussed as they relate to the existing literature on risk perception.

  16. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  17. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  18. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  19. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  20. Parathyroid gland tumors in A-bomb survivors, autopsy cases, Hiroshima. Preliminary report

    Energy Technology Data Exchange (ETDEWEB)

    Takeichi, Nobuo; Fujikura, Toshio (Radiation Effects Research Foundation, Hiroshima (Japan)); Nishida, Toshihiro

    1984-03-01

    Parathyroid gland tumors were observed in 16 of 4,136 autopsy cases (0.4%) based on the life span survey for the population including A-bomb survivors and the control group. All of the cases (5 males and 11 females) had adenoma. The incidence of parathyroid gland tumors tended to increase with increasing the dose.

  1. Bombs Away: Visual Thinking and Students' Engagement in Design Studios Contexts

    Science.gov (United States)

    Chamorro-Koc, Marianella; Scott, Andrew; Coombs, Gretchen

    2015-01-01

    In design studio, sketching or visual thinking is part of processes that assist students to achieve final design solutions. At Queensland University of Technology's (QUT's) First and Third Year industrial design studio classes we engage in a variety of teaching pedagogies from which we identify "Concept Bombs" as instrumental in the…

  2. Harry Truman and the Atomic Bomb: An Excursion into Character Education through Storytelling

    Science.gov (United States)

    Sanchez, Tony R.

    2006-01-01

    This article asserts the importance of character education through the utilization of historical storytelling in the social studies classroom. After briefly noting the value of the historical story in this regard, a specific, ready-made example is provided concerning Truman's decision to use the atomic bomb and includes a crucial set of follow-up…

  3. Determination of caloric values of agricultural crops and crop waste by Adiabatic Bomb Calorimetry

    Science.gov (United States)

    Calorific values of agricultural crops and their waste were measured by adiabatic bomb calorimetry. Sustainable farming techniques require that all potential sources of revenue be utilized. A wide variety of biomass is beginning to be used as alternative fuels all over the world. The energy potentia...

  4. Algebraically special resonances of the Kerr-black-hole-mirror bomb

    CERN Document Server

    Hod, Shahar

    2014-01-01

    A co-rotating bosonic field interacting with a spinning Kerr black hole can extract rotational energy and angular momentum from the hole. This intriguing phenomenon is known as superradiant scattering. As pointed out by Press and Teukolsky, the black-hole-field system can be made unstable (explosive) by placing a reflecting mirror around the black hole which prevents the extracted energy from escaping to infinity. This composed black-hole-mirror-field bomb has been studied extensively by many researchers. It is worth noting, however, that most former studies of the black-hole bomb phenomenon have focused on the specific case of confined scalar (spin-$0$) fields. In the present study we explore the physical properties of the higher-spin (electromagnetic and gravitational) black-hole bombs. It is shown that this composed system is amenable to an analytic treatment in the physically interesting regime of rapidly-rotating black holes. In particular, we prove that the composed black-hole-mirror-field bomb is chara...

  5. Ellerman Bombs at high resolution: II. Visibility, triggering and effect on upper atmosphere

    CERN Document Server

    Vissers, Gregal J M; Rutten, Robert J

    2013-01-01

    We use high-resolution imaging spectroscopy with the Swedish 1-m Solar Telescope (SST) to study the transient brightenings of the wings of the Balmer Halpha line in emerging active regions that are called Ellerman bombs. Simultaneous sampling of Ca II 854.2 nm with the SST confirms that most Ellerman bombs occur also in the wings of this line, but with markedly different morphology. Simultaneous images from the Solar Dynamics Observatory (SDO) show that Ellerman bombs are also detectable in the photospheric 170 nm continuum, again with differing morphology. They are also observable in 160 nm SDO images, but with much contamination from C IV emission in transition-region features. Simultaneous SST spectropolarimetry in Fe I 630.1 nm shows that Ellerman bombs occur at sites of strong-field magnetic flux cancelation between small bipolar strong-field patches that rapidly move together over the solar surface. Simultaneous SDO images in He II 30.4 nm, Fe IX 17.1 nm, and Fe XIV 21.1 nm show no clear effect of the E...

  6. The marine radiocarbon bomb pulse across the temperate North Atlantic: a compilation of Delta

    NARCIS (Netherlands)

    Scourse, J.D.; Wanamaker jr., A.D.; Weidman, C.; Heinemeier, J.; Reimer, P.J.; Butler, P.G.; Witbaard, R.; Richardson, C.A.

    2012-01-01

    Marine radiocarbon bomb-pulse time histories of annually resolved archives from temperate regions have been underexploited. We present here series of Delta C-14 excess from known-age annual increments of the long-lived bivalve mollusk Arctica islandica from 4 sites across the coastal North Atlantic

  7. A-BOMB SURVIVOR SITE-SPECIFIC RADIOGENIC CANCER RISKS ESTIMATES

    Science.gov (United States)

    A draft manuscript is being prepared that describes ways to improve estimates of risk from radiation that have been derived from A-bomb survivors. The work has been published in the journal Radiation Research volume 169, pages 87-98.

  8. The Phenomenon of Suicide Bombing: A Review of Psychological and Nonpsychological Factors

    NARCIS (Netherlands)

    Grimland, M.; Apter, A.; Kerkhof, A.J.F.M.

    2006-01-01

    This article reviews the literature on the phenomenon of suicide bombing. It addresses the question of just how much a psychological understanding of the individuals involved can aid in prevention. The article looks at historical, epidemiological, and cultural perspectives and compares the nonpsycho

  9. The Strategic Bombing of German Cities during World War II and its Impact for Germany

    NARCIS (Netherlands)

    Brakman, S.; Garretsen, H; Schramm, M.

    2003-01-01

    We construct a unique data set in order to analyze whether or not a large temporary shock has an impact on city growth. Following recent work by Davis and Weinstein (2002) on Japan, we take the strategic bombing of German cities during WWII as an example of such a shock, and analyze its impact on po

  10. Characterising the light output from Argon bombs by two simultaneous diagnostic techniques

    CSIR Research Space (South Africa)

    Olivier, M

    2013-01-01

    Full Text Available The light output from Argon-bombs was investigated by means of ultra high speed photography (Cordin Model 550-32 camera) and locally developed photodiode sensors. Tubes of various sizes were inflated with Argon gas, and were detonated on one side...

  11. Books, Not Bombs: Teaching Peace since the Dawn of the Republic. Peace Education

    Science.gov (United States)

    Howlett, Charles; Harris, Ian,

    2010-01-01

    "Books Not Bombs: Teaching Peace Since the Dawn of the Republic" is an important work relevant to peace scholars, practitioners, and students. This incisive book offers an exciting and comprehensive historical analysis of the origins and development of peace education from the creation of the New Republic at the end of the Eighteenth Century to…

  12. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  13. Multiple Partial Attacks on Complex Networks

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We numerically investigate the effect of four kinds of partial attacks of multiple targets on the Barabási-Albert (BA) scale-free network and the Erd(o)s-Rényi (ER) random network.Comparing with the effect of single target complete knockout we find that partial attacks of multiple targets may produce an effect higher than the complete knockout of a single target on both BA scale-free network and ER random network.We also find that the BA ecale-free network seems to be more susceptible to multi-target partial attacks than the ER random network.

  14. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  15. Measuring a System’s Attack Surface

    Science.gov (United States)

    2004-01-01

    fold: • In terms of a state machine model of the system, we present formal definitions of attack, attack surface, and attack class. Our definitions are...versions. The rest of this paper is organized as follows. In Section 2, we introduce our state machine model and point out the key differences from...approach in Section 6 and compare it to related work in Section 7. We conclude in Section 8. 2 State Machine Model We use a state machine to model the

  16. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  17. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks ... symptoms are called silent heart attacks. Most Common Symptoms The most common warning symptoms of a heart ...

  18. Long-lasting alterations of the immune system by ionizing radiation exposure: implications for disease development among atomic bomb survivors.

    Science.gov (United States)

    Kusunoki, Yoichiro; Hayashi, Tomonori

    2008-01-01

    The immune systems of the atomic-bomb (A-bomb) survivors were damaged proportionately to irradiation levels at the time of the bombing over 60 years ago. Although the survivor's immune system repaired and regenerated as the hematopoietic system has recovered, significant residual injury persists, as manifested by abnormalities in lymphoid cell composition and function. This review summarizes the long-lasting alterations in immunological functions associated with atomic-bomb irradiation, and discusses the likelihood that damaging effects of radiation on the immune system may be involved partly in disease development so frequently observed in A-bomb survivors. Significant immunological alterations noted include: (i) attrition of T-cell functions, as reductions in mitogen-dependent proliferation and interleukin-2 (IL-2) production; (ii) decrease in helper T-cell populations; and (iii) increase in blood inflammatory cytokine levels. These findings suggest that A-bomb radiation exposure perturbed one or more of the primary processes responsible for T-cell homeostasis and the balance between cell renewal and survival and cell death among naive and memory T cells. Such perturbed T-cell homeostasis may result in acceleration of immunological aging. Persistent inflammation, linked in some way to the perturbation of T-cell homeostasis, is key in addressing whether such noted immunological changes observed in A-bomb survivors are in fact associated with disease development.

  19. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  20. Neutron relative biological effectiveness in Hiroshima and Nagasaki atomic bomb survivors: a critical review.

    Science.gov (United States)

    Sasaki, Masao S; Endo, Satoru; Hoshi, Masaharu; Nomura, Taisei

    2016-11-01

    The calculated risk of cancer in humans due to radiation exposure is based primarily on long-term follow-up studies, e.g. the life-span study (LSS) on atomic bomb (A-bomb) survivors in Hiroshima and Nagasaki. Since A-bomb radiation consists of a mixture of γ-rays and neutrons, it is essential that the relative biological effectiveness (RBE) of neutrons is adequately evaluated if a study is to serve as a reference for cancer risk. However, the relatively small neutron component hampered the direct estimation of RBE in LSS data. To circumvent this problem, several strategies have been attempted, including dose-independent constant RBE, dose-dependent variable RBE, and dependence on the degrees of dominance of intermingled γ-rays. By surveying the available literature, we tested the chromosomal RBE of neutrons as the biological endpoint for its equivalence to the microdosimetric quantities obtained using a tissue-equivalent proportional counter (TEPC) in various neutron fields. The radiation weighting factor, or quality factor, Qn, of neutrons as expressed in terms of the energy dependence of the maximum RBE, RBEm, was consistent with that predicted by the TEPC data, indicating that the chromosomally measured RBE was independent of the magnitude of coexisting γ-rays. The obtained neutron RBE, which varied with neutron dose, was confirmed to be the most adequate RBE system in terms of agreement with the cancer incidence in A-bomb survivors, using chromosome aberrations as surrogate markers. With this RBE system, the cancer risk in A-bomb survivors as expressed in unit dose of reference radiation is equally compatible with Hiroshima and Nagasaki cities, and may be potentially applicable in other cases of human radiation exposure. © The Author 2016. Published by Oxford University Press on behalf of The Japan Radiation Research Society and Japanese Society for Radiation Oncology.

  1. Future use of tritium in mapping pre-bomb groundwater volumes.

    Science.gov (United States)

    Eastoe, C J; Watts, C J; Ploughe, M; Wright, W E

    2012-01-01

    The tritium input to groundwater, represented as volume-weighted mean tritium concentrations in precipitation, has been close to constant in Tucson and Albuquerque since 1992, and the decrease in tritium concentrations at the tail end of the bomb tritium pulse has ceased. To determine the future usefulness of tritium measurements in southwestern North America, volume-weighted mean tritium levels in seasonal aggregate precipitation samples have been gathered from 26 sites. The averages range from 2 to 9 tritium units (TU). Tritium concentrations increase with site latitude, and possibly with distance from the coast and with site altitude, reflecting local ratios of combination of low-tritium moisture advected from the oceans with high-tritium moisture originating near the tropopause. Tritium used alone as a tool for mapping aquifer volumes containing only pre-bomb recharge to groundwater will become ambiguous when the tritium in precipitation at the end of the bomb tritium pulse decays to levels close to the analytical detection limit. At such a time, tritium in precipitation from the last one to two decades of the bomb pulse will become indistinguishable from pre-bomb recharge. The threshold of ambiguity has already arrived in coastal areas with a mean of 2 TU in precipitation and will follow in the next three decades throughout the study region. Where the mean tritium level is near 5 TU, the threshold will occur between 2025 and 2030, given a detection limit of 0.6 TU. Similar thresholds of ambiguity, with different local timing possible, apply globally. © 2011, The Author(s). Ground Water © 2011, National Ground Water Association.

  2. Radiation effect on non-cancer diseases among a-bomb survivors

    Energy Technology Data Exchange (ETDEWEB)

    Suzuki, G.; Akahoshi, M.; Fujiwara, S.; Neriishi, K.; Yamada, M.; Hakoda, M. [Radiation Effect Research Foundation, Hiroshima (Japan)

    2002-07-01

    It has been well documented in the literature that radiation induces DNA damages and increases cancer risk. Besides cancer risk, the Life Span Study (LSS) on A-bomb survivors in Hiroshima and Nagasaki that has been conducted since 1950 by RERF demonstrated an increase in non-cancer death by cardiovascular diseases and chronic liver diseases (1). Since LSS analysis depends on death certificate, a physiological mechanism has not been elucidated how radiation increases the incidence of non-cancer diseases. In order to elucidate radiation effect on non-fatal disorders, RERF has conducted the Adult Health Study (AHS) since 1958 where 23,000 A-bomb survivors have been examined every other year. This study suggested that radiation exposure about 55 years before reduced the immune response to pathogens such as HB virus and Chlamydia pneumoniae, increased the levels of serum inflammatory markers, the prevalence of chronic hepatitis/liver cirrhosis and senile cataract, and the incidence of cardiovascular diseases. Our colleagues reported a dose-dependent decrease in the CD4 T cell number among A-bomb survivors (2,3). Since chronic inflammation and oxidative stress are causative of atherogenic cardiovascular diseases or cataract, we speculate a decrease in the immune response to pathogens, at least in part, is one of the mechanisms that A-bomb exposure increased non-cancer diseases. When the levels of inflammatory marker, C-reactive protein (CRP), were analyzed among subjects with evidence of Chlamydia pneumoniae infection, significantly higher levels of CRP were associated with antibodies to Chlamydia pneumoniae in those subjects receiving >1Gy than those receiving <5mGy. It is well known that high CRP is one of the risk factors of arteriosclerosis (4,5). Thus, A-bomb exposure seems to augment inflammatory response to pathogens, though of which mechanisms are not clear now.

  3. Predicting the effect of climate change on wildfire behavior and initial attack success

    Energy Technology Data Exchange (ETDEWEB)

    Riley, William; Fried, Jeremy S.; Gilless, J. Keith; Riley, William J.; Moody, Tadashi J.; Simon de Blas, Clara; Hayhoe, Katharine; Moritz, Max; Stephens, Scott; Torn, Margaret

    2007-12-01

    This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate changes anticipated for the next century are of sufficient magnitude to generate an appreciable increase in the number of fires that escape initial attack. Such escapes are of considerable importance in wildland fire protection planning, given the high cost to society of a catastrophic escape like those experienced in recent decades in the Berkeley-Oakland, Santa Barbara, San Diego, or Los Angeles areas. However, at least for the three study areas considered, it would appear that relatively modest augmentations to existing firefighting resources might be sufficient to compensate for change-induced changes in wildland fire outcomes.

  4. Taxonomy of SSL/TLS Attacks

    Directory of Open Access Journals (Sweden)

    Keerthi Vasan K.

    2016-02-01

    Full Text Available Secure Socket Layer (SSL and Transport Layer Security (TLS protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.

  5. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  6. Outdoor Air Pollution, Heart Attack and Stroke

    Science.gov (United States)

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  7. Preventing Coordinated Attacks Via Distributed Alert Exchange

    CERN Document Server

    Garcia-Alfaro, Joaquin; Muehl, Gero; Borrell, Joan

    2008-01-01

    Attacks on information systems followed by intrusions may cause large revenue losses. The prevention of both is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to recognize and react to the different actions of such an attack. The design and deployment of a decentralized system targeted at detecting as well as reacting to information system attacks might benefit from the loose coupling realized by publish/subscribe middleware. In this paper, we present the advantages and convenience in using this communication paradigm for a general decentralized attack prevention framework. Furthermore, we present the design and implementation of our approach based on existing publish/subscribe middleware and evaluate our approach for GNU/Linux systems.

  8. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  9. Performance Evaluation of AODV under Blackhole Attack

    National Research Council Canada - National Science Library

    Tarunpreet Bhatia; A K Verma

    2013-01-01

    .... This paper simulates one of the most malicious behaviors known as blackhole attack. The blackhole node creates forged reply, advertising valid and fresh route to destination and thereafter drops data packets maliciously...

  10. Uncertainties of a preemptive nuclear attack

    Energy Technology Data Exchange (ETDEWEB)

    Bunn, M.; Tsipis, K.

    1983-11-01

    The deterrence of nuclear war requires that nuclear forces not be vulnerable to a preemptive disarming attack that would preclude retaliation. The uncertainties surrounding a countersilo attack stem from incomplete intelligence information about the accuracy of weapons delivery due to errors in the inertial-guidance system and those associated with reentry into the atmosphere. An analyses of these uncertainties examines the results of test flights and calculations based on simulations that consider the problems of fratricide, estimates of yield, and a number of other technical uncertainties that are overshadowed by the uncertainty of whether the nation under attack would respond with launch-on-warning or launch-under-attack. The analysis concludes that, despite a current level of stability, the progress of weapons technology bodes ill for the future unless stringent testing and deployment limitations are imposed. 6 figures, 1 table. (DCK)

  11. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  12. Identifying and Analyzing Web Server Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  13. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  14. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  15. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  16. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  17. Study Shows How Zika Attacks Infant Brain

    Science.gov (United States)

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  18. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  19. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  20. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.